Search results for: salt and peppers attacks
762 Modelling Spatial Dynamics of Terrorism
Authors: André Python
Abstract:
To this day, terrorism persists as a worldwide threat, exemplified by the recent deadly attacks in January 2015 in Paris and the ongoing massacres perpetrated by ISIS in Iraq and Syria. In response to this threat, states deploy various counterterrorism measures, the cost of which could be reduced through effective preventive measures. In order to increase the efficiency of preventive measures, policy-makers may benefit from accurate predictive models that are able to capture the complex spatial dynamics of terrorism occurring at a local scale. Despite empirical research carried out at country-level that has confirmed theories explaining the diffusion processes of terrorism across space and time, scholars have failed to assess diffusion’s theories on a local scale. Moreover, since scholars have not made the most of recent statistical modelling approaches, they have been unable to build up predictive models accurate in both space and time. In an effort to address these shortcomings, this research suggests a novel approach to systematically assess the theories of terrorism’s diffusion on a local scale and provide a predictive model of the local spatial dynamics of terrorism worldwide. With a focus on the lethal terrorist events that occurred after 9/11, this paper addresses the following question: why and how does lethal terrorism diffuse in space and time? Based on geolocalised data on worldwide terrorist attacks and covariates gathered from 2002 to 2013, a binomial spatio-temporal point process is used to model the probability of terrorist attacks on a sphere (the world), the surface of which is discretised in the form of Delaunay triangles and refined in areas of specific interest. Within a Bayesian framework, the model is fitted through an integrated nested Laplace approximation - a recent fitting approach that computes fast and accurate estimates of posterior marginals. Hence, for each location in the world, the model provides a probability of encountering a lethal terrorist attack and measures of volatility, which inform on the model’s predictability. Diffusion processes are visualised through interactive maps that highlight space-time variations in the probability and volatility of encountering a lethal attack from 2002 to 2013. Based on the previous twelve years of observation, the location and lethality of terrorist events in 2014 are statistically accurately predicted. Throughout the global scope of this research, local diffusion processes such as escalation and relocation are systematically examined: the former process describes an expansion from high concentration areas of lethal terrorist events (hotspots) to neighbouring areas, while the latter is characterised by changes in the location of hotspots. By controlling for the effect of geographical, economical and demographic variables, the results of the model suggest that the diffusion processes of lethal terrorism are jointly driven by contagious and non-contagious factors that operate on a local scale – as predicted by theories of diffusion. Moreover, by providing a quantitative measure of predictability, the model prevents policy-makers from making decisions based on highly uncertain predictions. Ultimately, this research may provide important complementary tools to enhance the efficiency of policies that aim to prevent and combat terrorism.Keywords: diffusion process, terrorism, spatial dynamics, spatio-temporal modeling
Procedia PDF Downloads 351761 Meniere's Disease and its Prevalence, Symptoms, Risk Factors and Associated Treatment Solutions for this Disease
Authors: Amirreza Razzaghipour Sorkhab
Abstract:
One of the most common disorders among humans is hearing impairment. This paper provides an evidence base that recovers understanding of Meniere’s disease and highlights the physical and mental health correlates of the disorder. Meniere's disease is more common in the elderly. The term idiopathic endolymphatic hydrops has been attributed to this disease by some in the previous. Meniere’s disease demonstrations a genetic tendency, and a family history is found in 10% of cases, with an autosomal dominant inheritance pattern. The COCH gene may be one of the hereditary factors contributing to Meniere’s disease, and the possibility of a COCH mutation should be considered in patients with Meniere’s disease symptoms. Should be considered Missense mutations in the COCH gene cause the autosomal dominant sensorineural hearing loss and vestibular disorder. Meniere’s disease is a complex, heterogeneous disorder of the inner ear and that is characterized by episodes of vertigo lasting from minutes to hours, fluctuating sensorineural hearing loss, tinnitus, and aural fullness. The existing evidence supports the suggestion that age and sleep disorder are risk factors for Meniere's disease. Many factors have been reported to precipitate the progress of Menier, including endolymphatic hydrops, immunology, viral infection, inheritance, vestibular migraine, and altered intra-labyrinthine fluid dynamics. Although there is currently no treatment that has a proven helpful effect on hearing levels or on the long-term evolution of the disease, however, in the primary stages, the hearing may improve among attacks, but a permanent hearing loss occurs in the majority of cases. Current publications have proposed a role for the intratympanic use of medicine, mostly aminoglycosides, for the control of vertigo. more than 85% of patients with Meniere's disease are helped by either changes in lifestyle and medical treatment or minimally aggressive surgical procedures such as intratympanic steroid therapy, intratympanic gentamicin therapy, and endolymphatic sac surgery. However, unilateral vestibular extirpation methods (intratympanic gentamicin, vestibular nerve section, or labyrinthectomy) are more predictable but invasive approaches to control the vertigo attacks. Medical therapy aimed at reducing endolymph volume, such as low-sodium diet, diuretic use, is the typical initial treatment.Keywords: meniere's disease, endolymphatic hydrops, hearing loss, vertigo, tinnitus, COCH gene
Procedia PDF Downloads 91760 All at Sea: Why OT / IT Infrastructure Is So Complex and the Challenges of Securing These on a Cruise Ship
Authors: Ken Munro
Abstract:
Cruise ships are possibly the most complex collection of systems it is possible to find in one physical, moving location. Propulsion, navigation, power generation and more, combined with a hotel, restaurant, casino, theatre etc, with safety and fire control systems to boot. That complexity creates huge challenges with keeping OT and IT systems apart. Ships engines are often remotely managed, network segregation is often defeated through troubleshooting when at sea. This session will refer to multiple entertaining and informative tales of taking control of ships, including accessing a ships Azipods via a game simulator for passengers. Fortunately, genuine attacks against vessels are very rare, but the effects and impacts to world trade are becoming increasingly obvious.Keywords: maritime security, cybersecurity, OT, IT, networks
Procedia PDF Downloads 33759 Smart Trust Management for Vehicular Networks
Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel
Abstract:
Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.Keywords: active vehicle, cooperation, petri nets, trust management, VANET
Procedia PDF Downloads 405758 Educaton for Social Reconstruction: Impact of Social Terrorism on Women Education in Nigeria
Authors: Theresa Chinyere ONU
Abstract:
This paper examines the effect of social terrorism on education in Nigeria. The article looked into some prevailing conditions of international political unrest and insecurity. The fear and risk of these conditions to national security and the struggle for power establishment which has further intensified and taken the shape of terrorism has imposed devastating effects on the growth and prosperity of Nigeria; as traffic patterns get disturbed, hospitals and schools get dysfunctional. This has also affected the educational standard in Nigeria as parents are no longer comfortable in sending their children to schools in some states for the fear of terrorist attacks. The study emphasized the integrated the effort of the government management institutions.Keywords: education, social terrorism, women, Nigeria
Procedia PDF Downloads 583757 Multimetallic and Multiferocenyl Assemblies of Ferocenyl-Based Dithiophospohonate and Their Electrochemical Properties
Authors: J. Tomilla Ajayi, Werner E. Van Zyl
Abstract:
This work presents an overview of the reaction of 2, 4-diferrocenyl-1, 3-dithiadiphosphetane-2, 4-disulfide (Ferrocenyl Lawesson’s reagent) with water to produce the non-symmetric, ferocenyl dithiophosphonic acid respectively in high yields. These acids were readily deprotonated by anhydrous Ammonia to yield the corresponding ammonium salt NH4S2PFcOH. These were complex to Ni (II) in molar ratio 1:1 and 1:2. The resulting complex from the reaction formed same compound with different isomers (Cis and Trans) and also compound with multimetallic coordination. Quality X-ray crystals were formed from THF/Ether. The compounds were characterized by 1H, 31P NMR, and FTIR. Bulk purity were confirmed by either ESI-MS or elemental analysis and The XRD images were obtained using single crystal X-ray crystallographic studies. The electrochemical investigation of the Compounds were carried out using cyclic voltammetry.Keywords: ferrocenyl, dithiophosphonate, isomer, coordination
Procedia PDF Downloads 248756 Investigation of the EEG Signal Parameters during Epileptic Seizure Phases in Consequence to the Application of External Healing Therapy on Subjects
Authors: Karan Sharma, Ajay Kumar
Abstract:
Epileptic seizure is a type of disease due to which electrical charge in the brain flows abruptly resulting in abnormal activity by the subject. One percent of total world population gets epileptic seizure attacks.Due to abrupt flow of charge, EEG (Electroencephalogram) waveforms change. On the display appear a lot of spikes and sharp waves in the EEG signals. Detection of epileptic seizure by using conventional methods is time-consuming. Many methods have been evolved that detect it automatically. The initial part of this paper provides the review of techniques used to detect epileptic seizure automatically. The automatic detection is based on the feature extraction and classification patterns. For better accuracy decomposition of the signal is required before feature extraction. A number of parameters are calculated by the researchers using different techniques e.g. approximate entropy, sample entropy, Fuzzy approximate entropy, intrinsic mode function, cross-correlation etc. to discriminate between a normal signal & an epileptic seizure signal.The main objective of this review paper is to present the variations in the EEG signals at both stages (i) Interictal (recording between the epileptic seizure attacks). (ii) Ictal (recording during the epileptic seizure), using most appropriate methods of analysis to provide better healthcare diagnosis. This research paper then investigates the effects of a noninvasive healing therapy on the subjects by studying the EEG signals using latest signal processing techniques. The study has been conducted with Reiki as a healing technique, beneficial for restoring balance in cases of body mind alterations associated with an epileptic seizure. Reiki is practiced around the world and is recommended for different health services as a treatment approach. Reiki is an energy medicine, specifically a biofield therapy developed in Japan in the early 20th century. It is a system involving the laying on of hands, to stimulate the body’s natural energetic system. Earlier studies have shown an apparent connection between Reiki and the autonomous nervous system. The Reiki sessions are applied by an experienced therapist. EEG signals are measured at baseline, during session and post intervention to bring about effective epileptic seizure control or its elimination altogether.Keywords: EEG signal, Reiki, time consuming, epileptic seizure
Procedia PDF Downloads 406755 Review of the Safety of Discharge on the First Postoperative Day Following Carotid Surgery: A Retrospective Analysis
Authors: John Yahng, Hansraj Riteesh Bookun
Abstract:
Objective: This was a retrospective cross-sectional study evaluating the safety of discharge on the first postoperative day following carotid surgery - principally carotid endarterectomy. Methods: Between January 2010 to October 2017, 252 patients with mean age of 72 years, underwent carotid surgery by seven surgeons. Their medical records were consulted and their operative as well as complication timelines were databased. Descriptive statistics were used to analyse pooled responses and our indicator variables. The statistical package used was STATA 13. Results: There were 183 males (73%) and the comorbid burden was as follows: ischaemic heart disease (54%), diabetes (38%), hypertension (92%), stage 4 kidney impairment (5%) and current or ex-smoking (77%). The main indications were transient ischaemic attacks (42%), stroke (31%), asymptomatic carotid disease (16%) and amaurosis fugax (8%). 247 carotid endarterectomies (109 with patch arterioplasty, 88 with eversion and transection technique, 50 with endarterectomy only) were performed. 2 carotid bypasses, 1 embolectomy, 1 thrombectomy with patch arterioplasty and 1 excision of a carotid body tumour were also performed. 92% of the cases were performed under general anaesthesia. A shunt was used in 29% of cases. The mean length of stay was 5.1 ± 3.7days with the range of 2 to 22 days. No patient was discharged on day 1. The mean time from admission to surgery was 1.4 ± 2.8 days, ranging from 0 to 19 days. The mean time from surgery to discharge was 2.7 ± 2.0 days with the of range 0 to 14 days. 36 complications were encountered over this period, with 12 failed repairs (5 major strokes, 2 minor strokes, 3 transient ischaemic attacks, 1 cerebral bleed, 1 occluded graft), 11 bleeding episodes requiring a return to the operating theatre, 5 adverse cardiac events, 3 cranial nerve injuries, 2 respiratory complications, 2 wound complications and 1 acute kidney injury. There were no deaths. 17 complications occurred on postoperative day 0, 11 on postoperative day 1, 6 on postoperative day 2 and 2 on postoperative day 3. 78% of all complications happened before the second postoperative day. Out of the complications which occurred on the second or third postoperative day, 4 (1.6%) were bleeding episodes, 1 (0.4%) failed repair , 1 respiratory complication (0.4%) and 1 wound complication (0.4%). Conclusion: Although it has been common practice to discharge patients on the second postoperative day following carotid endarterectomy, we find here that discharge on the first operative day is safe. The overall complication rate is low and most complications are captured before the second postoperative day. We suggest that patients having an uneventful first 24 hours post surgery be discharged on the first day. This should reduce hospital length of stay and the health economic burden.Keywords: carotid, complication, discharge, surgery
Procedia PDF Downloads 166754 An Algorithm Based on the Nonlinear Filter Generator for Speech Encryption
Authors: A. Belmeguenai, K. Mansouri, R. Djemili
Abstract:
This work present a new algorithm based on the nonlinear filter generator for speech encryption and decryption. The proposed algorithm consists on the use a linear feedback shift register (LFSR) whose polynomial is primitive and nonlinear Boolean function. The purpose of this system is to construct Keystream with good statistical properties, but also easily computable on a machine with limited capacity calculated. This proposed speech encryption scheme is very simple, highly efficient, and fast to implement the speech encryption and decryption. We conclude the paper by showing that this system can resist certain known attacks.Keywords: nonlinear filter generator, stream ciphers, speech encryption, security analysis
Procedia PDF Downloads 296753 Design a Network for Implementation a Hospital Information System
Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇
Abstract:
A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network
Procedia PDF Downloads 440752 Analysis of Security Vulnerabilities for Mobile Health Applications
Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López
Abstract:
The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors
Procedia PDF Downloads 517751 Towards Development of Superior Brassica juncea by Pyramiding of Genes of Diverse Pathways for Value Addition, Stress Alleviation and Human Health
Authors: Deepak Kumar, Ravi Rajwanshi, Mohd. Aslam Yusuf, Nisha Kant Pandey, Preeti Singh, Mukesh Saxena, Neera Bhalla Sarin
Abstract:
Global issues are leading to concerns over food security. These include climate change, urbanization, increase in population subsequently leading to greater energy and water demand. Futuristic approach for crop improvement involves gene pyramiding for agronomic traits that empower the plants to withstand multiple stresses. In an earlier study from the laboratory, the efficacy of overexpressing γ-tocopherol methyl transferase (γ-TMT) gene from the vitamin E biosynthetic pathway has been shown to result in six-fold increase of the most biologically active form, the α-tocopherol in Brassica juncea which resulted in alleviation of salt, heavy metal and osmoticum induced stress by the transgenic plants. The glyoxalase I (gly I) gene from the glyoxalase pathway has also been earlier shown by us to impart tolerance against multiple abioitc stresses by detoxification of the cytotoxic compound methylglyoxal in Brassica juncea. Recently, both the transgenes were pyramided in Brassica juncea lines through sexual crosses involving two stable Brassica juncea lines overexpressing γ-TMT and gly I genes respectively. The transgene integration was confirmed by PCR analysis and their mRNA expression was evident by RT-PCR analysis. Preliminary physiological investigations showed ~55% increased seed germination under 200 mM NaCl stress in the pyramided line and 81% higher seed germination under 200 mM mannitol stress as compared to the WT control plants. The pyramided lines also retained more chlorophyll content when the leaf discs were floated on NaCl (200, 400 and 600 mM) or mannitol (200, 400 and 600 mM) compared to the WT control plants. These plants had higher Relative Water Content and greater solute accumulation under stress compared to the parental plants having γ-TMT or the glyI gene respectively. The studies revealed the synergy of two components from different metabolic pathways in enhancing stress hardiness of the transgenic B. juncea plants. It was concluded that pyramiding of genes (γ-TMT and glyI) from diverse pathways can lead to enhanced tolerance to salt and mannitol stress (simulating drought conditions). This strategy can prove useful in enhancing the crop yields under various abiotic stresses.Keywords: abiotic stress, brassica juncea, glyoxalase I, α-tocopherol
Procedia PDF Downloads 549750 Kohonen Self-Organizing Maps as a New Method for Determination of Salt Composition of Multi-Component Solutions
Authors: Sergey A. Burikov, Tatiana A. Dolenko, Kirill A. Gushchin, Sergey A. Dolenko
Abstract:
The paper presents the results of clusterization by Kohonen self-organizing maps (SOM) applied for analysis of array of Raman spectra of multi-component solutions of inorganic salts, for determination of types of salts present in the solution. It is demonstrated that use of SOM is a promising method for solution of clusterization and classification problems in spectroscopy of multi-component objects, as attributing a pattern to some cluster may be used for recognition of component composition of the object.Keywords: Kohonen self-organizing maps, clusterization, multi-component solutions, Raman spectroscopy
Procedia PDF Downloads 443749 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices
Authors: Robin Singh, Jing-Chiou Liou
Abstract:
The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secureKeywords: cybersecurity, DDoS, IoT, medical devices
Procedia PDF Downloads 86748 Development of Extruded Prawn Snack Using Prawn Flavor Powder from Prawn Head Waste
Authors: S. K. Sharma, P. Kumar, Pratibha Singh
Abstract:
Consumption of SNACK is growing its popularity every day in India and a broad range of these items are available in the market. The end user interest in ready-to-eat snack foods is constantly growing mainly due to their ease, ample accessibility, appearance, taste and texture. Food extrusion has been practiced for over fifty years. Its role was initially limited to mixing and forming cereal products. Although thermoplastic extrusion has been successful for starch products, extrusion of proteins has achieved only limited success. In this study, value-added extruded prawn product was prepared with prawn flavor powder and corn flour using a twin-screw extruder. Prawn flavor concentrates prepared from fresh prawn head (Solenocera indica). To prepare flavor concentrate prawn head washed with potable water and blended with 200ml 3% salt solution per 250gm head weight to make the slurry, which was further put in muslin cloth and boiled with salt and starch solution for 10 minutes, cooled to room temperature and filtered, starch added to the filtrate and made into powder in an electrically drier at 43-450c. The mixture was passed through the twin-screw extruder (co-rotating twin screw extruder - basic technology Pvt. Ltd., Kolkata) which was operated at a particular speed of rotation, die diameter, temperature, moisture, and fish powder concentration. Many trial runs were conducted to set up the process variables. The different extrudes produced after each trail were examined for the quality and characteristics. The effect of temperature, moisture, screw speed, protein, fat, ash and thiobarbituric acid (TBA) number and expansion ratio were studied. In all the four trials, moisture, temperature, speed and die diameter used was 20%, 100°C, 350 rpm and 4 mm, respectively. The ratio of prawn powder and cornstarch used in different trials ranged between 2:98 and 10:90. The storage characteristics of the final product were studied using three different types of packaging under nitrogen flushing, i.e. a- 12-pm polyester, 12-pm metalized polyester, 60-11m polyethylene (metalized polyester a), b- 12-11m metalized polyester, 37.5-11m polyethylene (metalized polyester b), c- 12-11m polyethylene, 9-11m aluminium foil, 37.5-11m polyethylene (aluminium foil). The organoleptic analysis was carried out on a 9-point hedonic scale. The study revealed that the fried product packed in aluminum foil under nitrogen flushing would remain acceptable for more than three months.Keywords: extruded product, prawn flavor, twin-screw extruder, storage characteristics
Procedia PDF Downloads 140747 Factors Affecting Aluminum Dissolve from Acidified Water Purification Sludge
Authors: Wen Po Cheng, Chi Hua Fu, Ping Hung Chen, Ruey Fang Yu
Abstract:
Recovering resources from water purification sludge (WPS) have been gradually stipulated in environmental protection laws and regulations in many nations. Hence, reusing the WPS is becoming an important topic, and recovering alum from WPS is one of the many practical alternatives. Most previous research efforts have been conducted on studying the amphoteric characteristic of aluminum hydroxide for investigating the optimum pH range to dissolve the Al(III) species from WPS, but it has been lack of reaction kinetics or mechanisms related discussion. Therefore, in this investigation, water purification sludge (WPS) solution was broken by ultrasound to make particle size of reactants smaller, specific surface area larger. According to the reaction kinetics, these phenomena let the dissolved aluminum salt quantity increased and the reaction rate go faster.Keywords: aluminum, acidification, sludge, recovery
Procedia PDF Downloads 629746 Estimation of Longitudinal Dispersion Coefficient Using Tracer Data
Authors: K. Ebrahimi, Sh. Shahid, M. Mohammadi Ghaleni, M. H. Omid
Abstract:
The longitudinal dispersion coefficient is a crucial parameter for 1-D water quality analysis of riverine flows. So far, different types of empirical equations for estimation of the coefficient have been developed, based on various case studies. The main objective of this paper is to develop an empirical equation for estimation of the coefficient for a riverine flow. For this purpose, a set of tracer experiments was conducted, involving salt tracer, at three sections located in downstream of a lengthy canal. Tracer data were measured in three mixing lengths along the canal including; 45, 75 and 100m. According to the results, the obtained coefficients from new developed empirical equation gave an encouraging level of agreement with the theoretical values.Keywords: coefficients, dispersion, river, tracer, water quality
Procedia PDF Downloads 389745 High Temperature in Caustic Pretreatment of Gold Locked in the Residue after Filtration from Gold Cyanidation Leaching
Authors: K. L. Kabemba, R. F. Sandenberg
Abstract:
The usual way to desorb gold is by elution with a hot concentrated alkaline solution of sodium cyanide. The high temperature is necessary because the dielectric constant of water decreases with increasing temperature hence the electrostatic forces between charcoal and the gold cyanide complex decreases. High alkalinity and a high concentration of cyanide are necessary for gold desorption because both OH- and CN- ions are preferentially adsorbed. The rate of elution increases with increasing anion concentration but decreases with increasing cation concentration that means the rate of elution passes through a maximum as the concentration of the eluting salt (NaCN, for example) is increased. The anion that gives the best results, the cyanide ion, decomposes fairly rapidly at elevated temperatures (40% in 6 hours, 90% in 24 hours at 95°C).Keywords: caustic, cyanide, gold, temperature
Procedia PDF Downloads 387744 Act Local, Think Global: Superior Institute of Engineering of Porto Campaign for a Sustainable Campus
Authors: R. F. Mesquita Brandão
Abstract:
Act Local, Think Global is the name of a campaign implemented at Superior Institute of Engineering of Porto (ISEP), one of schools of Polytechnic of Porto, with the main objective of increase the sustainability of the campus. ISEP has a campus with 52.000 m2 and more than 7.000 students. The campaign started in 2019 and the results are very clear. In 2019 only 16% of the waste created in the campus was correctly separate for recycling and now almost 50% of waste goes to the correct waste container. Actions to reduce the energy consumption were implemented with significantly results. One of the major problems in the campus are the water leaks. To solve this problem was implemented a methodology for water monitoring during the night, a period of time where consumptions are normally low. If water consumption in the period is higher than a determinate value it may mean a water leak and an alarm is created to the maintenance teams. In terms of energy savings, some measurements were implemented to create savings in energy consumption and in equivalent CO₂ produced. In order to reduce the use of plastics in the campus, was implemented the prohibition of selling 33 cl plastic water bottles and in collaboration with the students association all meals served in the restaurants changed the water plastic bottle for a glass that can be refilled with water in the water dispensers. This measures created a reduction of use of more than 75.000 plastic bottles per year. In parallel was implemented the ISEP water glass bottle to be used in all scientific meetings and events. Has a way of involving all community in sustainability issues was developed and implemented a vertical garden in aquaponic system. In 2019, the first vertical garden without soil was installed inside a large campus building. The system occupies the entire exterior façade (3 floors) of the entrance to ISEP's G building. On each of these floors there is a planter with 42 positions available for plants. Lettuces, strawberries, peppers are examples of some vegetable produced that can be collected by the entire community. Associated to the vertical garden was developed a monitoring system were some parameters of the system are monitored. This project is under development because it will work in a stand-alone energy feeding, with the use of photovoltaic panels for production of energy necessities. All the system was, and still is, developed by students and teachers and is used in class projects of some ISEP courses. These and others measures implemented in the campus, will be more developed in the full paper, as well as all the results obtained, allowed ISEP to be the first Portuguese high school to obtain the certification “Coração Verde” (Green Heart), awarded by LIPOR, a Portuguese company with the mission of transform waste into new resources through the implementation of innovative and circular practices, generating and sharing value.Keywords: aquaponics, energy efficiency, recycling, sustainability, waste separation
Procedia PDF Downloads 94743 The Fight against Terrorist Radicalization: A French Perspective
Authors: Julia Burchett
Abstract:
After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism
Procedia PDF Downloads 430742 Capacity Building in Dietary Monitoring and Public Health Nutrition in the Eastern Mediterranean Region
Authors: Marisol Warthon-Medina, Jenny Plumb, Ayoub Aljawaldeh, Mark Roe, Ailsa Welch, Maria Glibetic, Paul M. Finglas
Abstract:
Similar to Western Countries, the Eastern Mediterranean Region (EMR) also presents major public health issues associated with the increased consumption of sugar, fat, and salt. Therefore, one of the policies of the World Health Organization’s (WHO) EMR is to reduce the intake of salt, sugar, and fat (Saturated fatty acids, trans fatty acids) to address the risk of non-communicable diseases (i.e. diabetes, cardiovascular disease, cancer) and obesity. The project objective is to assess status and provide training and capacity development in the use of improved standardized methodologies for updated food composition data, dietary intake methods, use of suitable biomarkers of nutritional value and determine health outcomes in low and middle-income countries (LMIC). Training exchanges have been developed with clusters of countries created resulting from regional needs including Sudan, Egypt and Jordan; Tunisia, Morocco, and Mauritania; and other Middle Eastern countries. This capacity building will lead to the development and sustainability of up-to-date national and regional food composition databases in LMIC for use in dietary monitoring assessment in food and nutrient intakes. Workshops were organized to provide training and capacity development in the use of improved standardized methodologies for food composition and food intake. Training needs identified and short-term scientific missions organized for LMIC researchers including (1) training and knowledge exchange workshops, (2) short-term exchange of researchers, (3) development and application of protocols and (4) development of strategies to reduce sugar and fat intake. An initial training workshop, Morocco 2018 was attended by 25 participants from 10 EMR countries to review status and support development of regional food composition. 4 training exchanges are in progress. The use of improved standardized methodologies for food composition and dietary intake will produce robust measurements that will reinforce dietary monitoring and policy in LMIC. The capacity building from this project will lead to the development and sustainability of up-to-date national and regional food composition databases in EMR countries. Supported by the UK Medical Research Council, Global Challenges Research Fund, (MR/R019576/1), and the World Health Organization’s Eastern Mediterranean Region.Keywords: dietary intake, food composition, low and middle-income countries, status.
Procedia PDF Downloads 161741 Criminal Attitude vs Transparency in the Arab World
Authors: Keroles Akram Saed Ghatas
Abstract:
The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.
Procedia PDF Downloads 43740 Comparison between Conventional Bacterial and Algal-Bacterial Aerobic Granular Sludge Systems in the Treatment of Saline Wastewater
Authors: Philip Semaha, Zhongfang Lei, Ziwen Zhao, Sen Liu, Zhenya Zhang, Kazuya Shimizu
Abstract:
The increasing generation of saline wastewater through various industrial activities is becoming a global concern for activated sludge (AS) based biological treatment which is widely applied in wastewater treatment plants (WWTPs). As for the AS process, an increase in wastewater salinity has negative impact on its overall performance. The advent of conventional aerobic granular sludge (AGS) or bacterial AGS biotechnology has gained much attention because of its superior performance. The development of algal-bacterial AGS could enhance better nutrients removal, potentially reduce aeration cost through symbiotic algae-bacterial activity, and thus, can also reduce overall treatment cost. Nonetheless, the potential of salt stress to decrease biomass growth, microbial activity and nutrient removal exist. Up to the present, little information is available on saline wastewater treatment by algal-bacterial AGS. To the authors’ best knowledge, a comparison of the two AGS systems has not been done to evaluate nutrients removal capacity in the context of salinity increase. This study sought to figure out the impact of salinity on the algal-bacterial AGS system in comparison to bacterial AGS one, contributing to the application of AGS technology in the real world of saline wastewater treatment. In this study, the salt concentrations tested were 0 g/L, 1 g/L, 5 g/L, 10 g/L and 15 g/L of NaCl with 24-hr artificial illuminance of approximately 97.2 µmol m¯²s¯¹, and mature bacterial and algal-bacterial AGS were used for the operation of two identical sequencing batch reactors (SBRs) with a working volume of 0.9 L each, respectively. The results showed that salinity increase caused no apparent change in the color of bacterial AGS; while for algal-bacterial AGS, its color was progressively changed from green to dark green. A consequent increase in granule diameter and fluffiness was observed in the bacterial AGS reactor with the increase of salinity in comparison to a decrease in algal-bacterial AGS diameter. However, nitrite accumulation peaked from 1.0 mg/L and 0.4 mg/L at 1 g/L NaCl in the bacterial and algal-bacterial AGS systems, respectively to 9.8 mg/L in both systems when NaCl concentration varied from 5 g/L to 15 g/L. Almost no ammonia nitrogen was detected in the effluent except at 10 g/L NaCl concentration, where it averaged 4.2 mg/L and 2.4 mg/L, respectively, in the bacterial and algal-bacterial AGS systems. Nutrients removal in the algal-bacterial system was relatively higher than the bacterial AGS in terms of nitrogen and phosphorus removals. Nonetheless, the nutrient removal rate was almost 50% or lower. Results show that algal-bacterial AGS is more adaptable to salinity increase and could be more suitable for saline wastewater treatment. Optimization of operation conditions for algal-bacterial AGS system would be important to ensure its stably high efficiency in practice.Keywords: algal-bacterial aerobic granular sludge, bacterial aerobic granular sludge, Nutrients removal, saline wastewater, sequencing batch reactor
Procedia PDF Downloads 148739 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems
Authors: Nadjah Chergui, Narhimene Boustia
Abstract:
Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.Keywords: context, default, exception, vulnerability
Procedia PDF Downloads 259738 Policy and Strategy to Combatting Terrorism in Indonesia: Analysis Socio Juridical Counter and Contra Terrorism
Authors: Dini Dewi Heniarti
Abstract:
In the past decades, Indonesia has suffered severe terrorist attacks, faced major terrorism challenges and has made impressive progress in countering it. The trend of terrorist groups operating in Indonesia is to focus on ‘soft’ targets. Indonesia has made notable progress in strengthening the legal regime against terrorism, in conformity with the international treaties against terrorism. Further measures are however needed to complete the legal regime building processes. This paper will demonstrate analyze socio yuridical contra and counter terrorism by Indonesia Government.Keywords: policy, strategy, combatting terrorism, socio juridical, counter and contra terrorism
Procedia PDF Downloads 423737 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms
Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga
Abstract:
Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.Keywords: anomaly detection, clustering, pattern recognition, web sessions
Procedia PDF Downloads 288736 Antimicrobial Activity of Fatty Acid Salts against Microbes for Food Safety
Authors: Aya Tanaka, Mariko Era, Manami Masuda, Yui Okuno, Takayoshi Kawahara, Takahide Kanyama, Hiroshi Morita
Abstract:
Objectives— Fungi and bacteria are present in a wide range of natural environments. They are breed in the foods such as vegetables and fruit, causing corruption and deterioration of these foods in some cases. Furthermore, some species of fungi and bacteria are known to cause food intoxication or allergic reactions in some individuals. To prevent fungal and bacterial contamination, various fungicides and bactericidal have been developed that inhibit fungal and bacterial growth. Fungicides and bactericides must show high antifungal and antibacterial activity, sustainable activity, and a high degree of safety. Therefore, we focused on the fatty acid salt which is the main component of soap. We focused on especially C10K and C12K. This study aimed to find the effectiveness of the fatty acid salt as antimicrobial agents for food safety. Materials and Methods— Cladosporium cladosporioides NBRC 30314, Penicillium pinophilum NBRC 6345, Aspergillus oryzae (Akita Konno store), Rhizopus oryzae NBRC 4716, Fusarium oxysporum NBRC 31631, Escherichia coli NBRC 3972, Bacillus subtilis NBRC 3335, Staphylococcus aureus NBRC 12732, Pseudomonas aenuginosa NBRC 13275 and Serratia marcescens NBRC 102204 were chosen as tested fungi and bacteria. Hartmannella vermiformis NBRC 50599 and Acanthamoeba castellanii NBRC 30010 were chosen as tested amoeba. Nine fatty acid salts including potassium caprate (C10K) and laurate (C12K) at 350 mM and pH 10.5 were used as antifungal activity. The spore suspension of each fungus (3.0×10⁴ spores/mL) or the bacterial suspension (3.0×10⁵ or 3.0×10⁶ or 3.0×10⁷ CFU/mL) was mixed with each of the fatty acid salts (final concentration of 175 mM). Samples were counted at 0, 10, 60, and 180 min by plating (100 µL) on potato dextrose agar or nutrient agar. Fungal and bacterial colonies were counted after incubation for 1 or 2 days at 30 °C. Results— C10K was antifungal activity of 4 log-unit incubated time for 10 min against fungi other than A. oryzae. C12K was antifungal activity of 4 log-unit incubated time for 10 min against fungi other than P. pinophilum and A. oryzae. C10K and C12K did not show high anti-yeast activity. C10K was antibacterial activity of 6 or 7 log-unit incubated time for 10 min against bacteria other than B. subtilis. C12K was antibacterial activity of 5 to 7 log-unit incubated time for 10 min against bacteria other than S. marcescens. C12K was anti-amoeba activity of 4 log-unit incubated time for 10 min against H. vermiformis. These results suggest C10K and C12K have potential in the field of food safety.Keywords: food safety, microbes, antimicrobial, fatty acid salts
Procedia PDF Downloads 485735 Disaster and Emergency Management in Nigeria: The Case of Chibok School Girls Abducted by Boko Haram Insurgents
Authors: Aidelunuoghene Sunday Ojeifo
Abstract:
More than a decade ago, the Islamist Terrorist group called Boko Haram has caused terrible violence in the north-eastern part of Nigeria. The group’s use of suicide attacks is a dreadful trait of international terrorist violence. It is certainly not in doubt that Boko Haram is the biggest headache of the Nigerian Government right now. The objective of this paper is to answer four fundamental questions about the extremist group: Who is Boko Haram? Why does the group rebel? How has the Nigerian state responded to the emergency and disaster in which more than 200 schoolgirls were abducted from their school in Chibok? Is there any assistance from other nations of the world to help Nigeria out of the grips of this cruel dilemma?Keywords: Boko Haram, disaster, hazards, vulnerability, insurgents
Procedia PDF Downloads 381734 Deployment of Armed Soldiers in European Cities as a Source of Insecurity among Czech Population
Authors: Blanka Havlickova
Abstract:
In the last ten years, there are growing numbers of troops with machine guns serving on streets of European cities. We can see them around government buildings, major transport hubs, synagogues, galleries and main tourist landmarks. As the main purpose of armed soldier’s presence in European cities authorities declare the prevention of terrorist attacks and psychological support for tourists and domestic population. The main objective of the following study is to find out whether the deployment of armed soldiers in European cities has a calming and reassuring effect on Czech citizens (if the presence at armed soldiers make the Czech population feel more secure) or rather becomes a stress factor (the presence of soldiers standing guard in full military fatigues recalls serious criminality and terrorist attacks which are reflected in the fears and insecurity of Czech population). The initial hypothesis of this study is connected with the priming theory, the idea that when we are exposed to an image (armed soldier), it makes us unconsciously focus on a topic connected with this image (terrorism). This paper is based on a quantitative public survey, which was carried out in the form of electronic questioning among the citizens of the Czech Republic. Respondents answered 14 questions about two European cities – London and Paris. Besides general questions investigating the respondents' awareness of these cities, some of the questions focused on the fear that the respondents had when picturing themselves leaving next Monday for the given city (London or Paris). The questions asking about respondent´s travel fears and concerns were accompanied by different photos. When answering the question about fear some respondents have been presented with a photo of Westminster Palace and the Eiffel with ordinary citizens while other respondents have been presented with a picture of the Westminster Palace, the and Eiffel's tower not only with ordinary citizens, but also with one soldier holding a machine gun. The main goal of this paper is to analyse and compare data about concerns for these two groups of respondents (presented with different pictures) and find out if and how an armed soldier with a machine gun in front of the Westminster Palace or the Eiffel Tower affects the public's concerns about visiting the site. In other words, the aim of this paper is to confirm or rebut the hypothesis that the look at a soldier with a machine gun in front of the Eiffel Tower or the Westminster Palace automatically triggers the association with a terrorist attack leading to an increase in fear and insecurity among Czech population.Keywords: terrorism, security measures, priming, risk perception
Procedia PDF Downloads 250733 Aerodynamic Effects of Ice and Its Influences on Flight Characteristics of Low Speed Unmanned Aerial Vehicles
Authors: I. McAndrew, K. L. Witcher, E. Navarro
Abstract:
This paper presents the theory and application of low-speed flight for unmanned aerial vehicles when subjected to surface environmental conditions such as ice on the leading edge and upper surface. A model was developed and tested in a wind tunnel to see how theory compares with practice at various speed including take-off, landing and operational applications where head winds substantially alter parameters. Furthermore, a comparison is drawn with maned operations and how that this subject is currently under-supported with accurate theory or knowledge for designers or operators to make informed decision or accommodate individual applications. The effects of ice formation for lift and drag are determined for a range of different angles of attacks.Keywords: aerodynamics, environmental influences, glide path ratio, unmanned vehicles
Procedia PDF Downloads 329