Search results for: mutual vulnerability
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1142

Search results for: mutual vulnerability

572 Challenges and Opportunities of Utilization of Social Media by Business Education Students in Nigeria Universities

Authors: Titus Amodu Umoru

Abstract:

The global economy today is full of sophistication. All over the world, business and marketing practices are undergoing an unprecedented transformation. In realization of this fact, the federal government of Nigeria has put in place a robust transformation agenda in order to put Nigeria in a better position to be a competitive player and in the process transform all sectors of its economy. New technologies, especially the internet, are the driving force behind this transformation. However, technology has inadvertently affected the way businesses are done thus necessitating the acquisition of new skills. In developing countries like Nigeria, citizens are still battling with effective application of those technologies. Obviously, students of business education need to acquire relevant business knowledge to be able to transit into the world of work on graduation from school and compete favourably in the labour market. Therefore, effective utilization of social media by both teachers and students can help extensively in empowering students with the needed skills. Social media which is described as a group of internet-based applications that build on the ideological foundations of Web 2.0, and which allow the creation and exchange of user-generated content, if incorporated into the classroom experience may be the needed answer to unemployment and poverty in Nigeria as beneficiaries can easily connect with existing and potential enterprises and customers, engage with them and reinforce mutual business benefits. Challenges and benefits of social media use in education in Nigeria universities were revealed in this study.

Keywords: business education, challenges, opportunities, utilization, social media

Procedia PDF Downloads 396
571 Cardiokey: A Binary and Multi-Class Machine Learning Approach to Identify Individuals Using Electrocardiographic Signals on Wearable Devices

Authors: S. Chami, J. Chauvin, T. Demarest, Stan Ng, M. Straus, W. Jahner

Abstract:

Biometrics tools such as fingerprint and iris are widely used in industry to protect critical assets. However, their vulnerability and lack of robustness raise several worries about the protection of highly critical assets. Biometrics based on Electrocardiographic (ECG) signals is a robust identification tool. However, most of the state-of-the-art techniques have worked on clinical signals, which are of high quality and less noisy, extracted from wearable devices like a smartwatch. In this paper, we are presenting a complete machine learning pipeline that identifies people using ECG extracted from an off-person device. An off-person device is a wearable device that is not used in a medical context such as a smartwatch. In addition, one of the main challenges of ECG biometrics is the variability of the ECG of different persons and different situations. To solve this issue, we proposed two different approaches: per person classifier, and one-for-all classifier. The first approach suggests making binary classifier to distinguish one person from others. The second approach suggests a multi-classifier that distinguishes the selected set of individuals from non-selected individuals (others). The preliminary results, the binary classifier obtained a performance 90% in terms of accuracy within a balanced data. The second approach has reported a log loss of 0.05 as a multi-class score.

Keywords: biometrics, electrocardiographic, machine learning, signals processing

Procedia PDF Downloads 124
570 Indonesia’s Defense Diplomacy Strength Towards China’s Aggressive Maritime Policy

Authors: Pangihutan Panjaitan, Helda Risman, Devindra Oktaviano

Abstract:

This research is departed from the security issues generated from China’s unilateral claims in the South China Sea conflict. The diplomacy challenges come from Indonesia’s relations with China as well as with ASEAN-member countries involved in the conflict. It is estimated that the conflict in the South China Sea region will become an endless conflict. Comprehensively, Indonesia is implementing a gradual shift in diplomatic approach in creating positive and constructive ties among Indonesia, China, and ASEAN. In line with the rapid-changing world order, the conventional military approach becomes less significant in today’s modern inter-state interactions. This research is conducted in a qualitative literature review to explain how Indonesia’s recent soft diplomacy approach applied in the South China Sea conflict. This type of diplomacy theoretically assumed as one of the most preferred ways to establish mutual trust and confidence among conflicting parties. Maritime issues found its significance in contemporary foreign policy since the world’s most dynamic region has moved to the archipelagic Asia-Pacific. As mentioned by rationalists, every country, including Indonesia, has surely formulated its own prominent national interest, such as the defense aspect. Finally, this research will provide a deep analysis on Indonesia’s centrality in ASEAN as an effective way to ensure Indonesia’s strategic policy in the region well accommodated.

Keywords: soft diplomacy, south China sea, national defense, China

Procedia PDF Downloads 141
569 A Unique Professional Development of Teacher Educators: Teaching Colleagues

Authors: Naomi Weiner-Levy

Abstract:

The Mofet Institute of Research, established a School of Professional Development, the only one of its kind in Israel and throughout the world. It offers specialized programs for teacher educators, providing them with the professional knowledge and skills. The studies aim at updating teachers about rapidly changing knowledge and skills. Teacher educators are conceptualized as shifting from first order practitioners (school teachers) to second order practitioners. Those who train teachers are referred to as third order practitioners. The instructors in the School of Professional Development are third-order practitioners – teacher educators specializing in teaching their colleagues. Collegial guidance by teachers’ college staff members is no simple task: Tutors must be expert in their field of specialization, as well as in instruction. Moreover, although colleagues, they have to position themselves within the group as authoritative figures in terms of instruction and knowledge. To date, the role and professional identity of these third-order practitioners, has not been studied. To understand the nature and development of professional identity, a qualitative study was conducted in which 12 tutors of various subjects were interviewed. These were analyzed by categorical content analysis. The findings, assessed professional identity through a post-modern prism, while examining the interplay among events that tutors experienced, the knowledge they acquired and the structuring of their professional identity. The Tutors’ identity transformed through negotiating with ‘self’ and ‘other’ in the class, and constructed by their mutual experiences as tutors and learners. Understanding the function and identity of tutors facilitates comprehension of this unique training process for teacher educators.

Keywords: professional development, professional identity, teacher education, tutoring

Procedia PDF Downloads 206
568 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 325
567 Fragility Assessment for Vertically Irregular Buildings with Soft Storey

Authors: N. Akhavan, Sh. Tavousi Tafreshi, A. Ghasemi

Abstract:

Seismic behavior of irregular structures through the past decades indicate that the stated buildings do not have appropriate performance. Among these subjects, the current paper has investigated the behavior of special steel moment frame with different configuration of soft storey vertically. The analyzing procedure has been evaluated with respect to incremental dynamic analysis (IDA), and numeric process was carried out by OpenSees finite element analysis package. To this end, nine 2D steel frames, with different numbers of stories and irregularity positions, which were subjected to seven pairs of ground motion records orthogonally with respect to Ibarra-Krawinkler deterioration model, have been investigated. This paper aims at evaluating the response of two-dimensional buildings incorporating soft storey which subjected to bi-directional seismic excitation. The IDAs were implemented for different stages of PGA with various ground motion records, in order to determine maximum inter-storey drift ratio. According to statistical elements and fracture range (standard deviation), the vulnerability or exceedance from above-mentioned cases has been examined. For this reason, fragility curves for different placement of soft storey in the first, middle and the last floor for 4, 8, and 16 storey buildings have been generated and compared properly.

Keywords: special steel moment frame, soft storey, incremental dynamic analysis, fragility curve

Procedia PDF Downloads 329
566 Vulnerability of Indian Agriculture to Climate Change: A Study of the Himalayan Region State

Authors: Rajendra Kumar Isaac, Monisha Isaac

Abstract:

Climate variability and changes are the emerging challenges for Indian agriculture with the growing population to ensure national food security. A study was conducted to assess the Climatic Change effects in medium to low altitude areas of the Himalayan region causing changes in land use and cereal crop productivity with the various climatic parameters. The rainfall and temperature changes from 1951 to 2013 were studied at four locations of varying altitudes, namely Hardwar, Rudra Prayag, Uttar Kashi and Tehri Garwal. It was observed that there is noticeable increment in temperature on all the four locations. It was surprisingly observed that the mean rainfall intensity of 30 minutes duration has increased at the rate of 0.1 mm/hours since 2000. The study shows that the combined effect of increasing temperature, rainfall, runoff and urbanization at the mid-Himalayan region is causing an increase in various climatic disasters and changes in agriculture patterns. A noticeable change in cropping patterns, crop productivity and land use change was observed. Appropriate adaptation and mitigation strategies are necessary to ensure that sustainable and climate-resilient agriculture. Appropriate information is necessary for farmers, as well as planners and decision makers for developing, disseminating and adopting climate-smart technologies.

Keywords: climate variability, agriculture, land use, mitigation strategies

Procedia PDF Downloads 251
565 A Study on Social and Economic Conditions of Street Vendors Using Field Survey Data

Authors: Ruchika Yadav

Abstract:

Street vendors are the integral component of urban economies of the world. They are the distributors of affordable goods and services and provide convenient and accessible retail options to the customers and form a vital part of the social and economic life of a city. A street vendor as an occupation existed for hundreds of years and considered to be as a cornerstone of many cities. In this paper, our objective is to analyze the socio-economic profile of street vendors, identification of their problems and to suggest remedial measures for the betterment based on the observation and suggestions of the street vendors. To conduct this study, primary data has been collected with the help of field survey and direct questionnaire to the respondents in Aligarh City which contains all the information relevant to social and economic conditions. The overall analysis of this study reveals street vendors are the backward sections of the society possess medium to the low-level standard of living due to illiteracy; their working environment and social security issues are not addressed properly. They are unaware of many of the governmental schemes launched for poverty alleviation and their poor accessibility in basic amenities leads to the backward socio-economic status in the society. The results found in this study can be very useful and helping tool for the policymakers to know the socio-economic conditions of the street vendors in detail.

Keywords: abject poverty, socio-economic conditions, street vendors, vulnerability

Procedia PDF Downloads 117
564 Prospects for Sustainable Chemistry in South Africa: A Plural Healthcare System

Authors: Ntokozo C. Mthembu

Abstract:

The notion of sustainable chemistry has become significant in the discourse for a global post-colonial era, including South Africa, especially when it comes to access to the general health system and related policies in relation to disease or ease of human life. In view of the stubborn vestiges of coloniality in the daily lives of indigenous African people in general, the fundamentals of present Western medical and traditional medicine systems and related policies in the democratic era were examined in this study. The situation of traditional healers in relation to current policy was also reviewed. The advent of democracy in South Africa brought about a variety of development opportunities and limitations, particularly with respect to indigenous African knowledge systems such as traditional medicine. There were high hopes that the limitations of previous narrow cultural perspectives would be rectified in the democratic era through development interventions, but some sections of society, such as traditional healers, remain marginalised. The Afrocentric perspective was explored in dissecting government interventions related to traditional medicine. This article highlights that multiple medical systems should be adopted and that health policies should be aligned in order to guarantee mutual respect and to address the remnants of colonialism in South Africa, Africa and the broader global community.

Keywords: traditional healing system, healers, pluralist healthcare system, post-colonial era

Procedia PDF Downloads 134
563 When Women Take the Lead: Exploring the Intersection Between Gender Equality and Women’s Environmental Political Engagement from a Comparative Perspective

Authors: Summer Isaacson

Abstract:

Research on gender differences in environmental behavior has long claimed that women engage less than men in environmental political participation (EPP) (protests, petitions), despite their higher levels of environmental concern and vulnerability. Using recent data from the ISSP’s 2020 Environment module including 28 countries, we revisit the gender gap in EPP. Arguing that increasing gender equality and socio-economic development can allow women to voice their environmental grievances, we use multi-level models to examine the effects of macro-level gender equality on gender differences in environmental protests, petitions, and boycotts. By distinguishing individual from collective and non-confrontational from confrontational engagement forms, this study offers an encompassing understanding of gendered patterns of participation. Women do participate more than men, but mainly in individual and non-confrontational EPP forms (petitions, boycotts) and with substantial variation across countries. Moreover, considering how women have historically been restrained from participating in politics, we argue that structural gender inequality remains an important limitation to women’s engagement. Cross-level interactions indicate that in more egalitarian countries, women are more likely to engage in several types of EPP than men. The study offers new perspectives and findings on gender differences in EPP, highlighting the impact of gender inequality on women’s participation.

Keywords: environmental activism, political participation, gender equality, pro-environmental behavior

Procedia PDF Downloads 36
562 Sustainability in Hospitality: An Inevitable Necessity in New Age with Big Environmental Challenges

Authors: Majid Alizadeh, Sina Nematizadeh, Hassan Esmailpour

Abstract:

The mutual effects of hospitality and the environment are undeniable, so that the tourism industry has major harmful effects on the environment. Hotels, as one of the most important pillars of the hospitality industry, have significant effects on the environment. Green marketing is a promising strategy in response to the growing concerns about the environment. A green hotel marketing model was proposed using a grounded theory approach in the hotel industry. The study was carried out as a mixed method study. Data gathering in the qualitative phase was done through literature review and In-depth, semi-structured interviews with 10 experts in green marketing using snowball technique. Following primary analysis, open, axial, and selective coding was done on the data, which yielded 69 concepts, 18 categories and six dimensions. Green hotel (green product) was adopted as the core phenomenon. In the quantitative phase, data were gleaned using 384 questionnaires filled-out by hotel guests and descriptive statistics and Structural equation modeling (SEM) were used for data analysis. The results indicated that the mediating role of behavioral response between the ecological literacy, trust, marketing mix and performance was significant. The green marketing mix, as a strategy, had a significant and positive effect on guests’ behavioral response, corporate green image, and financial and environmental performance of hotels.

Keywords: green marketing, sustainable development, hospitality, grounded theory, structural equations model

Procedia PDF Downloads 50
561 Analysis of Factors Used by Farmers to Manage Risk: A Case Study on Italian Farms

Authors: A. Pontrandolfi, G. Enjolras, F. Capitanio

Abstract:

The study analyses the strategies Italian farmers use to cope with the risks that face their production. We specifically explore the potential and the limitations of the economic tools for climatic risk management in agriculture of the Common Agricultural Policy 2014-2020, that foresees contributions for economic tools for risk management, in relation to farms’ needs, exposure and vulnerability of agricultural areas to climatic risk. We consider at the farm level approaches to hedge risks in terms of the use of technical tools (agricultural practices, pesticides, fertilizers, irrigation) and economic/financial instruments (insurances, etc.). We develop cross-sectional and longitudinal analyses as well as analyses of correlation that underline the main differences between the way farms adapt their structure and management towards risk. The results show a preference for technical tools, despite the presence of important public aids on economic tools such as insurances. Therefore, there is a strong need for a more effective and integrated risk management policy scheme. Synergies between economic tools and risk reduction actions of a more technical, structural and management nature (production diversification, irrigation infrastructures, technological and management innovations and formation-information-consultancy, etc.) are emphasized.

Keywords: agriculture and climate change, climatic risk management, insurance schemes, farmers' approaches to risk management

Procedia PDF Downloads 319
560 Real-Time Observation of Concentration Distribution for Mix Liquids including Water in Micro Fluid Channel with Near-Infrared Spectroscopic Imaging Method

Authors: Hiroki Takiguchi, Masahiro Furuya, Takahiro Arai

Abstract:

In order to quantitatively comprehend thermal flow for some industrial applications such as nuclear and chemical reactors, detailed measurements for temperature and abundance (concentration) of materials at high temporal and spatial resolution are required. Additionally, rigorous evaluation of the size effect is also important for practical realization. This paper introduces a real-time spectroscopic imaging method in micro scale field, which visualizes temperature and concentration distribution of a liquid or mix liquids with near-infrared (NIR) wavelength region. This imaging principle is based on absorption of pre-selected narrow band from absorption spectrum peak or its dependence property of target liquid in NIR region. For example, water has a positive temperature sensitivity in the wavelength at 1905 nm, therefore the temperature of water can be measured using the wavelength band. In the experiment, the real-time imaging observation of concentration distribution in micro channel was demonstrated to investigate the applicability of micro-scale diffusion coefficient and temperature measurement technique using this proposed method. The effect of thermal diffusion and binary mutual diffusion was evaluated with the time-series visualizations of concentration distribution.

Keywords: near-infrared spectroscopic imaging, micro fluid channel, concentration distribution, diffusion phenomenon

Procedia PDF Downloads 144
559 Influence of Densification Process and Material Properties on Final Briquettes Quality from FastGrowing Willows

Authors: Peter Križan, Juraj Beniak, Ľubomír Šooš, Miloš Matúš

Abstract:

Biomass treatment through densification is very suitable and important technology before its effective energy recovery. Densification process of biomass is significantly influenced by various technological and also material parameters which are ultimately reflected on the final solid Biofuels quality. The paper deals with the experimental research of the relationship between technological and material parameters during densification of fast-growing trees, roundly fast-rowing willow. The main goal of presented experimental research is to determine the relationship between pressing pressure raw material fraction size from a final briquettes density point of view. Experimental research was realized by single-axis densification. The impact of fraction size with interaction of pressing pressure and stabilization time on the quality properties of briquettes was determined. These parameters interaction affects the final solid biofuels (briquettes) quality. From briquettes production point of view and also from densification machines constructions point of view is very important to know about mutual interaction of these parameters on final briquettes quality. The experimental findings presented here are showing the importance of mentioned parameters during the densification process.

Keywords: briquettes density, densification, fraction size, pressing pressure, stabilization time

Procedia PDF Downloads 350
558 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 44
557 Mitigating Climate Change: Cross-Country Variation in Policy Ambition

Authors: Mohammad Aynal Haque

Abstract:

Under the international cooperation — Paris Agreement — countries outline their self-determined policy ambition for emissions reduction in their Nationally Determined Contributions (NDCs) as a key to addressing climate change globally. Although practically all countries commit themselves to reach the Paris landmark (below 20 C) globally, some act as climate leaders, others behave as followers, and others turn out to be climate laggards. As a result, there is a substantial variation in ‘emissions reduction targets’ across countries. Thus, a question emerges: What explains this variation? Or why do some countries opt for higher while others opt for lower ‘emissions reduction targets toward global mitigation efforts? Conceptualizing the ‘emissions reduction targets by 2030’ outlined in NDCs by each country as the climate policy ambition (CPA), this paper explores how certain national political, economic, environmental, and external factors play vital roles in determining climate policy ambition. Based on the cross-country regression analysis among 168 countries, this study finds that democracy, vulnerability to climate change effects, and foreign direct investment have substantial effects on CPA. The paper also finds that resource capacity has a minimal negative effect on CPA across developed countries.

Keywords: climate change, Paris agreement, international cooperation, political economy, environmental politics, NDCs

Procedia PDF Downloads 58
556 A Conflict of Relations in Toni Morrison’s New World Fiction

Authors: Rajeswar Pal

Abstract:

Toni Morrison’s novels belong to present day relations of Africans with the White peoples and tangible man-woman relations. Her literary criticism can be seen as a contribution to the debate over the revision of the canon that dominated much of the scholarship of the 1980s and 1990s. New Criticism began to give way to theories of cultural studies, feminist scholarship, postcolonial revisions and investigations of race and ethnicity. Morrison is concerned with the definition of the American literature whether it reflects an eternal, universal or transcending paradigm – a paradigm that separates it clearly and unequivocally Chicano or African-American or Asian-American or Native American literature. She sees evidence on an incursion of third world or so-called minority literature into a Eurocentric stronghold, which threatens power structures and leads to an upheaval of existing norms. We see women more aligned, cross-culturally, with nature; however, the very critical distinction is that within a white world, the alignment seems to lead towards individuation for women yet separation from white male culture, and within a black world the alignment leads towards individuation and connection to a ownership of a racial consciousness. Whether externally or internally, the characters of Morrison are marked with a sense of incompleteness and mutual conflict, which drives them towards some force of wholeness. Present study fucusses to elucidate and enunciate the man-woman relations and an individual cataclysmic conflict in their minds.

Keywords: tangible, postcolonial, ethnicity, paradigm, upheaval, alignment, elucidate, cataclysmic

Procedia PDF Downloads 429
555 Demotivation-Reducing Strategies Employed by Turkish EFL Learners in L2 Writing

Authors: kaveh Jalilzadeh, Maryam Rastgari

Abstract:

Motivation for learning a foreign language is needed for learners of any foreign language to effectively learn language skills. However, there are some factors that lead to the learners’ demotivation. Therefore, teachers of foreign languages, most notably English language which turned out to be an international language for academic and business purposes, need to be well aware of the demotivation sources and know how to reduce learners’ demotivation. This study is an attempt to explore demotivation-reducing strategies employed by Turkish EFL learners in L2 writing. The researchers used a qualitative case study and employed semi-structured interviews to collect data. The informants recruited in this study were 20 English writing lecturers who were selected through purposive sampling among university lecturers/instructors at the state and non-state universities in Istanbul and Ankara. Interviews were transcribed verbatim, and MAXQDA software (version 2022) was used for performing coding and thematic analysis of the data. Findings revealed that Turkish EFL teachers use 18 strategies to reduce language learners’ demotivation. The most frequently reported strategies were: writing in a group, writing about interesting topics, writing about new topics, writing about familiar topics, writing about simple topics, and writing about relevant topics. The findings have practical implications for writing teachers and learners of the English language.

Keywords: phenomenological study, emotional vulnerability, motivation, digital Settings

Procedia PDF Downloads 49
554 Altered Network Organization in Mild Alzheimer's Disease Compared to Mild Cognitive Impairment Using Resting-State EEG

Authors: Chia-Feng Lu, Yuh-Jen Wang, Shin Teng, Yu-Te Wu, Sui-Hing Yan

Abstract:

Brain functional networks based on resting-state EEG data were compared between patients with mild Alzheimer’s disease (mAD) and matched patients with amnestic subtype of mild cognitive impairment (aMCI). We integrated the time–frequency cross mutual information (TFCMI) method to estimate the EEG functional connectivity between cortical regions and the network analysis based on graph theory to further investigate the alterations of functional networks in mAD compared with aMCI group. We aimed at investigating the changes of network integrity, local clustering, information processing efficiency, and fault tolerance in mAD brain networks for different frequency bands based on several topological properties, including degree, strength, clustering coefficient, shortest path length, and efficiency. Results showed that the disruptions of network integrity and reductions of network efficiency in mAD characterized by lower degree, decreased clustering coefficient, higher shortest path length, and reduced global and local efficiencies in the delta, theta, beta2, and gamma bands were evident. The significant changes in network organization can be used in assisting discrimination of mAD from aMCI in clinical.

Keywords: EEG, functional connectivity, graph theory, TFCMI

Procedia PDF Downloads 417
553 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 339
552 The Coexistence of Dual Form of Malnutrition among Portuguese Institutionalized Elderly People

Authors: C. Caçador, M. J. Reis Lima, J. Oliveira, M. J. Veiga, M. Teixeira Veríssimo, F. Ramos, M. C. Castilho, E. Teixeira-Lemos

Abstract:

In the present study we evaluated the nutritional status of 214 institutionalized elderly residents of both genders, aged 65 years and older of 11 care homes located in the district of Viseu (center of Portugal). The evaluation was based on anthropometric measurements and the Mini Nutritional Assessment (MNA) score. The mean age of the subjects was 82.3 ± 6.1 years-old. Most of the elderly residents were female (72.0%). The majority had 4 years of formal education (51.9%) and was widowed (74.3%) or married (14.0%). Men presented a mean age of 81.2±8.5 years-old, weight 69.3±14.5 kg and BMI 25.33±6.5 kg/m2. In women, the mean age was 84.5±8.2 years-old, weight 61.2±14.7 kg and BMI 27.43±5.6 kg/m2. The evaluation of the nutritional status using the MNA score showed that 24.0% of the residents show a risk of undernutrition and 76.0% of them were well nourished. There was a high prevalence of obese (24.8%) and overweight residents (33.2%) according to the BMI. 7.5% were considered underweight. We also found that according to their waist circumference measurements 88.3% of the residents were at risk for cardiovascular disease (CVD) and 64.0% of them presented very high risk for CVD (WC≥88 cm for women and WC ≥102 cm for men). The present study revealed the coexistence of a dual form of malnutrition (undernourished and overweight) among the institutionalized Portuguese concomitantly with an excess of abdominal adiposity. The high prevalence of residents at high risk for CVD should not be overlooked. Given the vulnerability of the group of institutionalized elderly, our study highlights the importance of the classification of nutritional status based on both instruments: the BMI and the MNA.

Keywords: nutritional satus, MNA, BMI, elderly

Procedia PDF Downloads 301
551 Duality of Leagility and Governance: A New Normal Demand Network Management Paradigm under Pandemic

Authors: Jacky Hau

Abstract:

The prevalence of emerging technologies disrupts various industries as well as consumer behavior. Data collection has been in the fingertip and inherited through enabled Internet-of-things (IOT) devices. Big data analytics (BDA) becomes possible and allows real-time demand network management (DNM) through leagile supply chain. To enhance further on its resilience and predictability, governance is going to be examined to promote supply chain transparency and trust in an efficient manner. Leagility combines lean thinking and agile techniques in supply chain management. It aims at reducing costs and waste, as well as maintaining responsiveness to any volatile consumer demand by means of adjusting the decoupling point where the product flow changes from push to pull. Leagility would only be successful when collaborative planning, forecasting, and replenishment (CPFR) process or alike is in place throughout the supply chain business entities. Governance and procurement of the supply chain, however, is crucial and challenging for the execution of CPFR as every entity has to walk-the-talk generously for the sake of overall benefits of supply chain performance, not to mention the complexity of exercising the polices at both of within across various supply chain business entities on account of organizational behavior and mutual trust. Empirical survey results showed that the effective timespan on demand forecasting had been drastically shortening in the magnitude of months to weeks planning horizon, thus agility shall come first and preferably following by lean approach in a timely manner.

Keywords: governance, leagility, procure-to-pay, source-to-contract

Procedia PDF Downloads 95
550 Development and Validation of the Response to Stressful Situations Scale in the General Population

Authors: Célia Barreto Carvalho, Carolina da Motta, Marina Sousa, Joana Cabral, Ana Luísa Carvalho, Ermelindo Peixoto

Abstract:

The aim of the current study was to develop and validate a Response to Stressful Situations Scale (RSSS) for the Portuguese population. This scale assesses the degree of stress experienced in scenarios that can constitute positive, negative and more neutral stressors, and also describes the physiological, emotional and behavioral reactions to those events according to their intensity. These scenario include typical stressor scenarios relevant to patients with schizophrenia, which are currently absent from most scale, assessing specific risks that these stressors may bring on subjects, which may prove useful in non-clinical and clinical populations (i.e. patients with mood or anxiety disorders, schizophrenia). Results from Principal Components Analysis and Confirmatory Factor Analysis of on two adult samples from general population allowed to confirm a three-factor model with good fit indices: χ2 (144)= 370.211, p = 0.000; GFI = 0.928; CFI = 0.927; TLI = 0.914, RMSEA = 0.055, P( rmsea ≤ 0.005) = 0.096; PCFI = 0.781. Further data analysis on the scale revealed that RSSS is an adequate assessment tool of stress response in adults to be used in further research and clinical settings, with good psychometric characteristics, adequate divergent and convergent validity, good temporal stability and high internal consistency.

Keywords: assessment, stress events, stress response, stress vulnerability

Procedia PDF Downloads 506
549 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 121
548 Functions of Public Policy in Private International Law

Authors: Fedorova Elena

Abstract:

In this article, we draw a distinction between two important functions of public policy in private international law. The first function is widely recognized and relates to the prevention of application of foreign laws and enforcement of foreign court judgments whenever their effects are incompatible with the domestic legal system of the forum. This effectively protects sovereign rights of the forum state as it allows to resist against the undesirable effects of foreign law-making and law-enforcement policies. The second function is less obvious, but not less important. As the internal private legal relationships, international private relationships are usually governed by rules of public policy, to which the parties can not derogate by mutual agreement. Thefore, for international private law relations public policy has a different function than previously mentioned: in this case, the public policy acts as a defense against unacceptable effects of the party autonomy. Thus, this second function of public policy consists in the limitation of the party autonomy wich effects would be unacceptable for the local legal system. In the frame of this second function the author will analyse two types of public policy which can limit the party autonomy: « substantial » public policy (which regulates the substance of international legal relationship) and « conflictual » public policy (which regulates the party autonomy to choose the law applicable for the substance of relationship). The author provides an analysis of these functions of the public policy in the field of international contract law because of the important role of the principle of party autonomy for international contract relations.

Keywords: public policy, general theory of private international law, substantial public policy, conflictual public policy

Procedia PDF Downloads 555
547 Co-Seismic Surface Deformation Induced By 24 September 2019 Mirpur, Pakistan Earthquake Along an Active Blind Fault Estimated Using Sentinel-1 TOPS Interferometry

Authors: Muhammad Ali, Zeeshan Afzal, Giampaolo Ferraioli, Gilda Schirinzi, Muhammad Saleem Mughal, Vito Pascazio

Abstract:

On 24 September 2019, an earthquake with 5.6 Mw and 10 km depth stroke in Mirpur. The Mirpur area was highly affected by this earthquake, with the death of 34 people. This study aims to estimate the surface deformation associated with this earthquake. The interferometric synthetic aperture radar (InSAR) technique is applied to study earthquake induced surface motion. InSAR data using 9 Sentinel-1A SAR images from 11 August 2019 to 22 October 2019 is used to investigate the pre, co-, and post-seismic deformation trends. Time series investigation reveals that there was not such deformation in pre-seismic time period. In the co-seismic time period, strong displacement was observed, and in post-seismic results, small displacement is seen due to aftershocks. Our results show the existence of a previously unpublished blind fault in Mirpur and help to locate the fault line. Previous this fault line was triggered during the 2005 earthquake, and now it’s activated on 24 September 2019. Study area is already facing many problems due to natural hazards where additional surface deformations, particularly because of an earthquake with an activated blind fault, have increased its vulnerability.

Keywords: surface deformation, InSAR, earthquake, sentinel-1, mirpur

Procedia PDF Downloads 111
546 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 22
545 The Belt and Road Initiative in a Spiderweb of Conflicting Great Power Interests: A Geopolitical Analysis

Authors: Csaba Barnabas Horvath

Abstract:

The Belt and Road initiative of China is one that can change the face of Eurasia as we know it. Instead of four major, densely populated subcontinents defined by Mackinder (East Asia, Europe, the Indian Subcontinent, and the Middle East) isolated from each other by vast, sparsely populated and underdeveloped regions, it can at last start to function as a geographic whole, with a sophisticated infrastructure linking its different parts to each other. This initiative, however, happens not in a geopolitical vacuum, but in a space of conflicting great power interests. In Central Asia, the influence of China and Russia are in a setting of competition, where despite the cooperation between the two powers to a great degree, issues causing mutual mistrust emerge repeatedly. In Afghanistan, besides western military presence, even India’s efforts can be added to the picture. In Southeast Asia, a key region regarding the maritime Silk Road, India’s Act East policy meets with China’s Belt and Road, not always in consensus, not to mention US and Japanese interests in the region. The presentation aims to take an overview on how conflicting great power interests are likely to influence the outcome of the Belt and Road initiative. The findings show, that overall success of the Belt and Road Initiative may not be as smooth, as hoped by China, but at the same time, in a limited number of strategically important countries (such as Pakistan, Laos, and Cambodia), this setting is actually a factor favoring China, providing at least a selected number of reliable corridors, where the initiative is actually likely to be successful.

Keywords: belt and road initiative, geostrategic corridors, geopolitics, great power rivalry

Procedia PDF Downloads 203
544 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 133
543 Lifestyle Diseases in Urban India: A Case Study of Obesity

Authors: Monika Yadav

Abstract:

The incorporation of a healthy lifestyle significantly contributes to the advancement of economic development. Urbanization, industrialization, and economic growth have enhanced living conditions, promoting sedentary behaviours among individuals with elevated socio-economic statuses. The prevalence of overweight and obesity has increased globally, along with the rise in living standards, posing a growing health risk. Overweight and obesity are known to be precursors to a range of modifiable and metabolic risk factors, contributing to the increase in lifestyle diseases. Unhealthy dietary choices and lifestyle practices primarily drive these diseases. Lifestyle diseases refer to chronic and non-communicable illnesses, encompassing conditions such as hypertension, heart disease, kidney disorders, infertility, polycystic ovary syndrome (PCOD), diabetes, respiratory diseases, and certain forms of cancer. This study examines the prevalence of lifestyle diseases among urban Indian women, explicitly differentiating between individuals with normal weight and those classified as obese. The main aim of this study is to investigate whether there is a correlation between a higher body mass index (BMI) in women and an increased vulnerability to lifestyle diseases when compared to women with a normal BMI. This research provides insights into the intricate relationship between lifestyle, health, and economic development within urban areas.

Keywords: urbanization, economic development, BMI, NCDs, urban, women, lifestyle practices

Procedia PDF Downloads 51