Search results for: preventing violence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1458

Search results for: preventing violence

888 Gestational Diabetes Mellitus (GDM) Increasing Postpartum Screening to Prevent T2D

Authors: Boma Nellie S, Nambiar Ritu, K. Kanchanmala, T. Rashida, Israell Imelda, Moul Khusnud, Michael Marina

Abstract:

Gestational diabetes (GDM) imparts an increased life long risk of developing Type 2 Diabetes Mellitus (T2DM) and cardiovascular disease in women. Once diagnosed with GDM women have up to 74% increased cumulative risk developing T2DM in 10-15 years. Identifying women at increased risk of developing T2DM and offering them pharmacological and lifestyle management interventions will delay or eliminate the development of diabetes in this population. While ADA recommends that all gestational diabetics be offered postnatal screening, worldwide the screening rates from 35-75% and Al Rahba Hospital with a robust universal antenatal screening program for GDM was at a dismal 9% in 2011. A multidisciplinary team was put together involving OB/Gyn Physicians, Midwives, Nurses (ward and OPD) Diabetic Educators, Dietitians, Medical Records, Laboratory & IT with the implementation of multiple strategies to increase the uptake of postpartum screening of the gestational diabetic.

Keywords: GDM, postnatal screening, preventing type 2 diabetes, lifestyle management

Procedia PDF Downloads 495
887 Best Perform of Rights and Justice in the Brothel Based Female Sex Worker's Community

Authors: Md. Kabir Azaharul Islam

Abstract:

Background: The purpose of this interventions was to describe the source and extent to increase health seeking rights and uptake of quality integrated maternal health, family planning and HIV information, clinical-non clinical services, and commodities amongst young people age 10-24 among brothel based Female Sex Worker’s in Bangladesh. Such Knowledge will equip with information to develop more appropriate and effective interventions that address the problem of HIV/AIDS and SRHR within the brothel based female sex worker’s community. Methods: Before start the intervention we observed situation in brothel and identify lack of knowledge about health issues, modern health facility, sexual harassment and violence & health rights. To enable access to the intervention obtained permission from a series of stakeholders within the brothel system. This intervention to the most vulnerable young key people during January 2014 to December, 2015, it designed an intervention that focuses on using peer education and sensitization meeting with self help group leader’s, pimbs, swardarni, house owner, local leaders, law enforcement agencies and target young key people (YKPs) through peer educator’s distributed BCC materials and conducted one to one and group session issues of HIV/AIDS, life skill education, maternal health, sexual reproductive health & rights, gender based violence, STD/STI and drug users in the community. Set up community based satellite clinic to provided clinical-non clinical services and commodities for SRH, FP and HIV including general health among brothel based FSWs. Peer educator frequently move and informed target beneficiaries’ age 10-24 YKPs about satellite clinic as well as time & date in the community. Results: This intervention highly promotes of brothel based FSW utilization of local facility based health providers private and public health facilities.2400 FSWs age 10-24 received information on SRHR, FP and HIV as well as existing health facilities, most of FSWs to received service from traditional healer before intervention. More than 1080 FSWs received clinical-non clinical services and commodities from satellite clinic including 12 ANC, 12 PNC and 25 MR. Most of young FSW age 10-24 are treated bonded girls under swardarni, house owner and pimbs, they have no rights to free movement as per need. As a result, they have no rights for free movement. However the brothel self help group (SHG) has become sensitized flowing this intervention. Conclusions: The majority of female sex workers well being regarding information on SRHR, FP and HIV as well as local health facilities now they feel free to go outside facilities for better health service. not only increased FSWs’ vulnerability to HIV infection and sexual reproductive health rights but also had huge implications for their human rights. This means that even when some clients impinged FSW’s rights (for example avoiding payment for services under the pretext of dissatisfaction), they might not be able to seek redress for fear of being ejected from the brothel. They raise voice national & local level different forum.

Keywords: ANC, HIV, PNC, SRHR

Procedia PDF Downloads 308
886 A Rare Atypical Presentation of Iichthyosis Follicularis, Alopecia, and Photophobia Syndrome

Authors: D. R. Apoorva

Abstract:

Ichthyosis follicularis, alopecia, and photophobia (IFAP) syndrome is a rare oculocutaneous disorder of genetic origin. This disorder results from mutations in the membrane-bound transcription factor protease site, two genes that impair cholesterol homeostasis, and the ability to cope with endoplasmic reticulum stress. We report a rare case of IFAP syndrome with an atypical presentation, and it was interesting to note that the child had patchy non-scarring alopecia over the scalp along with unilateral madarosis. To our best knowledge, this unique presentation has not been described earlier. The child presented with photophobia and unilateral ptosis. The child also had short stature and intellectual disability. Skin histopathology was nonspecific and consisted of dilated hair follicles with keratin plugs extending above the skin surface. This rare oculocutaneous disorder requires proper documentation so that identification of its variants may be possible in the future. Early recognition of atypical presentations can help in preventing cardiovascular complications, which remain the major cause of death.

Keywords: alopecia, photophobia, ichthyosis follicularis, IFAP syndrome

Procedia PDF Downloads 54
885 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses

Authors: Pooja Bakshi

Abstract:

In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.

Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia

Procedia PDF Downloads 479
884 Understanding Psychological Distress and Protection Issues among Children Associated with Armed Groups

Authors: Grace Onubedo

Abstract:

The primary objective of this research study is to contribute to and deepen the understanding of the realities and conditions for which children recruited by violent extremist organisations in Nigeria live, as well as ascertain the state of their mental health following their reunification with either family or protection workers. The research is intended to contribute to a more focused child protection programming agenda for children associated with armed forces and groups in Nigeria and the wider conflict setting. The extent to which violence has affected the psychological well-being and mental health of children abducted and exposed to activities of Violent Extremist groups remains a largely empirical question. This research attempts to answer the following research questions with the aim of providing further evidences for informed programming: I. What are the demographic characteristics of children associated with armed groups? II. What is the state of their mental health? III. What is the relationship between their background and their mental health?

Keywords: counterterrorism, psychosocial support, psychological distress, children, armed groups

Procedia PDF Downloads 103
883 Social Awareness and Praxical Knowledge

Authors: F. Saptouw, L. Reddy

Abstract:

Tertiary institutions are often faced with a challenge when incorporating social awareness into course content. The information campaigns in the media often alienate the viewers and the knowledge is not readily assimilated into the students’ consciousness. This paper will present a discussion of the results of collaborative teaching projects run by the Michaelis School of fine art and the HIV/AIDS, Inclusivity and Change Unit (HAICU) at the University of Cape Town. In these projects the artistic process is employed to generate ‘praxical knowledge’ in the student body about socially relevant issues like HIV-AIDS, Gender-Based Violence (GBV) and sexual identity, specifically LGBTQI. The combination of lectures, group discussions and the creative process has been a very successful way to disseminate information amongst the student population. Evidence of the project’s success will be provided by referencing interviews, focus groups as well as surveys done with the participants. This paper will conclude by arguing for the positive role of practice-led research in developing a socially conscious public.

Keywords: art, education, HIV-AIDS, practice-led research

Procedia PDF Downloads 298
882 Forced Migrants in Israel and Their Impact on the Urban Structure of Southern Neighborhoods of Tel Aviv

Authors: Arnon Medzini, Lilach Lev Ari

Abstract:

Migration, the driving force behind increased urbanization, has made cities much more diverse places to live in. Nearly one-fifth of all migrants live in the world’s 20 largest cities. In many of these global cities, migrants constitute over a third of the population. Many of contemporary migrants are in fact ‘forced migrants,’ pushed from their countries of origin due to political or ethnic violence and persecution or natural disasters. During the past decade, massive numbers of labor migrants and asylum seekers have migrated from African countries to Israel via Egypt. Their motives for leaving their countries of origin include ongoing and bloody wars in the African continent as well as corruption, severe conditions of poverty and hunger, and economic and political disintegration. Most of the African migrants came to Israel from Eritrea and Sudan as they saw Israel the closest natural geographic asylum to Africa; soon they found their way to the metropolitan Tel-Aviv area. There they concentrated in poor neighborhoods located in the southern part of the city, where they live under conditions of crowding, poverty, and poor sanitation. Today around 45,000 African migrants reside in these neighborhoods, and yet there is no legal option for expelling them due to dangers they might face upon returning to their native lands. Migration of such magnitude to the weakened neighborhoods of south Tel-Aviv can lead to the destruction of physical, social and human infrastructures. The character of the neighborhoods is changing, and the local population is the main victim. These local residents must bear the brunt of the failure of both authorities and the government to handle the illegal inhabitants. The extremely crowded living conditions place a heavy burden on the dilapidated infrastructures in the weakened areas where the refugees live and increase the distress of the veteran residents of the neighborhoods. Some problems are economic and some stem from damage to the services the residents are entitled to, others from a drastic decline in their standard of living. Even the public parks no longer serve the purpose for which they were originally established—the well-being of the public and the neighborhood residents; they have become the main gathering place for the infiltrators and a center of crime and violence. Based on secondary data analysis (for example: The Israel’s Population, Immigration and Border Authority, the hotline for refugees and migrants), the objective of this presentation is to discuss the effects of forced migration to Tel Aviv on the following tensions: between the local population and the immigrants; between the local population and the state authorities, and between human rights groups vis-a-vis nationalist local organizations. We will also describe the changes which have taken place in the urban infrastructure of the city of Tel Aviv, and discuss the efficacy of various Israeli strategic trajectories when handling human problems arising in the marginal urban regions where the forced migrant population is concentrated.

Keywords: African asylum seekers, forced migrants, marginal urban regions, urban infrastructure

Procedia PDF Downloads 230
881 Unforeseen Inequity: Childhood Sexual Abuse in Aotearoa, New Zealand

Authors: Nicola Harrison

Abstract:

Familial childhood sexual abuse (FCSA) prevalence rates in Aotearoa, New Zealand, are amongst the highest globally, particularly in indigenous communities. However, such statistics seem incongruent with indigenous paradigms of unity, care, and connection. The inability of policymakers and mainstream service providers to acknowledge the direct links between the social contexts created by colonisation for indigenous families in Aotearoa and intergenerational FCSA has meant there has been little meaningful success in combatting this significant social problem. This research traces the conditions of intergenerational FCSA to the systemic inequalities created by colonization. Kaupapa Māori methodologies were applied to this qualitative piece of empirical research wherein 17 indigenous contributors shared their stories of FCSA. From these stories and existing literature, we can identify how the machinations of colonisation are mirrored by techniques used to perpetrate abuse. Once identified, we are then able to recommend actions for halting FCSA for future generations.

Keywords: indigenity, family violence, childhood sexual abuse, colonization

Procedia PDF Downloads 107
880 The Lubrication Regimes Recognition of a Pressure-Fed Journal Bearing by Time and Frequency Domain Analysis of Acoustic Emission Signals

Authors: S. Hosseini, M. Ahmadi Najafabadi, M. Akhlaghi

Abstract:

The health of the journal bearings is very important in preventing unforeseen breakdowns in rotary machines, and poor lubrication is one of the most important factors for producing the bearing failures. Hydrodynamic lubrication (HL), mixed lubrication (ML), and boundary lubrication (BL) are three regimes of a journal bearing lubrication. This paper uses acoustic emission (AE) measurement technique to correlate features of the AE signals to the three lubrication regimes. The transitions from HL to ML based on operating factors such as rotating speed, load, inlet oil pressure by time domain and time-frequency domain signal analysis techniques are detected, and then metal-to-metal contacts between sliding surfaces of the journal and bearing are identified. It is found that there is a significant difference between theoretical and experimental operating values that are obtained for defining the lubrication regions.

Keywords: acoustic emission technique, pressure fed journal bearing, time and frequency signal analysis, metal-to-metal contact

Procedia PDF Downloads 133
879 Efficient Rehearsal Free Zero Forgetting Continual Learning Using Adaptive Weight Modulation

Authors: Yonatan Sverdlov, Shimon Ullman

Abstract:

Artificial neural networks encounter a notable challenge known as continual learning, which involves acquiring knowledge of multiple tasks over an extended period. This challenge arises due to the tendency of previously learned weights to be adjusted to suit the objectives of new tasks, resulting in a phenomenon called catastrophic forgetting. Most approaches to this problem seek a balance between maximizing performance on the new tasks and minimizing the forgetting of previous tasks. In contrast, our approach attempts to maximize the performance of the new task, while ensuring zero forgetting. This is accomplished through the introduction of task-specific modulation parameters for each task, and only these parameters are learned for the new task, after a set of initial tasks have been learned. Through comprehensive experimental evaluations, our model demonstrates superior performance in acquiring and retaining novel tasks that pose difficulties for other multi-task models. This emphasizes the efficacy of our approach in preventing catastrophic forgetting while accommodating the acquisition of new tasks.

Keywords: continual learning, life-long learning, neural analogies, adaptive modulation

Procedia PDF Downloads 49
878 The Economic Implications of Cryptocurrency and Its Potential to Disrupt Traditional Financial Systems as a Store of Value

Authors: G. L. Rithika, Arvind B. S., Akash R., Ananda Vinayak, Hema M. S.

Abstract:

Cryptocurrencies were first launched in the year 2009 and have been a great asset to own. Cryptocurrencies are a representation of a completely distinct decentralization model for money. They also contribute to the elimination of currency monopolies and the liberation of money from control. The fact that no government agency can determine a coin's value or flow is what cryptocurrency advocates believe makes them safe and secure. The aim of this paper is to analyze the economic implications of cryptocurrency and how it would disrupt traditional financial systems. This paper analyses the growth of Cryptocurrency over the years and the potential threats of cryptocurrency to financial systems. Our analysis shows that although the DeFi design, like the traditional financial system, may have the ability to lower transaction costs, there are multiple layers where rents might build up because of endogenous competition limitations. The permissionless and anonymous design of DeFi poses issues for ensuring tax compliance, anti-money laundering laws and regulations, and preventing financial misconduct.

Keywords: cryptocurrencies, bitcoin, blockchain technology, traditional financial systems, decentralisation, regulatory framework

Procedia PDF Downloads 24
877 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 312
876 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 58
875 Preventing Farmer-Herder Conflicts in Ghana: A Constellation of Local Strategies and Solutions

Authors: Abdulai Abubakari

Abstract:

The rollercoaster relationship between farmers and herders in Sub-Saharan Africa has compelled most governments to undertake different mitigating strategies. Over the past two decades, the expulsion of migrant herdsmen, the killing of cattle and human beings, and fines have been used by the state and aggrieved individuals to resolve the conflicts. Unlike this paper, most of the research conducted on this subject matter has been largely theoretical and lacks practical solutions to the conflicts. This paper is unique because it focuses on concrete strategies and practical solutions to ending the century-old phenomenon of farmer-herder conflicts in Ghana. The paper employed power or compete (fight) theory as well as compromise and negotiation theories in the analyses. The paper employed, basically, socio-anthropological methods: interviews, focus group discussions, and observations to gather data. The paper found that compromises through negotiation with the stakeholders are the best ways of resolving these conflicts. Through this, we support the compromise and negotiation approach rather than expulsion to resolve farmer-herder conflicts.

Keywords: farmer-herder, conflict, prevention, strategies, stakeholders

Procedia PDF Downloads 28
874 Predictors and Prevention of Sports’ Injuries among Male Professional Footballers in Nigeria

Authors: Timothy A. Oloyede

Abstract:

The study assessed the influence of playing field, climatic conditions, rate of exposure to matches, skill level and competition level on the occurrence and severity of football injuries. The prospective outline of the study was as follows: after a baseline examination and measurements were performed ascertaining possible predictors of injury, all players were followed up weekly for one year to register subsequent injuries and complaints. Four hundred and thirty-five out of 455 subjects completed the weekly follow-ups over one year. Multiple regression analysis was employed to analyse the data collected. Results showed that playing field, climatic conditions, rate of exposure to matches skill level and competition level were predictors of injuries among the professional footballer. Playing on natural grass, acclimatization, reduction of physical overload, among others, were strategies postulated for preventing injuries.

Keywords: sports’ injuries, predictors of sports’ injuries, intrinsic risk factors, extrinsic risk factors, injury mechanism, professional footballer

Procedia PDF Downloads 234
873 A Step-by-Step Analytical Protocol For Detecting and Identifying Minor Differences In Like Materials and Polymers Using Pyrolysis -Gas Chromatography/Mass Spectrometry Technique

Authors: Athena Nguyen, Rojin Belganeh

Abstract:

Detecting and identifying differences in like polymer materials are key factors in failure and deformulation analysis, and reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. In this presentation, the analysis of the differences in three polystyrene samples is demonstrated. Although the three samples look very similar by Evolve gas analysis (EGA) and Flash pyrolysis, there are indications of small levels of other materials. By performing Thermal desorption-GC/MS, the additive compounds between samples show the differences. EGA, flash pyrolysis, and thermal desorption analysis are the different modes of operations of the micro-furnace pyrolyzer enabling users to perform multiple analytical techniques.

Keywords: Gas chromatography/Mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS

Procedia PDF Downloads 161
872 Does Stock Markets Asymmetric Information Affect Foreign Capital Flows?

Authors: Farid Habibi Tanha, Mojtaba Jahanbazi, Morteza Foroutan, Rasidah Mohd Rashid

Abstract:

This paper depicts the effects of asymmetric information in determining capital inflows to be captured through stock market microstructure. The model can explain several stylized facts regarding the capital immobility. The first phase of the research involves in collecting and refining 150,000,000 daily data of 11 stock markets over a period of one decade in an effort to minimize the impact of survivorship bias. Three micro techniques were used to measure information asymmetries. The final phase analyzes the model through panel data approach. As a unique contribution, this research will provide valuable information regarding negative effects of information asymmetries in stock markets on attracting foreign investments. The results of this study can be directly considered by policy makers to monitor and control changes of capital flow in order to keep market conditions in a healthy manner, by preventing and managing possible shocks to avoid sudden reversals and market failures.

Keywords: asymmetric information, capital inflow, market microstructure, investment

Procedia PDF Downloads 298
871 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 223
870 Antimicrobial Effect of Natamycin against Food Spoilage Fungi and Yeast Contaminated Fermented Foods

Authors: Pervin Basaran Akocak

Abstract:

Food antimicrobials are compounds that are incorporated into food matrixes in order to cause death or delay the growth of spoilage or pathogenic microorganisms. As a result, microbiological deterioration is prevented throughout storage and food distribution. In this study, the effect of natural antimycotic natamycin (C33H47NO13, with a molecular mass of 665.725), a GRAS (Generally Recognized As Safe) commercial compound produced by different strains of Streptomyces sp., was tested against various fermented food contamination fungi and yeast species. At the concentration of 100 µg/ml, natamycin exhibited stronger antifungal activity against fungi than yeast species tested. The exposure time of natamycin for complete inhibition of the species tested were found to be between 100-180 min at 300-750 µg/ml concentration. SEM observations of fungal species demonstrated that natamycin distorted and damaged the conidia and hyphae by inhibiting spore germination and mycelial growth. Natamycin can be considered as a potential candidate in hurdle food treatments for preventing fungal and yeast invasion and resulting deterioration of fermented products.

Keywords: natamycin, antifungal, fermented food, food spoilage fungi

Procedia PDF Downloads 492
869 A Framework for Systemically Understanding and Increasing Compliance with Water Regulation in Time Limited and Uncertain Contexts

Authors: Luisa Perez-Mujica

Abstract:

Traditionally, non-compliance in water regulation has been understood to be attributable to lack of information or knowledge of regulations. In other words, it is confusing behavioural change and education with communication or regulations. However, compliance is a complex response to water regulation factors including 1) knowledge and understanding of regulations; 2) perception that resources are overregulated; 3) presence of regulatory officers in the field; 4) accurate communication of what is being protected; 5) time lag between behavioral change projects and observation of outcomes and 6) how success of behavioral change is measured and evaluated. This paper presents a framework for designing education and behavioral change projects by understanding non-compliance in terms of the interaction of its factors, including a process for prioritizing projects, actions, evaluation and monitoring of outcomes. By taking a systemic approach to compliance, a more directed type of actions can be efficiently identified and prioritized, preventing the reactive nature of education and behavioral change projects.

Keywords: water regulation, compliance, behaviour change, systems thinking

Procedia PDF Downloads 216
868 Development of Hit Marks on Clothes Using Amino Acid Reagents

Authors: Hyo-Su Lim, Ye-Eun Song, Eun-Bi Lee, Sang-Yoon Lee, Young-Il Seo, Jin-Pyo Kim, Nam-Kyu Park

Abstract:

If we analogize any physical external force given to victims in many crimes including violence, it would be possible not only to presume mutual action between victims and suspects, but to make a deduction of more various facts in cases. Therefore, the aim of this study is to identify criminal tools through secretion on clothes by using amino acid reagents such as Ninhydrin, DFO(1,8-dizafluoren-9-one), 1,2 – IND (1,2-indanedione) which are reacting to skin secretion. For more effective collecting condition, porcine skin which is physiologically similar to human was used. Although there were little differences of shape identification according to sensitivity, amino acid reagents were able to identify the fist, foot, and baseball bat. Furthermore, we conducted the experiments for developmental variations through change over time setting up 5-weeks period including first damage as variation factor, and developing materials in each action through certain reagents. Specimen level of development depending on change over time was identified. As a result, each of initial level of development was seen no changes.

Keywords: hit marks, amino acid reagents, porcine skin, criminal tool

Procedia PDF Downloads 247
867 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process

Authors: Itai Kohavi, Wojciech Nowiak

Abstract:

This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.

Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation

Procedia PDF Downloads 281
866 Identification of High Stress Regions in Proximal Femur During Single-Leg Stance and Sideways Fall Using QCT-Based Finite Element Model

Authors: Hossein Kheirollahi, Yunhua Luo

Abstract:

Studying stress and strain trends in the femur and recognizing femur failure mechanism is very important for preventing hip fracture in the elderly. The aim of this study was to identify high stress and strain regions in the femur during normal walking and falling to find the mechanical behavior and failure mechanism of the femur. We developed a finite element model of the femur from the subject’s quantitative computed tomography (QCT) image and used it to identify potentially high stress and strain regions during the single-leg stance and the sideways fall. It was found that fracture may initiate from the superior region of femoral neck and propagate to the inferior region during a high impact force such as sideways fall. The results of this study showed that the femur bone is more sensitive to strain than stress which indicates the effect of strain, in addition to effect of stress, should be considered for failure analysis.

Keywords: finite element analysis, hip fracture, strain, stress

Procedia PDF Downloads 482
865 Shocks and Flows - Employing a Difference-In-Difference Setup to Assess How Conflicts and Other Grievances Affect the Gender and Age Composition of Refugee Flows towards Europe

Authors: Christian Bruss, Simona Gamba, Davide Azzolini, Federico Podestà

Abstract:

In this paper, the authors assess the impact of different political and environmental shocks on the size and on the age and gender composition of asylum-related migration flows to Europe. With this paper, the authors contribute to the literature by looking at the impact of different political and environmental shocks on the gender and age composition of migration flows in addition to the size of these flows. Conflicting theories predict different outcomes concerning the relationship between political and environmental shocks and the migration flows composition. Analyzing the relationship between the causes of migration and the composition of migration flows could yield more insights into the mechanisms behind migration decisions. In addition, this research may contribute to better informing national authorities in charge of receiving these migrant, as women and children/the elderly require different assistance than young men. To be prepared to offer the correct services, the relevant institutions have to be aware of changes in composition based on the shock in question. The authors analyze the effect of different types of shocks on the number, the gender and age composition of first time asylum seekers originating from 154 sending countries. Among the political shocks, the authors consider: violence between combatants, violence against civilians, infringement of political rights and civil liberties, and state terror. Concerning environmental shocks, natural disasters (such as droughts, floods, epidemics, etc.) have been included. The data on asylum seekers applying to any of the 32 Schengen Area countries between 2008 and 2015 is on a monthly basis. Data on asylum applications come from Eurostat, data on shocks are retrieved from various sources: georeferenced conflict data come from the Uppsala Conflict Data Program (UCDP), data on natural disasters from the Centre for Research on the Epidemiology of Disasters (CRED), data on civil liberties and political rights from Freedom House, data on state terror from the Political Terror Scale (PTS), GDP and population data from the World Bank, and georeferenced population data from the Socioeconomic Data and Applications Center (SEDAC). The authors adopt a Difference-in-Differences identification strategy, exploiting the different timing of several kinds of shocks across countries. The highly skewed distribution of the dependent variable is taken into account by using count data models. In particular, a Zero Inflated Negative Binomial model is adopted. Preliminary results show that different shocks - such as armed conflict and epidemics - exert weak immediate effects on asylum-related migration flows and almost non-existent effects on the gender and age composition. However, this result is certainly affected by the fact that no time lags have been introduced so far. Finding the correct time lags depends on a great many variables not limited to distance alone. Therefore, finding the appropriate time lags is still a work in progress. Considering the ongoing refugee crisis, this topic is more important than ever. The authors hope that this research contributes to a less emotionally led debate.

Keywords: age, asylum, Europe, forced migration, gender

Procedia PDF Downloads 239
864 Specified Human Motion Recognition and Unknown Hand-Held Object Tracking

Authors: Jinsiang Shaw, Pik-Hoe Chen

Abstract:

This paper aims to integrate human recognition, motion recognition, and object tracking technologies without requiring a pre-training database model for motion recognition or the unknown object itself. Furthermore, it can simultaneously track multiple users and multiple objects. Unlike other existing human motion recognition methods, our approach employs a rule-based condition method to determine if a user hand is approaching or departing an object. It uses a background subtraction method to separate the human and object from the background, and employs behavior features to effectively interpret human object-grabbing actions. With an object’s histogram characteristics, we are able to isolate and track it using back projection. Hence, a moving object trajectory can be recorded and the object itself can be located. This particular technique can be used in a camera surveillance system in a shopping area to perform real-time intelligent surveillance, thus preventing theft. Experimental results verify the validity of the developed surveillance algorithm with an accuracy of 83% for shoplifting detection.

Keywords: Automatic Tracking, Back Projection, Motion Recognition, Shoplifting

Procedia PDF Downloads 309
863 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 479
862 Anti Corruption Conventions in Nigeria: Legal and Administrative Challenges

Authors: Mohammed Albakariyu Kabir

Abstract:

There is a trend in development discourse to understand and explain the level of corruption in Nigeria, its anti-corruption crusade and why it is failing, as well as its level of compliance with International standards of United Nations Convention against Corruption (UNCAC) & African Union Convention on Converting and Preventing Corruption) to which Nigeria is a signatory. This paper discusses the legal and Constitutional provisions relating to corrupt practices and safeguards in Nigeria, as well as the obstacles to the implementation of these Conventions.The paper highlights the challenges posed to the Anti-Corruption crusade by analysing the loopholes that exist both in administrative structure and in scope of the relevant laws. The paper argues that Nigerian Constitution did not make adequate provisions for the implementation of the conventions, hence a proposal which will ensure adequate provision for implementing the conventions to better the lives of Nigerians. The paper concludes that there is the need to build institutional parameters, adequate constitutional and structural safeguards, as well as to synergise strategies, collaborations and alliances to facilitate the timely domestication and implementation of the conventions.

Keywords: anti-corruption, corruption, convention, domestication, poverty, state parties

Procedia PDF Downloads 426
861 A Critical Evaluation of Building Information Modelling in New Zealand: Deepening Our Understanding of the Benefits and Drawbacks

Authors: Garry Miller, Thomas Alexander, Cameron Lee

Abstract:

There is belief that Building Information Modelling (BIM) will improve performance of the New Zealand (NZ) Architecture, Engineering and Construction (AEC) sector, however, widespread use of BIM is yet to be seen. Previous research indicates there are many issues affecting the uptake of BIM in NZ; nevertheless the underlying benefits, drawbacks, and barriers preventing more widespread uptake are not fully understood. This investigation aimed to understand these factors more clearly and make suggestions on how to improve the uptake of BIM in NZ. Semi-structured interviews were conducted with a range of industry professionals to gather a qualitative understanding. Findings indicated the ability to incorporate better information into a BIM model could drive many benefits. However scepticism and lack of positive incentives in NZ are affecting its widespread use. This concluded that there is a need for the government to produce a number of BIM case studies and develop a set of BIM standards to resolve payment issues surrounding BIM use. This study provides useful information for those interested in BIM and members of government interested in improving the performance of the construction industry. This study may also be of interest to small, developed countries such as NZ where the level of BIM maturity is relatively low.

Keywords: BIM, New Zealand, AEC sector, building information modelling

Procedia PDF Downloads 499
860 Enhancing Food Security through Cabbage Production by Local Fammers in Nkokobe Municipality

Authors: Sipumle Qapeshu, Bongiwe Mcata, Ajuruchukwu Obi

Abstract:

Subsistence farmers practice farming for survival while commercial farmers produce to feed themselves and larger society with the motive to achieve highest profit. These types of farmers are characterised by growing what they eat, live without making regular purchases in the markets. The main objective of subsistence/peasant farmers is to ensure food security at household level. Cabbage is a crop that has been identified to have vital food nutrient sources like Vitamin A, B and C, protein, calcium, iron and antioxidative compounds beneficial for preventing cancer. This paper, therefore, looks at the potential that cabbage production has in enhancing household food security and also the challenges encountered by these cabbage producers. Primary data was obtained from 50 respondents, and linear regression model was used to analyse the data used. Income was used as food security measure. The results showed that three variables were statistically significant and they are gender (10%), education (5%) and household size (5%). Meaning that these are variables that influenced cabbage production by these households, and it also affects their food security status since income is affected.

Keywords: subsistence farmers, food security, cabbage, farming

Procedia PDF Downloads 278
859 Molecular Basis of Anti-Biofilm and Anti-Adherence Activity of Syzygium aromaticum on Streptococcus mutans: In Vitro and in Vivo Study

Authors: Mohd Adil, Rosina Khan, Asad U. Khan, Vasantha Rupasinghe HP

Abstract:

The study examined the effects of Syzygium aromaticum extracts on the virulence properties of Streptococcus mutans. The activity of glucosyltransferases in the presence of crude and diethylether fraction was reduced to 80% at concentration 78.12μg/ml and 39.06μg/ml respectively. The glycolytic pH drop by S. mutans cells was also disrupted by these extracts without affecting the bacterial viability. Microscopic analysis revealed morphological changes of the S. mutans biofilms, indicating that these plant extracts at sub-MICs could significantly affect the ability of S. mutans to form biofilm with distorted extracellular matrix. Furthermore, with the help of quantitative RT-PCR, the expression of different genes involved in adherence, quorum sensing, in the presence of these extracts were down regulated. The crude and active fractions were found effective in preventing caries development in rats. The data showed that S. aromaticum holds promise as a naturally occurring source of compounds that may prevent biofilm-related oral diseases.

Keywords: biofilm, quorum sensing, Streptococcus mutans, Syzygium aromaticum extract

Procedia PDF Downloads 282