Search results for: Risks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1694

Search results for: Risks

1094 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 196
1093 Financial Portfolio Optimization in Electricity Markets: Evaluation via Sharpe Ratio

Authors: F. Gökgöz, M. E. Atmaca

Abstract:

Electricity plays an indispensable role in human life and the economy. It is a unique product or service that must be balanced instantaneously, as electricity is not stored, generation and consumption should be proportional. Effective and efficient use of electricity is very important not only for society, but also for the environment. A competitive electricity market is one of the best ways to provide a suitable platform for effective and efficient use of electricity. On the other hand, it carries some risks that should be carefully managed by the market players. Risk management is an essential part in market players’ decision making. In this paper, risk management through diversification is applied with the help of Markowitz’s Mean-variance, Down-side and Semi-variance methods for a case study. Performance of optimal electricity sale solutions are measured and evaluated via Sharpe-Ratio, and the optimal portfolio solutions are improved. Two years of historical weekdays’ price data of the Turkish Day Ahead Market are used to demonstrate the approach.

Keywords: electricity market, portfolio optimization, risk management in electricity market, sharpe ratio

Procedia PDF Downloads 353
1092 Health and Greenhouse Gas Emission Implications of Reducing Meat Intakes in Hong Kong

Authors: Cynthia Sau Chun Yip, Richard Fielding

Abstract:

High meat and especially red meat intakes are significantly and positively associated with a multiple burden of diseases and also high greenhouse gas (GHG) emissions. This study investigated population meat intake patterns in Hong Kong. It quantified the burden of disease and GHG emission outcomes by modeling to adjust Hong Kong population meat intakes to recommended healthy levels. It compared age- and sex-specific population meat, fruit and vegetable intakes obtained from a population survey among adults aged 20 years and over in Hong Kong in 2005-2007, against intake recommendations suggested in the Modelling System to Inform the Revision of the Australian Guide to Healthy Eating (AGHE-2011-MS) technical document. This study found that meat and meat alternatives, especially red meat intakes among Hong Kong males aged 20+ years and over are significantly higher than recommended. Red meat intakes among females aged 50-69 years and other meat and alternatives intakes among aged 20-59 years are also higher than recommended. Taking the 2005-07 age- and sex-specific population meat intake as baselines, three counterfactual scenarios of adjusting Hong Kong adult population meat intakes to AGHE-2011-MS and Pre-2011 AGHE recommendations by the year 2030 were established. Consequent energy intake gaps were substituted with additional legume, fruit and vegetable intakes. To quantify the consequent GHG emission outcomes associated with Hong Kong meat intakes, Cradle-to-ready-to-eat lifecycle assessment emission outcome modelling was used. Comparative risk assessment of burden of disease model was used to quantify the health outcomes. This study found adjusting meat intakes to recommended levels could reduce Hong Kong GHG emission by 17%-44% when compared against baseline meat intake emissions, and prevent 2,519 to 7,012 premature deaths in males and 53 to 1,342 in females, as well as multiple burden of diseases when compared to the baseline meat intake scenario. Comparing lump sum meat intake reduction and outcome measures across the entire population, and using emission factors, and relative risks from individual studies in previous co-benefit studies, this study used age- and sex-specific input and output measures, emission factors and relative risks obtained from high quality meta-analysis and meta-review respectively, and has taken government dietary recommendations into account. Hence evaluations in this study are of better quality and more reflective of real life practices. Further to previous co-benefit studies, this study pinpointed age- and sex-specific population and meat-type-specific intervention points and leverages. When compared with similar studies in Australia, this study also showed that intervention points and leverages among populations in different geographic and cultural background could be different, and that globalization also globalizes meat consumption emission effects. More regional and cultural specific evaluations are recommended to promote more sustainable meat consumption and enhance global food security.

Keywords: burden of diseases, greenhouse gas emissions, Hong Kong diet, sustainable meat consumption

Procedia PDF Downloads 306
1091 Individualism/Collectivism and Extended Theory of Planned Behavior

Authors: Ela Ari, Aysi̇ma Findikoglu

Abstract:

Consumers’ switching GSM operators’ has been an important research issue since the rise of their competitive offers. Recent research has looked at consumer switching behavior through the theory of planned behavior, but not yet extended the theory with identity, psycho-social and cultural influences within the service context. This research explores an extended version of the theory of planned behavior including social and financial risks and brand loyalty. Moreover, the role of individualism and collectivism at the individual level is investigated in a collectivistic culture that moves toward to individualism due to changing family relationships, use of technology and education. Our preliminary analysis showed that financial risk and vertical individualism prove to be a significant determinant of intention to switch. The study also investigates social risk and intention, subjective norm, perceived behavioral control relationship. The effect of individualism and collectivism and attitudes relationship has been also examined within a service industry. Implications for marketing managers and scholars are also discussed.

Keywords: attitude, individualism, intention, subjective norm

Procedia PDF Downloads 449
1090 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 81
1089 Impact on Soil Irrigated with Municipal and Industrial Wastewater from Korangi Drain near IoBM, Karachi

Authors: Farhan Ali

Abstract:

Use of wastewater for growing vegetables has become a common practice around big cities. Wastewater contains organic material and inorganic elements essential for plant growth but also contain heavy metals, which may be lethal for animals and humans if their concentration increases than permissible limit. To monitor this situation, a survey was conducted to ascertain the addition of heavy metals into agricultural fields through wastewater irrigation and their translocation in to the edible parts of the vegetables. The study highlighted that there is a large accumulation of heavy metals in the soil, which is irrigated with industrial wastewater Laden and people consume vegetables grown in soil irrigated with sewage water to absorb a large amount of these metals. This accumulation of heavy metals in food cause possible health risks for the consumer. Regular monitoring of the levels of pathogens and heavy metals from the waste water drain which effluent are used for growing vegetables and other foodstuffs is essential to monitor excessive accumulation of these metals in the food chain.

Keywords: pathogens, wastewater, concentration, effluent

Procedia PDF Downloads 290
1088 Users’ Information Disclosure Determinants in Social Networking Sites: A Systematic Literature Review

Authors: Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie

Abstract:

The privacy paradox describes a phenomenon whereby there is no connection between stated privacy concerns and privacy behaviours. We need to understand the underlying reasons for this paradox if we are to help users to preserve their privacy more effectively. In particular, the Social Networking System (SNS) domain offers a rich area of investigation due to the risks of unwise information disclosure decisions. Our study thus aims to untangle the complicated nature and underlying mechanisms of online privacy-related decisions in SNSs. In this paper, we report on the findings of a Systematic Literature Review (SLR) that revealed a number of factors that are likely to influence online privacy decisions. Our deductive analysis approach was informed by Communicative Privacy Management (CPM) theory. We uncovered a lack of clarity around privacy attitudes and their link to behaviours, which makes it challenging to design privacy-protecting SNS platforms and to craft legislation to ensure that users’ privacy is preserved.

Keywords: privacy paradox, self-disclosure, privacy attitude, privacy behavior, social networking sites

Procedia PDF Downloads 148
1087 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 155
1086 Objective and Subjective Preconditions for Entrepreneurship: From the Point of View of Enterprise Risk Management

Authors: Maria Luskova, Maria Hudakova, Katarina Buganova

Abstract:

Established objective and subjective preconditions for entrepreneurship, forming the business organically related whole, are the necessary condition of successful entrepreneurial activities. Objective preconditions for entrepreneurship are developed by the market economy that should stimulate entrepreneurship by allowing the use of economic opportunities for all those who want to do business in respective field while providing guarantees to all owners and creating a stable business environment for entrepreneurs. Subjective preconditions of entrepreneurship are formed primarily by personal characteristics of the entrepreneur. These are his properties, abilities, skills, physiological, and psychological preconditions which may be inherited, inborn or sequentially developed and obtained during his life on the basis of education and influences of surrounding environment. The paper is dealing with issues of objective and subjective preconditions for entrepreneurship and provides their analysis in view of the current situation in Slovakia. It presents risks of the business environment in Slovakia that the Slovak managers considered the most significant in 2014 and defines the dominant attributes of the entrepreneur in the current business environment in Slovakia.

Keywords: entrepreneurship, innovations, opportunity, risk, uncertainty

Procedia PDF Downloads 513
1085 Improving Road Infrastructure Safety Management Through Statistical Analysis of Road Accident Data. Case Study: Streets in Bucharest

Authors: Dimitriu Corneliu-Ioan, Gheorghe FrațIlă

Abstract:

Romania has one of the highest rates of road deaths among European Union Member States, and there is a concern that the country will not meet its goal of "zero deaths" by 2050. The European Union also aims to halve the number of people seriously injured in road accidents by 2030. Therefore, there is a need to improve road infrastructure safety management in Romania. The aim of this study is to analyze road accident data through statistical methods to assess the current state of road infrastructure safety in Bucharest. The study also aims to identify trends and make forecasts regarding serious road accidents and their consequences. The objective is to provide insights that can help prioritize measures to increase road safety, particularly in urban areas. The research utilizes statistical analysis methods, including exploratory analysis and descriptive statistics. Databases from the Traffic Police and the Romanian Road Authority are analyzed using Excel. Road risks are compared with the main causes of road accidents to identify correlations. The study emphasizes the need for better quality and more diverse collection of road accident data for effective analysis in the field of road infrastructure engineering. The research findings highlight the importance of prioritizing measures to improve road safety in urban areas, where serious accidents and their consequences are more frequent. There is a correlation between the measures ordered by road safety auditors and the main causes of serious accidents in Bucharest. The study also reveals the significant social costs of road accidents, amounting to approximately 3% of GDP, emphasizing the need for collaboration between local and central administrations in allocating resources for road safety. This research contributes to a clearer understanding of the current road infrastructure safety situation in Romania. The findings provide critical insights that can aid decision-makers in allocating resources efficiently and institutionally cooperating to achieve sustainable road safety. The data used for this study are collected from the Traffic Police and the Romanian Road Authority. The data processing involves exploratory analysis and descriptive statistics using the Excel tool. The analysis allows for a better understanding of the factors contributing to the current road safety situation and helps inform managerial decisions to eliminate or reduce road risks. The study addresses the state of road infrastructure safety in Bucharest and analyzes the trends and forecasts regarding serious road accidents and their consequences. It studies the correlation between road safety measures and the main causes of serious accidents. To improve road safety, cooperation between local and central administrations towards joint financial efforts is important. This research highlights the need for statistical data processing methods to substantiate managerial decisions in road infrastructure management. It emphasizes the importance of improving the quality and diversity of road accident data collection. The research findings provide a critical perspective on the current road safety situation in Romania and offer insights to identify appropriate solutions to reduce the number of serious road accidents in the future.

Keywords: road death rate, strategic objective, serious road accidents, road safety, statistical analysis

Procedia PDF Downloads 75
1084 Critical Heights of Sloped Unsupported Trenches in Unsaturated Sand

Authors: Won Taek Oh, Adin Richard

Abstract:

Workers are often required to enter unsupported trenches during the construction process, which may present serious risks. Trench failures can result in death or damage to adjacent properties, therefore trenches should be excavated with extreme precaution. Excavation work is often done in unsaturated soils, where the critical height (i.e. maximum depth that can be excavated without failure) of unsupported trenches can be more reliably estimated by considering the influence of matric suction. In this study, coupled stress/pore-water pressure analyses are conducted to investigate the critical height of sloped unsupported trenches considering the influence of pore-water pressure redistribution caused by excavating. Four different wall slopes (1.5V:1H, 2V:1H, 3V:1H, and 90°) and a vertical trench with the top 0.3 m sloped 1:1 were considered in the analyses with multiple depths of the ground water table in a sand. For comparison, the critical heights were also estimated using the limit equilibrium method for the same excavation scenarios used in the coupled analyses.

Keywords: critical height, matric suction, unsaturated soil, unsupported trench

Procedia PDF Downloads 118
1083 Modal Analysis for Study of Minor Historical Architecture

Authors: Milorad Pavlovic, Anna Manzato, Antonella Cecchi

Abstract:

Cultural heritage conservation is a challenge for contemporary society. In recent decades, significant resources have been allocated for the conservation and restoration of architectural heritage. Historical buildings were restored, protected and reinforced with the intent to limit the risks of degradation or loss, due to phenomena of structural damage and to external factors such as differential settlements, earthquake effects, etc. The wide diffusion of historic masonry constructions in Italy, Europe and the Mediterranean area requires reliable tools for the evaluation of their structural safety. In this paper is presented a free modal analysis performed on a minor historical architecture located in the village of Bagno Grande, near the city of L’Aquila in Italy. The location is characterized by a complex urban context, seriously damaged by the earthquake of 2009. The aim of this work is to check the structural behavior of a masonry building characterized by several boundary conditions imposed by adjacent buildings and infrastructural facilities.

Keywords: FEM, masonry, minor historical architecture, modal analysis

Procedia PDF Downloads 312
1082 The Promotion of AI Technology to Financial Development in China

Authors: Li Yong

Abstract:

Using the data of 135 financial institutions in China from 2018 to 2022, this paper deeply analyzes the underlying theoretical mechanism of artificial intelligence (AI) technology promoting financial development and examines the impact of AI technology on the digital transformation performance of financial enterprises. It is found that the level of AI technology has a significant positive impact on the development of finance. Compared with the impact on the expansion of financial scale, AI technology plays a greater role in improving the performance of financial institutions, reflecting the trend characteristics of the current AI technology to promote the evolution of financial structure. By investigating the intermediary transmission effects, we found that AI technology plays a positive role in promoting the performance of financial institutions by reducing operating costs and improving customer satisfaction, but its function in innovating financial products and mitigating financial risks is relatively limited. In addition, the promotion of AI technology in financial development has significant heterogeneity in terms of the type, scale, and attributes of financial institutions.

Keywords: artificial intelligence technology, financial development, China, heterogeneity

Procedia PDF Downloads 56
1081 Dambreak Flood Analysis Using HEC-RAS and GIS Technologies

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchehed

Abstract:

The potential risks associated with dam break flooding could be considerable and result in major damage, including loss of life and property destruction. In the past, Algeria experienced such flood disasters; let’s recall the failure of Fergoug dam in 1881, this accident cost 200 lives, many houses and bridges were destroyed by the flooding. Recently the Algerian government have obligated to dam owners the development of detailed dam break Emergency Action Plans for its 64 major dams. The research presented here was conducted within this framework, Zardezas dam which is located in the city of Skikda in the North East of Algeria was the case of study. The model HEC-RAS was used for the hydrodynamic routing of the dam break flood wave. In addition, Geographic Information System (GIS) was used to create inundation maps and produce a visualization of the flood propagation in the Saf-Saf River.The simulation results that demonstrate the significance of Zardezas dam break flooding; constitute a real tool for developing emergency response plans and assisting territorial communities in land use planning.

Keywords: dam break, HEC-RAS, GIS, inundation maps, Emergency Action Plan

Procedia PDF Downloads 384
1080 The Lethal Autonomy and Military Targeting Process

Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk

Abstract:

The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.

Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)

Procedia PDF Downloads 421
1079 An Under-Recognized Factor in the Development of Postpartum Depression: Infertility

Authors: Memnun Seven, Aygül Akyüz

Abstract:

Having a baby, giving birth and being a mother are generally considered happy events, especially for women who have had a history of infertility and may have suffered emotionally, physically and financially. Although the transition from the prenatal period to the postnatal period is usually desired and planned, it is a developmental and cognitive transition period full of complex emotional reactions. During this period, common mood disorders for women include maternity blues, postpartum depression and postpartum psychosis. Postpartum depression is a common and serious mood disorder which can jeopardize the health of the mother, baby and family within the first year of delivery. Knowing the risks factors is an important issue for the early detection and early intervention of postpartum depression. However, knowing that a history of infertility may contribute to the development of postpartum depression, there are few studies assessing the effects of infertility during the diagnosis and treatment of depression. In this review, the effects of infertility on the development of postpartum depression and nurse/midwives’ roles in this issue are discussed in light with the literature.

Keywords: infertility, postpartum depression, risk factors, mood disorder

Procedia PDF Downloads 471
1078 Strategic Tools for Entrepreneurship: Model Proposal for Manufacturing Companies

Authors: Chiara Mansanta, Daniela Sani

Abstract:

The present paper presents the further development of the application of a standard methodology to boost innovation inside real case studies of manufacturing companies. The proposed methodology provides a viable solution for manufacturing companies that have to evaluate new business ideas. The study underlined the concept of entrepreneurship and how a manager can use it to promote innovation inside their companies. Starting from a literature study on entrepreneurship, this paper examines the role of the manager in supporting a company’s development. The empirical part of the study is based on two manufacturing companies that used the proposed methodology to favour entrepreneurship through an alternative approach. The research demonstrated the need for companies to have a structured and well-defined methodology to achieve their goals. The purpose of this article is to understand the significance of business models inside companies and explore how they affect business strategy and innovation management. The idea is to use business models to support entrepreneurs in their decision-making processes, reducing risks and avoiding errors.

Keywords: entrepreneurship, manufacturing companies, solution validation, strategic management

Procedia PDF Downloads 92
1077 Performance of Neural Networks vs. Radial Basis Functions When Forming a Metamodel for Residential Buildings

Authors: Philip Symonds, Jon Taylor, Zaid Chalabi, Michael Davies

Abstract:

With the world climate projected to warm and major cities in developing countries becoming increasingly populated and polluted, governments are tasked with the problem of overheating and air quality in residential buildings. This paper presents the development of an adaptable model of these risks. Simulations are performed using the EnergyPlus building physics software. An accurate metamodel is formed by randomly sampling building input parameters and training on the outputs of EnergyPlus simulations. Metamodels are used to vastly reduce the amount of computation time required when performing optimisation and sensitivity analyses. Neural Networks (NNs) are compared to a Radial Basis Function (RBF) algorithm when forming a metamodel. These techniques were implemented using the PyBrain and scikit-learn python libraries, respectively. NNs are shown to perform around 15% better than RBFs when estimating overheating and air pollution metrics modelled by EnergyPlus.

Keywords: neural networks, radial basis functions, metamodelling, python machine learning libraries

Procedia PDF Downloads 436
1076 Reshoring Strategies for Enhanced Supply Chain Resilience: A Comprehensive Analysis of Procurement Challenges and Solutions in the United States

Authors: Emilia Segun-Ajao

Abstract:

The strategy of relocation aimed at strengthening supply chain resilience in the United States is examined, taking into account recent global disturbances and vulnerabilities in offshore manufacturing. It explains the procurement challenges faced by enterprises and offers solutions to mitigate risks and improve resilience. Through the analysis of innovative approaches, including technological advances, policy considerations, and strategic frameworks, this study provides insights to decision-makers about the complexity of supply chain management. Reshoring has gained attention as a strategy to improve supply chain resilience in the face of global disruptions. This analysis focuses on the importance of relocating as a multifaceted approach to strengthening supply chains, advocating economic benefits, technological advances, and policy frameworks to create a more robust supply landscape in the United States.

Keywords: collaborative partnerships, supply chain resilience, procurement challenges, technology adoption

Procedia PDF Downloads 49
1075 Examples from a Traditional Sismo-Resistant Architecture

Authors: Amira Zatir, Abderahmane Mokhtari, Amina Foufa, Sara Zatir

Abstract:

It exists in several regions in the world, of numerous historic monuments, buildings and housing environment, built in traditional ways which survive for earthquakes, even in zones where the seismic risk is particularly raised. These constructions, stemming from vernacular architecture, allow, through their resistances in the time earthquakes, to identify the various sismo-resistant "local" techniques. Through the examples and the experiences presented, the remark which can be made, is that in the traditional built, two major principles in a way opposite, govern the constructions in earthquake-resistant. It is about the very big flexibility, whom answer very light constructions, like the Japanese wooden constructions, Turkish and even Chinese; that of the very big rigidity to which correspond constructions in masonry in particular stone, more or less heavy and massive, which we meet in particular in the Mediterranean Basin, and in the historic sanctuary of Machu Pacchu. In it sensible and well-reflected techniques of construction are added, of which the use of the humble materials such as the earth and the adobe. The ancient communities were able to face the seismic risks, thanks to them know-how reflected in their intelligently designed constructions, testifying of a local seismic culture.

Keywords: earthquake, architecture, traditional, construction, resistance

Procedia PDF Downloads 416
1074 Effects of Nicotine on Symptoms Associated with Attention Deficit Hyperactivity Disorder: A Systematic Literature Review

Authors: Daniella Hirwa

Abstract:

Attention Deficit Hyperactivity Disorder (ADHD) is associated with several risk-taking behaviors, including drug use and smoking. Such risk-taking behaviors are often a result of an attempt to self-manage symptoms associated with ADHD. The present review investigates the effects of nicotine on symptoms associated with ADHD. This systematic literature review was conducted for 2017-2024 using keywords associated with ADHD, smoking, and nicotine. The results indicate that individuals with ADHD start smoking earlier than those without ADHD, and it is believed that this prevalence and the higher rates of smoking are due to improvements in cognitive and executive function, attention, and impulsivity due to the effect that nicotine has on dopamine release. Longitudinal studies with larger sample sizes and comprehensive health history and cognitive testing are required to gain more insight into the ways that nicotine affects ADHD symptoms and the context by which smoking is used as a method of self-treatment to help aid the development of nicotine-based treatment options that do not pose the same health risks as smoking.

Keywords: ADHD, nicotine, risk-taking behaviors, smoking

Procedia PDF Downloads 43
1073 A Deletion-Cost Based Fast Compression Algorithm for Linear Vector Data

Authors: Qiuxiao Chen, Yan Hou, Ning Wu

Abstract:

As there are deficiencies of the classic Douglas-Peucker Algorithm (DPA), such as high risks of deleting key nodes by mistake, high complexity, time consumption and relatively slow execution speed, a new Deletion-Cost Based Compression Algorithm (DCA) for linear vector data was proposed. For each curve — the basic element of linear vector data, all the deletion costs of its middle nodes were calculated, and the minimum deletion cost was compared with the pre-defined threshold. If the former was greater than or equal to the latter, all remaining nodes were reserved and the curve’s compression process was finished. Otherwise, the node with the minimal deletion cost was deleted, its two neighbors' deletion costs were updated, and the same loop on the compressed curve was repeated till the termination. By several comparative experiments using different types of linear vector data, the comparison between DPA and DCA was performed from the aspects of compression quality and computing efficiency. Experiment results showed that DCA outperformed DPA in compression accuracy and execution efficiency as well.

Keywords: Douglas-Peucker algorithm, linear vector data, compression, deletion cost

Procedia PDF Downloads 246
1072 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 457
1071 Performance Assessment of Ventilation Systems for Operating Theatres

Authors: Clemens Bulitta, Sasan Sadrizadeh, Sebastian Buhl

Abstract:

Introduction: Ventilation technology in operating theatres (OT)is internationally regulated by dif-ferent standards, which define basic specifications for technical equipment and many times also the necessary operating and performance parameters. This confronts the operators of healthcare facilities with the question of finding the best ventilation and air conditioning system for the OT in order to achieve the goal of a large and robust surgicalworkzone with appropriate air quality and climate for patient safety and occupational health. Additionally, energy consumption and the potential need for clothing that limits transmission of bacteria must be considered as well as the total life cycle cost. However, the evaluation methodology of ventilation systems regarding these matters are still a topic of discussion. To date, there are neither any uniform standardized specifications nor any common validation criteria established. Thus, this study aimed to review data in the literature and add ourown research results to compare and assess the performance of different ventilations systems regarding infection preventive effects, energy efficiency, and staff comfort. Methods: We have conducted a comprehensive literature review on OT ventilation-related topics to understand the strengths and limitations of different ventilation systems. Furthermore, data from experimental assessments on OT ventilation systems at the University of Amberg-Weidenin Germany were in-cluded to comparatively assess the performance of Laminar Airflow (LAF), Turbulent Mixing Air-flow(TMA), and Temperature-controlled Airflow (TcAF) with regards to patient and occupational safety as well as staff comfort including indoor climate.CFD simulations from the Royal Institute of Technology in Sweden (KTH) were also studied to visualize the differences between these three kinds of ventilation systems in terms of the size of the surgical workzone, resilience to obstacles in the airflow, and energy use. Results: A variety of ventilation concepts are in use in the OT today. Each has its advantages and disadvantages, and thus one may be better suited than another depend-ing on the built environment and clinical workflow. Moreover, the proper functioning of OT venti-lation is also affected by multiple external and internal interfering factors. Based on the available data TcAF and LAF seem to provide the greatest effects regarding infection control and minimizing airborne risks for surgical site infections without the need for very tight surgical clothing systems. Resilience to obstacles, staff comfort, and energy efficiency seem to be favourable with TcAF. Conclusion: Based on literature data in current publications and our studies at the Technical Uni-versity of Applied Sciences Amberg-Weidenand the Royal Institute of Technoclogy, LAF and TcAF are more suitable for minimizing the risk for surgical site infections leading to improved clin-ical outcomes. Nevertheless, regarding the best management of thermal loads, atmosphere, energy efficiency, and occupational safety, overall results and data suggest that TcAF systems could pro-vide the economically most efficient and clinically most effective solution under routine clinical conditions.

Keywords: ventilation systems, infection control, energy efficiency, operating theatre, airborne infection risks

Procedia PDF Downloads 94
1070 The Role of Dentists in the Management of Obstructive Sleep Apnoea

Authors: David Parmenter, Brian Millar

Abstract:

Obstructive sleep apnoea is a common condition which is generally under-diagnosed. Poorly managed obstructive sleep apnoea carries serious health risks and can greatly impact on the sufferer's quality of life. This publication covers the aetiology, symptoms, and treatment of sleep apnoea. The treatment of Obstructive Sleep Apnoea is an emerging field, and the useful role of the Dental Team is relatively unknown, therefor this paper will highlight the role of the dental team in its treatment. The concept of mandibular advancement appliances, along with the clinical and laboratory stages for constructing them, are documented. It is the hope of the author that this publication will educate healthcare professionals on the role of dental practitioners in the multidisciplinary team for treating sleep apnoea. Objective: Individuals should be more aware of the demographic of patients at risk of sleep apnoea, how it is diagnosed and which group of sleep apnoea patients are suitable to refer for mandibular appliance therapy. Individuals should also be aware of what a mandibular advancement appliance is and how it helps treat obstructive sleep apnoea.

Keywords: sleep apnoea, snoring, sleep appliances, mandibular advancement appliance

Procedia PDF Downloads 104
1069 Resilient Strategic Approach Towards Environmental Pollution and Infrastructural Misappropriation in Niger Delta Region: A Bibliometric Analysis

Authors: Anyia Nduka, Aslan Bin Amad Senin

Abstract:

Environmental degradation and infrastructure abuse in the Niger Delta have received increasing attention over the last two decades in several sectors, like strategic management, societal impacts, etc. Resilience strategy in human capital development and technology has inspired the formulation and implementation of strategies, policies, or activities to mitigate risks while taking advantage of opportunities to respond to crisis management. This research hopes to add to the debate on the resilient strategic model in the Niger Delta region, which is plagued with environmental and infrastructure mismanagement. It further proposes a conceptual framework of robust strategy and open technology model on bibliometric analysis. This article is intended to be a starting point for an in-depth discussion of the factors that lead to these mismanagements. Four factors were discovered for a resilient strategy leading to a more efficient and effective management procedure.

Keywords: resilience strategy, infrastructural mismanagement, human capital development., strategic management

Procedia PDF Downloads 80
1068 RASPE: Risk Advisory Smart System for Pipeline Projects in Egypt

Authors: Nael Y. Zabel, Maged E. Georgy, Moheeb E. Ibrahim

Abstract:

A knowledge-based expert system with the acronym RASPE is developed as an application tool to help decision makers in construction companies make informed decisions about managing risks in pipeline construction projects. Choosing to use expert systems from all available artificial intelligence techniques is due to the fact that an expert system is more suited to representing a domain’s knowledge and the reasoning behind domain-specific decisions. The knowledge-based expert system can capture the knowledge in the form of conditional rules which represent various project scenarios and potential risk mitigation/response actions. The built knowledge in RASPE is utilized through the underlying inference engine that allows the firing of rules relevant to a project scenario into consideration. This paper provides an overview of the knowledge acquisition process and goes about describing the knowledge structure which is divided up into four major modules. The paper shows one module in full detail for illustration purposes and concludes with insightful remarks.

Keywords: expert system, knowledge management, pipeline projects, risk mismanagement

Procedia PDF Downloads 306
1067 Minimum Pension Guarantee in Funded Pension Schemes: Theoretical Model and Global Implementation

Authors: Ishay Wolf

Abstract:

In this study, the financial position of pension actors in the market during the pension system transition toward a more funded capitalized scheme is explored, mainly via an option benefit model. This is enabled by not considering the economy as a single earning cohort. We analytically demonstrate a socio-economic anomaly in the funded pension system, which is in favor of high earning cohorts on at the expense of low earning cohorts. This anomaly is realized by a lack of insurance and exposure to financial and systemic risks. Furthermore, the anomaly might lead to pension re-reform back to unfunded scheme, mostly due to political pressure. We find that a minimum pension guarantee is a rebalance mechanism to this anomaly, which increases the probability to of the sustainable pension scheme. Specifically, we argue that implementing the guarantee with an intra-generational, risk-sharing mechanism is the most efficient way to reduce the effect of this abnormality. Moreover, we exhibit the convergence process toward implementing minimum pension guarantee in many countries which have capitalized their pension systems during the last three decades, particularly among Latin America and CEE countries.

Keywords: benefits, pension scheme, put option, social security

Procedia PDF Downloads 119
1066 Awareness of Turkish Cypriots on Domestic Violence: Exploratory Study of Cultural Influence on Public Health

Authors: Nazif Fuat Turkmen

Abstract:

Domestic violence is the most common form of violence that risks the health and psychological well-being of victims and its witnesses. Psychology as a scientific field has made contributions in research, exploration, assessment, intervention, and prevention of domestic violence. The present study will be exploring the level of recognition of Turkish Cypriots on domestic violence and their understanding about it in general terms. While discussing the level of awareness of Turkish Cypriots on domestic violence and the effects of this level of awareness on the general well-being of the members of the society, the most common types of domestic violence as well as how Turkish Cypriots recognize and interpret these different types will be explored. The participants consisted of 224 Turkish Cypriots; 48.4% (n= 109) were female, 51.1% (n=115) were male. For the purpose of the study, a 28-item questionnaire was prepared and used for data collection. According to the results, there is a strong relationship between the education level of the respondents and their awareness on domestic violence. The study shows that cultural approaches on child rearing effect people’s recognition of violence in general and awareness on domestic violence in particular.

Keywords: culture, domestic violence, health psychology, public health, Turkish Cypriots, violence

Procedia PDF Downloads 445
1065 Ceramide-PLGA Nanoparticle Formation to Apply to Atopic Dermatitis

Authors: Sang-Myung Jung, Gwang Heum Yoon, Hoo Chul Lee, Hwa Sung Shin

Abstract:

Ceramide, a component of stratum corneum at epidermis, helps to construct a rigid and dense skin barrier to prevent pathogens that cause atopic dermatitis. However, ceramide was too hydrophobic to be directly absorbed into stratum corneum and has risks of side effects by excessive treatment. To overcome the obstacles, ceramide was embedded into PLGA nanoparticles coated with chitosan. PLGA and chitosan have been known as biocompatible materials. PLGA was squeezed when faced with water and pumped ceramide out of PLGA nanoparticle. In addition, the chitosan coating layer helped initial adherence of nanoparticles to skin and regulate ceramide release until removed. This coating was degraded at weakly acid state like skin surface, finally ceramide release could be controlled. Finally, the nanoparticle was demonstrated to be non-cytotoxic and regenerate stratum corneum of atopic dermatitis model. Overall the nanoparticle is suggested as a novel and effective nanodrug to apply atopic dermatitis.

Keywords: nanoparticle, controlled release, atopic dermatitis, chitosan coating, ceramide

Procedia PDF Downloads 391