Search results for: threats identification
2916 Issues of Accounting of Lease and Revenue according to International Financial Reporting Standards
Authors: Nadezhda Kvatashidze, Elena Kharabadze
Abstract:
It is broadly known that lease is a flexible means of funding enterprises. Lease reduces the risk related to access and possession of assets, as well as obtainment of funding. Therefore, it is important to refine lease accounting. The lease accounting regulations under the applicable standard (International Accounting Standards 17) make concealment of liabilities possible. As a result, the information users get inaccurate and incomprehensive information and have to resort to an additional assessment of the off-balance sheet lease liabilities. In order to address the problem, the International Financial Reporting Standards Board decided to change the approach to lease accounting. With the deficiencies of the applicable standard taken into account, the new standard (IFRS 16 ‘Leases’) aims at supplying appropriate and fair lease-related information to the users. Save certain exclusions; the lessee is obliged to recognize all the lease agreements in its financial report. The approach was determined by the fact that under the lease agreement, rights and obligations arise by way of assets and liabilities. Immediately upon conclusion of the lease agreement, the lessee takes an asset into its disposal and assumes the obligation to effect the lease-related payments in order to meet the recognition criteria defined by the Conceptual Framework for Financial Reporting. The payments are to be entered into the financial report. The new lease accounting standard secures supply of quality and comparable information to the financial information users. The International Accounting Standards Board and the US Financial Accounting Standards Board jointly developed IFRS 15: ‘Revenue from Contracts with Customers’. The standard allows the establishment of detailed revenue recognition practical criteria such as identification of the performance obligations in the contract, determination of the transaction price and its components, especially price variable considerations and other important components, as well as passage of control over the asset to the customer. IFRS 15: ‘Revenue from Contracts with Customers’ is very similar to the relevant US standards and includes requirements more specific and consistent than those of the standards in place. The new standard is going to change the recognition terms and techniques in the industries, such as construction, telecommunications (mobile and cable networks), licensing (media, science, franchising), real property, software etc.Keywords: assessment of the lease assets and liabilities, contractual liability, division of contract, identification of contracts, contract price, lease identification, lease liabilities, off-balance sheet, transaction value
Procedia PDF Downloads 3202915 Identification of Membrane Foulants in Direct Contact Membrane Distillation for the Treatment of Reject Brine
Authors: Shefaa Mansour, Hassan Arafat, Shadi Hasan
Abstract:
Management of reverse osmosis (RO) brine has become a major area of research due to the environmental concerns associated with it. This study worked on studying the feasibility of the direct contact membrane distillation (DCMD) system in the treatment of this RO brine. The system displayed great potential in terms of its flux and salt rejection, where different operating conditions such as the feed temperature, feed salinity, feed and permeate flow rates were varied. The highest flux of 16.7 LMH was reported with a salt rejection of 99.5%. Although the DCMD has displayed potential of enhanced water recovery from highly saline solutions, one of the major drawbacks associated with the operation is the fouling of the membranes which impairs the system performance. An operational run of 77 hours for the treatment of RO brine of 56,500 ppm salinity was performed in order to investigate the impact of fouling of the membrane on the overall operation of the system over long time operations. Over this time period, the flux was observed to have reduced by four times its initial flux. The fouled membrane was characterized through different techniques for the identification of the organic and inorganic foulants that have deposited on the membrane surface. The Infrared Spectroscopy method (IR) was used to identify the organic foulants where SEM images displayed the surface characteristics of the membrane. As for the inorganic foulants, they were identified using X-ray Diffraction (XRD), Ion Chromatography (IC) and Energy Dispersive Spectroscopy (EDS). The major foulants found on the surface of the membrane were inorganic salts such as sodium chloride and calcium sulfate.Keywords: brine treatment, membrane distillation, fouling, characterization
Procedia PDF Downloads 4362914 Application of Griddization Management to Construction Hazard Management
Authors: Lingzhi Li, Jiankun Zhang, Tiantian Gu
Abstract:
Hazard management that can prevent fatal accidents and property losses is a fundamental process during the buildings’ construction stage. However, due to lack of safety supervision resources and operational pressures, the conduction of hazard management is poor and ineffective in China. In order to improve the quality of construction safety management, it is critical to explore the use of information technologies to ensure that the process of hazard management is efficient and effective. After exploring the existing problems of construction hazard management in China, this paper develops the griddization management model for construction hazard management. First, following the knowledge grid infrastructure, the griddization computing infrastructure for construction hazards management is designed which includes five layers: resource entity layer, information management layer, task management layer, knowledge transformation layer and application layer. This infrastructure will be as the technical support for realizing grid management. Second, this study divides the construction hazards into grids through city level, district level and construction site level according to grid principles. Last, a griddization management process including hazard identification, assessment and control is developed. Meanwhile, all stakeholders of construction safety management, such as owners, contractors, supervision organizations and government departments, should take the corresponding responsibilities in this process. Finally, a case study based on actual construction hazard identification, assessment and control is used to validate the effectiveness and efficiency of the proposed griddization management model. The advantage of this designed model is to realize information sharing and cooperative management between various safety management departments.Keywords: construction hazard, griddization computing, grid management, process
Procedia PDF Downloads 2752913 Planning for Sustainable Tourism in Chabahar Coastal Zone Using Swot Analysis
Authors: R. Karami, A. Gharaei
Abstract:
The aim of this study was to investigate ecotourism status in Chabahar coastal zone using swot analysis and strategic planning. Firstly, the current status of region was studied by literature review, field survey and statistical analysis. Then strengths and weaknesses (internal factors) were identified as well as opportunities and threats (external factors) using Delphi Method. Based on the obtained results, the total score of 2.46 in IFE matrix and 2.33 in the EFE matrix represents poor condition related to the internal and external factors respectively. This condition means both external and internal factors have not been utilized properly and the zone needs defensive plan; thus appropriate planning and organizational management practices are required to deal with these factors. Furthermore strategic goals, objectives and action plans in short, medium and long term schedule were formulated in attention to swot analysis.Keywords: tourism, SWOT analysis, strategic planning, Chabahar
Procedia PDF Downloads 5132912 Functional Diversity of Pseudomonas: Role in Stimulation of Bean Germination and Common Blight Biocontrol
Authors: Slimane Mokrani, Nabti El hafid
Abstract:
Description of the subject: Currently, several efforts focus on the study of biodiversity, microbial biotechnology, and the use of ecological strategies. Objectives: The aim of this present work is to determine the functional diversity of bacteria in rhizospheric and non-rhizospheric soils of different plants. Methods: Bacteria were isolated from soil and identified based on physiological and biochemical characters and genotypic taxonomy performed by 16S rDNA and BOX-PCR. As well as the characterization of various PGPR traits. Then, they are tested for their effects on the stimulation of seed germination and the growth of Phaseolus vulgaris L. As well as their biological control activities with regard to the phytopathogenic bacterial isolate Xapf. Results and Discussion: The biochemical and physiological identification of 75 bacterial isolates made it possible to associate them with the two groups of fluorescent Pseudomonas (74.67%) and non-fluorescent Pseudomonas (25.33%). The identification by 16S rDNA of 27 strains made it possible to attribute the majority of the strains to the genus Pseudomonas (81.48%), Serratia (7.41%) and Bacillus (11.11%). The bacterial strains showed a high capacity to produce IAA, siderophores, HCN and to solubilize phosphate. A significant stimulation of germination and growth was observed by applying the Pseudomonas strains. Furthermore, significant reductions in the severity and intensity of the disease caused caused by Xapf were observed. Conclusion: The bacteria described in this present study endowed with different PGPR activities seem to be very promising for their uses as biological control agents and bio-fertilization.Keywords: biofertilization, biological control, phaseolus vulgaris L, pseudomonas, Xanthomonas axonopodis pv. phaseoli var. fuscans and common blight
Procedia PDF Downloads 812911 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia
Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana
Abstract:
Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom
Procedia PDF Downloads 4532910 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 5042909 Social Media, Society, and Criminal Victimization: A Qualitative Study on University Students of Bangladesh
Authors: Md. Tawohidul Haque
Abstract:
The main objective of this study is to explore the nature, types and, causes of the involvement of criminal activities of the university students using social media namely Social Networking Sites (SNS). The evidence shows that the students have greater chance to involve such criminal activities during sharing their personal messages, photos, and even sharing their academic works. Used qualitative case studies with six students from two universities, this study provides a detail information about the processes how this media provokes the students to commit to the criminal activities such as unethical pose, naked picture, post against persona’s prestige and dignity as well as social position, phone call at midnight, personal threats, sexual offer, kidnapping attitude, and so on. This finding would be an important guideline for the media persons, policy makers, restorative justice, and human rights workers.Keywords: social media, criminal victimization, human gathering scheme, social code of ethics
Procedia PDF Downloads 1562908 Nuclear Mitochondrial Pseudogenes in Anastrepha fraterculus Complex
Authors: Pratibha Srivastava, Ayyamperumal Jeyaprakash, Gary Steck, Jason Stanley, Leroy Whilby
Abstract:
Exotic, invasive tephritid fruit flies (Diptera: Tephritidae) are a major threat to fruit and vegetable industries in the United States. The establishment of pest fruit fly in the agricultural industries and produce severe ecological and economic impacts on agricultural diversification and trade. Detection and identification of these agricultural pests in a timely manner will facilitate the possibility of eradication from newly invaded areas. Identification of larval stages to species level is difficult, but is required to determine pest loads and their pathways into the United States. The aim of this study is the New World genus, Anastrepha which includes pests of major economic importance. Mitochondrial cytochrome c oxidase I (COI) gene sequences were amplified from Anastrepha fraterculus specimens collected from South America (Ecuador and Peru). Phylogenetic analysis was performed to characterize the Anastrepha fraterculus complex at a molecular level. During phylogenetics analysis numerous nuclear mitochondrial pseudogenes (numts) were discovered in different specimens. The numts are nonfunctional copies of the mtDNA present in the nucleus and are easily coamplified with the mitochondrial COI gene copy by using conserved universal primers. This is problematic for DNA Barcoding, which attempts to characterize all living organisms by using the COI gene. This study is significant for national quarantine use, as morphological diagnostics to separate larvae of the various members remain poorly developed.Keywords: tephritid, Anastrepha fraterculus, COI, numts
Procedia PDF Downloads 2392907 A Genetic Identification of Candida Species Causing Intravenous Catheter-Associated Candidemia in Heart Failure Patients
Authors: Seyed Reza Aghili, Tahereh Shokohi, Shirin Sadat Hashemi Fesharaki, Mohammad Ali Boroumand, Bahar Salmanian
Abstract:
Introduction: Intravenous catheter-associated fungal infection as nosocomial infection continue to be a deep problem among hospitalized patients, decreasing quality of life and adding healthcare costs. The capacity of catheters in the spread of candidemia in heart failure patients is obvious. The aim of this study was to evaluate the prevalence and genetic identification of Candida species in heart disorder patients. Material and Methods: This study was conducted in Tehran Hospital of Cardiology Center (Tehran, Iran, 2014) during 1.5 years on the patients hospitalized for at least 7 days and who had central or peripheral vein catheter. Culture of catheters, blood and skin of the location of catheter insertion were applied for detecting Candida colonies in 223 patients. Identification of Candida species was made on the basis of a combination of various phenotypic methods and confirmed by sequencing the ITS1-5.8S-ITS2 region amplified from the genomic DNA using PCR and the NCBI BLAST. Results: Of the 223 patients samples tested, we identified totally 15 Candida isolates obtained from 9 (4.04%) catheter cultures, 3 (1.35%) blood cultures and 2 (0.90%) skin cultures of the catheter insertion areas. On the base of ITS region sequencing, out of nine Candida isolates from catheter, 5(55.6%) C. albicans, 2(22.2%) C. glabrata, 1(11.1%) C. membranifiaciens and 1 (11.1%) C. tropicalis were identified. Among three Candida isolates from blood culture, C. tropicalis, C. carpophila and C. membranifiaciens were identified. Non-candida yeast isolated from one blood culture was Cryptococcus albidus. One case of C. glabrata and one case of Candida albicans were isolated from skin culture of the catheter insertion areas in patients with positive catheter culture. In these patients, ITS region of rDNA sequence showed a similarity between Candida isolated from the skin and catheter. However, the blood samples of these patients were negative for fungal growth. We report two cases of catheter-related candidemia caused by C. membranifiaciens and C. tropicalis on the base of genetic similarity of species isolated from blood and catheter which were treated successfully with intravenous fluconazole and catheter removal. In phenotypic identification methods, we could only identify C. albicans and C. tropicalis and other yeast isolates were diagnosed as Candida sp. Discussion: Although more than 200 species of Candida have been identified, only a few cause diseases in humans. There is some evidence that non-albicans infections are increasing. Many risk factors, including prior antibiotic therapy, use of a central venous catheter, surgery, and parenteral nutrition are considered to be associated with candidemia in hospitalized heart failure patients. Identifying the route of infection in candidemia is difficult. Non-albicans candida as the cause of candidemia is increasing dramatically. By using conventional method, many non-albicans isolates remain unidentified. So, using more sensitive and specific molecular genetic sequencing to clarify the aspects of epidemiology of the unknown candida species infections is essential. The positive blood and catheter cultures for candida isolates and high percentage of similarity of their ITS region of rDNA sequence in these two patients confirmed the diagnosis of intravenous catheter-associated candidemia.Keywords: catheter-associated infections, heart failure patient, molecular genetic sequencing, ITS region of rDNA, Candidemia
Procedia PDF Downloads 3312906 Identification of High-Rise Buildings Using Object Based Classification and Shadow Extraction Techniques
Authors: Subham Kharel, Sudha Ravindranath, A. Vidya, B. Chandrasekaran, K. Ganesha Raj, T. Shesadri
Abstract:
Digitization of urban features is a tedious and time-consuming process when done manually. In addition to this problem, Indian cities have complex habitat patterns and convoluted clustering patterns, which make it even more difficult to map features. This paper makes an attempt to classify urban objects in the satellite image using object-oriented classification techniques in which various classes such as vegetation, water bodies, buildings, and shadows adjacent to the buildings were mapped semi-automatically. Building layer obtained as a result of object-oriented classification along with already available building layers was used. The main focus, however, lay in the extraction of high-rise buildings using spatial technology, digital image processing, and modeling, which would otherwise be a very difficult task to carry out manually. Results indicated a considerable rise in the total number of buildings in the city. High-rise buildings were successfully mapped using satellite imagery, spatial technology along with logical reasoning and mathematical considerations. The results clearly depict the ability of Remote Sensing and GIS to solve complex problems in urban scenarios like studying urban sprawl and identification of more complex features in an urban area like high-rise buildings and multi-dwelling units. Object-Oriented Technique has been proven to be effective and has yielded an overall efficiency of 80 percent in the classification of high-rise buildings.Keywords: object oriented classification, shadow extraction, high-rise buildings, satellite imagery, spatial technology
Procedia PDF Downloads 1552905 Application of Unmanned Aerial Vehicle in Urban Rail Transit Intelligent Inspection
Authors: Xinglu Nie, Feifei Tang, Chuntao Wei, Zhimin Ruan, Qianhong Zhu
Abstract:
Current method of manual-style inspection can not fully meet the requirement of the urban rail transit security in China. In this paper, an intelligent inspection method using unmanned aerial vehicle (UAV) is utilized. A series of orthophoto of rail transit monitored area was collected by UAV, image correction and registration were operated among multi-phase images, then the change detection was used to detect the changes, judging the engineering activities and human activities that may become potential threats to the security of urban rail. Not only qualitative judgment, but also quantitative judgment of changes in the security control area can be provided by this method, which improves the objectives and efficiency of the patrol results. The No.6 line of Chongqing Municipality was taken as an example to verify the validation of this method.Keywords: rail transit, control of protected areas, intelligent inspection, UAV, change detection
Procedia PDF Downloads 3702904 Women Entrepreneurship as an Inventive Approach to Ensure a Sustainable Development in Anambra State
Authors: S. Muogbo Uju, U. Akpunonu Evan
Abstract:
The prevailing harsh environment factors coupled with high poverty rate and unemployment propels a high rate of entrepreneurial activities in developing economies. Women entrepreneurs operate with gender bias among other constraints that can constitute a threats or create opportunity for women entrepreneurs. This empirical paper investigates and critically examines women entrepreneurship as an inventive approach to ensure a sustainable development in Anambra state. The study used descriptive statistics (frequencies, mean, and percentages) to answer the three research questions posed. Hypotheses testing were done with Pearson product moment correlation and multiple regression were employed in data analysis. Consequently, the finding of this study portrayed a significant impact between women entrepreneurship activity, job creation and wealth creation.Keywords: women entrepreneurs, skill acquisition, sustainability, wealth creation, job creation, economic development
Procedia PDF Downloads 4452903 Effect of Arsenic Treatment on Element Contents of Sunflower, Growing in Nutrient Solution
Authors: Szilvia Várallyay, Szilvia Veres, Éva Bódi, Farzaneh Garousi, Béla Kovács
Abstract:
The agricultural environment is contaminated with heavy metals and other toxic elements, which means more and more threats. One of the most important toxic element is the arsenic. Consequences of arsenic toxicity in the plant organism is decreases the weight of the roots, and causes discoloration and necrosis of leaves. The toxicity of arsenic depends on the quality and quantity of the arsenic specialization. The arsenic in the soil and in the plant presents as a most hazardous specialization. A dicotyledon plant were chosen for the experiment, namely sunflower. The sunflower plants were grown in nutrient solution in different As(III) levels. The content of As, P, Fe were measured from experimental plants, using by ICP-MS.Negative correlation was observed between the higher concentration of As(V) and As(III) in the nutrition solution and the content of P in the sunflower tissue. The amount of Fe was decreasing if we used a higher concentration of arsenic (30 mg kg-1). We can tell the conclusion that the arsenic had a negative effect on the sunflower tissue P and Fe content.Keywords: arsenic, sunflower, ICP-MS, toxicity
Procedia PDF Downloads 6462902 Pesticide Risk: A Study on the Effectiveness of Organic/Biopesticides in Sustainable Agriculture
Authors: Berk Kılıç, Ömer Aydın, Kerem Mestani, Defne Uzun
Abstract:
In agriculture and farming, pesticides are frequently used to kill off or fend off any pests (bugs, bacteria, fungi, etc.). However, traditional pesticides have proven to have harmful effects on both the environment and the human body, such as hazards in the endocrine, neurodevelopmental, and reproductive systems. This experiment aims to test the effectiveness of organic/bio-pesticides (environmentally friendly pesticides) compared to traditional pesticides. Black pepper and garlic will be used as biopesticides in this experiment. The results support that organic farming applying organic pesticides operates through non-toxic mechanisms, offering minimal threats to human well-being and the environment. Consequently, consuming organic produce can significantly diminish the dangers associated with pesticide intake. In this study, method is introduced to reduce pesticide-related risks by promoting organic farming techniques within organic/bio-pesticide usage.Keywords: pesticide, garlic, black pepper, bio-pesticide
Procedia PDF Downloads 682901 Probabilistic Approach to the Spatial Identification of the Environmental Sources behind Mortality Rates in Europe
Authors: Alina Svechkina, Boris A. Portnov
Abstract:
In line with a rapid increase in pollution sources and enforcement of stricter air pollution regulation, which lowers pollution levels, it becomes more difficult to identify actual risk sources behind the observed morbidity patterns, and new approaches are required to identify potential risks and take preventive actions. In the present study, we discuss a probabilistic approach to the spatial identification of a priori unidentified environmental health hazards. The underlying assumption behind the tested approach is that the observed adverse health patterns (morbidity, mortality) can become a source of information on the geographic location of environmental risk factors that stand behind them. Using this approach, we analyzed sources of environmental exposure using data on mortality rates available for the year 2015 for NUTS 3 (Nomenclature of Territorial Units for Statistics) subdivisions of the European Union. We identified several areas in the southwestern part of Europe as primary risk sources for the observed mortality patterns. Multivariate regressions, controlled by geographical location, climate conditions, GDP (gross domestic product) per capita, dependency ratios, population density, and the level of road freight revealed that mortality rates decline as a function of distance from the identified hazard location. We recommend the proposed approach an exploratory analysis tool for initial investigation of regional patterns of population morbidity patterns and factors behind it.Keywords: mortality, environmental hazards, air pollution, distance decay gradient, multi regression analysis, Europe, NUTS3
Procedia PDF Downloads 1672900 Body of Dialectics: Exploring a Dynamic-Adaptational Model of Physical Self-Integrity and the Pursuit of Happiness in a Hostile World
Authors: Noam Markovitz
Abstract:
People with physical disabilities constitute a very large and simultaneously a diverse group of general population, as the term physical disabilities is extensive and covers a wide range of disabilities. Therefore, individuals with physical disabilities are often faced with a new, threatening and stressful reality leading possibly to a multi-crisis in their lives due to the great changes they experience in somatic, socio-economic, occupational and psychological level. The current study seeks to advance understanding of the complex adaptation to physical disabilities by expanding the dynamic-adaptational model of the pursuit of happiness in a hostile world with a new conception of physical self-integrity. Physical self-integrity incorporates an objective dimension, namely physical self-functioning (PSF), and a subjective dimension, namely physical self-concept (PSC). Both of these dimensions constitute an experience of wholeness in the individual’s identification with her or his physical body. The model guiding this work is dialectical in nature and depicts two systems in the individual’s sense of happiness: subjective well-being (SWB) and meaning in life (MIL). Both systems serve as self-adaptive agents that moderate the complementary system of the hostile-world scenario (HWS), which integrates one’s perceived threats to one’s integrity. Thus, in situations of increased HWS, the moderation may take a form of joint activity in which SWB and MIL are amplified or a form of compensation in which one system produces a stronger effect while the other system produces a weaker effect. The current study investigated PSC in relations to SWB and MIL through pleasantness and meanings that are physically or metaphorically grounded in one’s body. In parallel, PSC also relates to HWS by activating representations of inappropriateness, deformation and vulnerability. In view of possibly dialectical positions of opposing and complementary forces within the current model, the current field study that aims to explore PSC as appearing in an independent, cross-sectional, design addressing the model’s variables in a focal group of people with physical disabilities. This study delineated the participation of the PSC in the adaptational functions of SWB and MIL vis-à-vis HWS-related life adversities. The findings showed that PSC could fully complement the main variables of the pursuit of happiness in a hostile world model. The assumed dialectics in the form of a stronger relationship between SWB and MIL in the face of physical disabilities was not supported. However, it was found that when HWS increased, PSC and MIL were strongly linked, whereas PSC and SWB were weakly linked. This highlights the compensatory role of MIL. From a conceptual viewpoint, the current investigation may clarify the role of PSC as an adaptational agent of the individual’s positive health in complementary senses of bodily wholeness. Methodologically, the advantage of the current investigation is the application of an integrative, model-based approach within a specially focused design with a particular relevance to PSC. Moreover, from an applicative viewpoint, the current investigation may suggest how an innovative model may be translated to therapeutic interventions used by clinicians, counselors and practitioners in improving wellness and psychological well-being, particularly among people with physical disabilities.Keywords: older adults, physical disabilities, physical self-concept, pursuit of happiness in a hostile-world
Procedia PDF Downloads 1502899 Body Fluids Identification by Raman Spectroscopy and Matrix-Assisted Laser Desorption/Ionization Time-of-Flight Mass Spectrometry
Authors: Huixia Shi, Can Hu, Jun Zhu, Hongling Guo, Haiyan Li, Hongyan Du
Abstract:
The identification of human body fluids during forensic investigations is a critical step to determine key details, and present strong evidence to testify criminal in a case. With the popularity of DNA and improved detection technology, the potential question must be revolved that whether the suspect’s DNA derived from saliva or semen, menstrual or peripheral blood, how to identify the red substance or aged blood traces on the spot is blood; How to determine who contribute the right one in mixed stains. In recent years, molecular approaches have been developing increasingly on mRNA, miRNA, DNA methylation and microbial markers, but appear expensive, time-consuming, and destructive disadvantages. Physicochemical methods are utilized frequently such us scanning electron microscopy/energy spectroscopy and X-ray fluorescence and so on, but results only showing one or two characteristics of body fluid itself and that out of working in unknown or mixed body fluid stains. This paper focuses on using chemistry methods Raman spectroscopy and matrix-assisted laser desorption/ionization time-of-flight mass spectrometry to discriminate species of peripheral blood, menstrual blood, semen, saliva, vaginal secretions, urine or sweat. Firstly, non-destructive, confirmatory, convenient and fast Raman spectroscopy method combined with more accurate matrix-assisted laser desorption/ionization time-of-flight mass spectrometry method can totally distinguish one from other body fluids. Secondly, 11 spectral signatures and specific metabolic molecules have been obtained by analysis results after 70 samples detected. Thirdly, Raman results showed peripheral and menstrual blood, saliva and vaginal have highly similar spectroscopic features. Advanced statistical analysis of the multiple Raman spectra must be requested to classify one to another. On the other hand, it seems that the lactic acid can differentiate peripheral and menstrual blood detected by matrix-assisted laser desorption/ionization time-of-flight mass spectrometry, but that is not a specific metabolic molecule, more sensitivity ones will be analyzed in a forward study. These results demonstrate the great potential of the developed chemistry methods for forensic applications, although more work is needed for method validation.Keywords: body fluids, identification, Raman spectroscopy, matrix-assisted laser desorption/ionization time-of-flight mass spectrometry
Procedia PDF Downloads 1372898 Identification Algorithm of Critical Interface, Modelling Perils on Critical Infrastructure Subjects
Authors: Jiří. J. Urbánek, Hana Malachová, Josef Krahulec, Jitka Johanidisová
Abstract:
The paper deals with crisis situations investigation and modelling within the organizations of critical infrastructure. Every crisis situation has an origin in the emergency event occurrence in the organizations of energetic critical infrastructure especially. Here, the emergency events can be both the expected events, then crisis scenarios can be pre-prepared by pertinent organizational crisis management authorities towards their coping or the unexpected event (Black Swan effect) – without pre-prepared scenario, but it needs operational coping of crisis situations as well. The forms, characteristics, behaviour and utilization of crisis scenarios have various qualities, depending on real critical infrastructure organization prevention and training processes. An aim is always better organizational security and continuity obtainment. This paper objective is to find and investigate critical/ crisis zones and functions in critical situations models of critical infrastructure organization. The DYVELOP (Dynamic Vector Logistics of Processes) method is able to identify problematic critical zones and functions, displaying critical interfaces among actors of crisis situations on the DYVELOP maps named Blazons. Firstly, for realization of this ability is necessary to derive and create identification algorithm of critical interfaces. The locations of critical interfaces are the flags of crisis situation in real organization of critical infrastructure. Conclusive, the model of critical interface will be displayed at real organization of Czech energetic crisis infrastructure subject in Black Out peril environment. The Blazons need live power Point presentation for better comprehension of this paper mission.Keywords: algorithm, crisis, DYVELOP, infrastructure
Procedia PDF Downloads 4092897 Sewage Induced Behavioural Responses in an Air-Breathing Fish, Pangasius pangasius
Authors: Sasikala Govindaraj, P. Palanisamy, G. M. Natarajan
Abstract:
Domestic sewage poses major threats to the aquatic environment in third world countries due to lack of technical and economic sources which can have significant impacts on fish. The tolerance limits to toxicants found in domestic effluents vary among species and their integrative effects may lead to reproductive failure and reduction of survival and growth of the more sensitive fish species. The mechanism of action of toxic substances upon various concentrations of sewage was taken aiming to evaluate locomotory, physiological, neurological and morbidity response of fish. The rapid biomonitoring assessment technique for qualitative evaluation of various industrial pollutants, behavioral responses of an air-breathing fish Pangasius pangasius were used as biomarkers for water quality assessment. The present investigation concluded that sewage is highly toxic to the fish and severely affects their physiology and behavior.Keywords: air-breathing organs, behavioral, locomotory, morbidity, neurological, physiological, sewage
Procedia PDF Downloads 2812896 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape
Authors: Sandesh Achar
Abstract:
Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management
Procedia PDF Downloads 982895 Model-Based Fault Diagnosis in Carbon Fiber Reinforced Composites Using Particle Filtering
Abstract:
Carbon fiber reinforced composites (CFRP) used as aircraft structure are subject to lightning strike, putting structural integrity under risk. Indirect damage may occur after a lightning strike where the internal structure can be damaged due to excessive heat induced by lightning current, while the surface of the structures remains intact. Three damage modes may be observed after a lightning strike: fiber breakage, inter-ply delamination and intra-ply cracks. The assessment of internal damage states in composite is challenging due to complicated microstructure, inherent uncertainties, and existence of multiple damage modes. In this work, a model based approach is adopted to diagnose faults in carbon composites after lighting strikes. A resistor network model is implemented to relate the overall electrical and thermal conduction behavior under simulated lightning current waveform to the intrinsic temperature dependent material properties, microstructure and degradation of materials. A fault detection and identification (FDI) module utilizes the physics based model and a particle filtering algorithm to identify damage mode as well as calculate the probability of structural failure. Extensive simulation results are provided to substantiate the proposed fault diagnosis methodology with both single fault and multiple faults cases. The approach is also demonstrated on transient resistance data collected from a IM7/Epoxy laminate under simulated lightning strike.Keywords: carbon composite, fault detection, fault identification, particle filter
Procedia PDF Downloads 1952894 Digital Skepticism In A Legal Philosophical Approach
Authors: dr. Bendes Ákos
Abstract:
Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.Keywords: legal philosophy, privacy, security, ethics, digital skepticism
Procedia PDF Downloads 432893 Automatic Differentiation of Ultrasonic Images of Cystic and Solid Breast Lesions
Authors: Dmitry V. Pasynkov, Ivan A. Egoshin, Alexey A. Kolchev, Ivan V. Kliouchkin
Abstract:
In most cases, typical cysts are easily recognized at ultrasonography. The specificity of this method for typical cysts reaches 98%, and it is usually considered as gold standard for typical cyst diagnosis. However, it is necessary to have all the following features to conclude the typical cyst: clear margin, the absence of internal echoes and dorsal acoustic enhancement. At the same time, not every breast cyst is typical. It is especially characteristic for protein-contained cysts that may have significant internal echoes. On the other hand, some solid lesions (predominantly malignant) may have cystic appearance and may be falsely accepted as cysts. Therefore we tried to develop the automatic method of cystic and solid breast lesions differentiation. Materials and methods. The input data were the ultrasonography digital images with the 256-gradations of gray color (Medison SA8000SE, Siemens X150, Esaote MyLab C). Identification of the lesion on these images was performed in two steps. On the first one, the region of interest (or contour of lesion) was searched and selected. Selection of such region is carried out using the sigmoid filter where the threshold is calculated according to the empirical distribution function of the image brightness and, if necessary, it was corrected according to the average brightness of the image points which have the highest gradient of brightness. At the second step, the identification of the selected region to one of lesion groups by its statistical characteristics of brightness distribution was made. The following characteristics were used: entropy, coefficients of the linear and polynomial regression, quantiles of different orders, an average gradient of brightness, etc. For determination of decisive criterion of belonging to one of lesion groups (cystic or solid) the training set of these characteristics of brightness distribution separately for benign and malignant lesions were received. To test our approach we used a set of 217 ultrasonic images of 107 cystic (including 53 atypical, difficult for bare eye differentiation) and 110 solid lesions. All lesions were cytologically and/or histologically confirmed. Visual identification was performed by trained specialist in breast ultrasonography. Results. Our system correctly distinguished all (107, 100%) typical cysts, 107 of 110 (97.3%) solid lesions and 50 of 53 (94.3%) atypical cysts. On the contrary, with the bare eye it was possible to identify correctly all (107, 100%) typical cysts, 96 of 110 (87.3%) solid lesions and 32 of 53 (60.4%) atypical cysts. Conclusion. Automatic approach significantly surpasses the visual assessment performed by trained specialist. The difference is especially large for atypical cysts and hypoechoic solid lesions with the clear margin. This data may have a clinical significance.Keywords: breast cyst, breast solid lesion, differentiation, ultrasonography
Procedia PDF Downloads 2702892 Attention-Based Spatio-Temporal Approach for Fire and Smoke Detection
Authors: Alireza Mirrashid, Mohammad Khoshbin, Ali Atghaei, Hassan Shahbazi
Abstract:
In various industries, smoke and fire are two of the most important threats in the workplace. One of the common methods for detecting smoke and fire is the use of infrared thermal and smoke sensors, which cannot be used in outdoor applications. Therefore, the use of vision-based methods seems necessary. The problem of smoke and fire detection is spatiotemporal and requires spatiotemporal solutions. This paper presents a method that uses spatial features along with temporal-based features to detect smoke and fire in the scene. It consists of three main parts; the task of each part is to reduce the error of the previous part so that the final model has a robust performance. This method also uses transformer modules to increase the accuracy of the model. The results of our model show the proper performance of the proposed approach in solving the problem of smoke and fire detection and can be used to increase workplace safety.Keywords: attention, fire detection, smoke detection, spatio-temporal
Procedia PDF Downloads 2032891 Opportunities Forensics Biology in the Study of Sperm Traces after Washing
Authors: Saule Musabekova
Abstract:
Achievements of modern science, especially genetics, led to a sharp intensification of the process of proof. Footprints, subjected to destruction-related cause-effect relationships, are sources of evidentiary information on the circumstances it was committed and the persons committed it. Currently, with the overall growth in the number of crimes against sexual inviolability or sexual freedom, and increased the proportion of the crimes where to destroy the traces of the crime perpetrators different detergents are used. A characteristic feature of modern synthetic detergents is the presence of biological additives - enzymes that break down and gradually destroy stains of protein origin. To study the nature of the influence of modern washing powders semen stains were put kinds of fabrics and prepared in advance stained sperm of men of different groups according to ABO system. For research washing machines of known manufacturers of household appliances have been used with different production characteristics, in which the test was performed and the washing of various kinds of fabrics with semen stains. After washing the tissue with spots were tested for the presence of semen stains visually preserved, establishing in them surviving sperm or their elements, we studied the possibilities of the group diagnostics on the system ABO or molecular-genetic identification. The subsequent study of these spots by morphological method showed that 100% detection of morphological sperm cells - sperm is not possible. As a result, in 30% of further studies of these traces gave weakly positive results are obtained with an immunoassay test PSA SEMIQUANT. It is noted that the percentage of positive results obtained in the study of semen traces disposed on natural fiber fabrics is higher than sperm traces disposed on synthetic fabrics. Study traces of semen, confirmed by PSA - test 3% possible to establish a genetic profile of the person and obtain any positive findings of the molecular genetic examination. In other cases, it was not a sufficient amount of material for DNA identification. Results of research and the practical expert study found, in most cases, the conclusions of the identification of sperm traces do not seem possible. This a consequence of exposure to semen traces on the material evidence of biological additives contained in modern detergents and further the influence of other effective methods. Resulting in DNA has undergone irreversible changes (degradation) under the influence of external human factors. Using molecular genetic methods can partially solve the problems arising in the study of unlaundered physical evidence for the disclosure and investigation of crimes.Keywords: study of sperm, modern detergents, washing powders, forensic medicine
Procedia PDF Downloads 2982890 Genomic Identification of Anisakis Simplex Larvae by PCR-RAPD
Authors: Fumiko Kojima, Shuji Fujimoto
Abstract:
Anisakiasis is a disease caused by infection with an anisakid larvae, mostly Anisakis simplex. The larvae commonly infect in marine fish and the disease is frequently reported in areas of the world where fish is consumed raw, lightly pickled or salted. In Japan, people have the habit of eating raw fish such as ‘sushi’ or ‘sashimi’, so they have more chance of infection with larvae of anisakid nematodes. There are three sibling species in A. simplex larvae, namely, A. simplex sensu stricto (Asss), A. pegreffii (Ap) and A. simplex C. It was revealed that Ap is dominant among the larvae from fish (Scomber japonics) in the Japan Sea side and Asss is dominant among those of the Pacific Ocean side conversely. Although anisakiasis has happened in Japan among both the Japan Sea side area and the Pacific Ocean side area. The aim of this study was to investigate genetic variations between the siblings (Asss and Ap) and within the same sibling species by random amplified polymorphic DNA (RAPD) technique. In order to investigate the genetic difference among the each A. simplex larvae, we used RAPD technique to differentiate individuals of A. simplex obtained from Scomber japonics fish those were caught in the Japan sea (Goto Islands in Nagasaki Prefecture) and the cost of Pacific Ocean (Kanagawa Prefecture). The RAPD patterns of the control DNA (Genus Raphidascaris) were markedly different from those of the A. simplex. There were differences in amplification patterns between Asss and Ap. The RAPD patterns for larvae obtained from fish of the same sea were somewhat different and variations were detected even among larvae from the same fish. These results suggest the considerable high genetic variability between Asss and Ap and the possible existence of genetic variation within the sibling species.Keywords: Anisakiasis in Japan, Anisakis simplex, genomic identification, PCR-RAPD
Procedia PDF Downloads 1812889 The South African Polycentric Water Resource Governance-Management Nexus: Parlaying an Institutional Agent and Structured Social Engagement
Authors: J. H. Boonzaaier, A. C. Brent
Abstract:
South Africa, a water scarce country, experiences the phenomenon that its life supporting natural water resources is seriously threatened by the users that are totally dependent on it. South Africa is globally applauded to have of the best and most progressive water laws and policies. There are however growing concerns regarding natural water resource quality deterioration and a critical void in the management of natural resources and compliance to policies due to increasing institutional uncertainties and failures. These are in accordance with concerns of many South African researchers and practitioners that call for a change in paradigm from talk to practice and a more constructive, practical approach to governance challenges in the management of water resources. A qualitative theory-building case study through longitudinal action research was conducted from 2014 to 2017. The research assessed whether a strategic positioned institutional agent can be parlayed to facilitate and execute WRM on catchment level by engaging multiple stakeholders in a polycentric setting. Through a critical realist approach a distinction was made between ex ante self-deterministic human behaviour in the realist realm, and ex post governance-management in the constructivist realm. A congruence analysis, including Toulmin’s method of argumentation analysis, was utilised. The study evaluated the unique case of a self-steering local water management institution, the Impala Water Users Association (WUA) in the Pongola River catchment in the northern part of the KwaZulu-Natal Province of South Africa. Exploiting prevailing water resource threats, it expanded its ancillary functions from 20,000 to 300,000 ha. Embarking on WRM activities, it addressed natural water system quality assessments, social awareness, knowledge support, and threats, such as: soil erosion, waste and effluent into water systems, coal mining, and water security dimensions; through structured engagement with 21 different catchment stakeholders. By implementing a proposed polycentric governance-management model on a catchment scale, the WUA achieved to fill the void. It developed a foundation and capacity to protect the resilience of the natural environment that is critical for freshwater resources to ensure long-term water security of the Pongola River basin. Further work is recommended on appropriate statutory delegations, mechanisms of sustainable funding, sufficient penetration of knowledge to local levels to catalyse behaviour change, incentivised support from professionals, back-to-back expansion of WUAs to alleviate scale and cost burdens, and the creation of catchment data monitoring and compilation centres.Keywords: institutional agent, water governance, polycentric water resource management, water resource management
Procedia PDF Downloads 1382888 Spatial Distribution and Habitat Preference of Indian Pangolin (Manis crassicaudata) in Madhesh Province, Nepal
Authors: Asmit Neupane, Narayan Prasad Gautam, Prabin Bhusal
Abstract:
Indian pangolin, locally called as ‘Salak’, ‘Sal machha’, ‘Pakho machha’, is a globally endangered species, nationally categorized as a critically endangered species, protected under the National Parks and Wildlife Conservation (NPWC) Act 1973 and appended in Appendix I of CITES. Indian pangolins occur in the tropical areas of Terai region and Chure foothills of eastern Nepal, and India, Bangladesh, Pakistan, and Sri Lanka. They utilize a wide range of habitats, including primary and secondary tropical forest, limestone forest, bamboo forest, grassland, and agricultural lands. So, in regard to this fact, this research is aimed to provide detailed information regarding the current distribution pattern, status, habitat preference, prevailing threats and attitude of local people towards species conservation in Madhesh Province, Nepal. The study was conducted in four CFs, two from Bara district and two from Dhanusha district. The study area comprised of Churia range and foothills with tropical and sub-tropical vegetation. A total of 24 transects were established, each of 500*50 m2, where indirect signs of Indian pangolin, including active/old burrows, pugmarks and scratches, were found. Altogether 93 burrows were found, where only 20 were active burrows. Similarly, a vegetation survey and social survey was also conducted. The data was analyzed using Stata 16 and SPSS software. Distance from settlement, ground cover, aspect, presence/absence of ants/termites and human disturbance were the important habitat parameters having statistically significant relationship with the distribution of Indian pangolin in the area. The species was found to prefer an elevation of 360 to 540m, 0-15º slope, red soil, North-east aspect, moderate crown and ground cover, without fire and rocks, vicinity of water, roads, settlement, Sal dominated forest and minimum disturbed by human activities. Similarly, the attitude of local people towards Indian pangolin conservation was found to be significantly different with respect to age, sex and education level. The study concludes that majority of active burrows were found in Churia hills, which indicates that Indian pangolin population is gradually moving uphill towards higher elevation as hilly area supports better prey availability and also less human disturbance. Further studies are required to investigate microhabitat preferences, seasonal variability and impacts of climate change on the distribution, habitat and prey availability of Indian pangolin for the sustainable conservation of this species.Keywords: conservation, IUCN red list, local participation, small mammal, status, threats
Procedia PDF Downloads 802887 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 149