Search results for: private integrity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2483

Search results for: private integrity

1763 Design and Optimization of a Customized External Fixation Device for Lower Limb Injuries

Authors: Mohammed S. Alqahtani, Paulo J. Bartolo

Abstract:

External fixation is a common technique for the treatment and stabilization of bone fractures. Different designs have been proposed by companies and research groups, but all of them present limitations such as high weight, not comfortable to use, and not customized to individual patients. This paper proposes a lightweight customized external fixator, overcoming some of these limitations. External fixators are designed using a set of techniques such as medical imaging, CAD modelling, finite element analysis, and full factorial design of experiments. Key design parameters are discussed, and the optimal set of parameters is used to design the final external fixator. Numerical simulations are used to validate design concepts. Results present an optimal external fixation design with weight reduction of 13% without compromising its stiffness and structural integrity. External fixators are also designed to be additively manufactured, allowing to develop a strategy for personalization.

Keywords: computer-aided design modelling, external fixation, finite element analysis, full factorial, personalization

Procedia PDF Downloads 151
1762 The Neglected Elements of Implementing Strategic Succession Management in Public Organizations

Authors: François Chiocchio, Mahshid Gharibpour

Abstract:

Regardless of the extent to which succession management is implemented in the private sector, it is still overlooked in the public sector. Traditional succession management is evolving providing a better alignment between business strategies and HR strategies. Succession management brings sustainable effectiveness for succession programs through career path development, knowledge and skill transfer, job retention, as well as high-potential candidates’ empowerment for upcoming vacancies. By way of a systematic literature review, we bring into focus strategic succession management in public organizations and discuss best ways of implementation. 

Keywords: succession management, strategic succession management, public organization, succession management model

Procedia PDF Downloads 350
1761 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 374
1760 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 474
1759 Governance Disclosure Quality and Cooperative Performance in Malaysia

Authors: Intan Waheedah Othman, Maslinawati Mohamad, Azizah Abdullah

Abstract:

Few discussions were made on cooperative governance reforms despite the fact that cooperative movements operate and compete in an identical business environment as the private as well as the public corporations. Due to the scarcity of research examining the issue of governance among cooperatives, this paper is motivated to examine the extent of governance compliance and disclosure among cooperatives, hence the relationship between cooperative governance and its firm performance. Results from the study provide empirical evidence that disclosure on ownership structure and exercise of control rights was found to have significant negative relationship with cooperative firm performance.

Keywords: cooperative, governance, firm performance, Malaysia

Procedia PDF Downloads 533
1758 The Effect of Topically Aloe vera Gel on Cutaneous Wound Healing

Authors: Nasrin Takzaree, Abbas Hadjiakhoondi, Gholamreza Hassanzadeh, Mohammadreza Rouini

Abstract:

Background: Wound healing and repair is a normal reaction to injury which results in restoration of tissue integrity. Rate of wound healing is affected by various factors, such as nutrition, vitamins, hormones. Method: The aim of this study was to evaluate the effect of Aloe vera mucilage on wound healing. Mucilage was extracted from leaves, then homogenize, filtered and concentrated. Some creams were prepared with different concentrations of mucilage 95%. In this study 63 male albino rats, weighing 250–300 gr were used. Incision wounds (10 mm) were made on the shaved and cleaned back of rat necks. Wounds of case groups (group I & group II) were treated with aloe vera mucilage which were administered one time daily another group two times daily. Results: In order to evaluate wound healing, various parameters such as wound diameter, percentage of healing, duration of healing. Were considered. Conclusion: The results of this study confirmed that aloe vera mucilage is a potent healing and can be used in wound healing process.

Keywords: Aloe vera, wound healing, open skin wound, healing process

Procedia PDF Downloads 343
1757 A Study on the Functional Safety Analysis of Stage Control System Based on International Electronical Committee 61508-2

Authors: Youn-Sung Kim, Hye-Mi Kim, Sang-Hoon Seo, Jaden Cha

Abstract:

This International standard IEC 61508 sets out a generic approach for all safety lifecycle activities for systems comprised of electrical/electronic/programmable electronic (E/E/PE) elements that are used to perform safety functions. The control unit in stage control system is safety related facilities to control state and speed for stage system running, and it performs safety-critical function by stage control system. The controller unit is part of safety loops corresponding to the IEC 61508 and classified as logic part in the safety loop. In this paper, we analyze using FMEDA (Failure Mode Effect and Diagnostic Analysis) to verification for fault tolerance methods and functional safety of control unit. Moreover, we determined SIL (Safety Integrity Level) for control unit according to the safety requirements defined in IEC 61508-2 based on an analyzed functional safety.

Keywords: safety function, failure mode effect, IEC 61508-2, diagnostic analysis, stage control system

Procedia PDF Downloads 274
1756 Production of a Sustainable Slow-Release Urea Fertilizer Using Starch and Poly-Vinyl Alcohol

Authors: A. M. H. Shokry, N. S. M. El-Tayeb

Abstract:

The environmental impacts caused by fertilizers call for the adaptation of more sustainable technologies in order to increase agricultural production and reduce pollution due to high nutrient emissions. One particular technique has been to coat urea fertilizer granules with less-soluble chemicals that permit the gradual release of nutrients in a slow and controlled manner. The aim of this research is to develop a biodegradable slow-release fertilizer (SRF) with materials that come from sustainable sources; starch and polyvinyl alcohol (PVA). The slow-release behavior and water retention capacity of the coated granules were determined. In addition, the aqueous release and absorbency rates were also tested. Results confirmed that the release rate from coated granules was slower than through plain membranes; and that the water absorption capacity of the coated urea decreased as PVA content increased. The SRF was also tested and gave positive results that confirmed the integrity of the product.

Keywords: biodegradability, nitrogen-use efficiency, poly-vinyl alcohol, slow-release fertilizer, sustainability

Procedia PDF Downloads 204
1755 Comparative Study on Different Type of Shear Connectors in Composite Slabs

Authors: S. Subrmanian, A. Siva, R. Raghul

Abstract:

In modern construction industry, usage of cold form composite slab has its scope widely due to its light weight, high structural properties and economic factor. To enhance the structural integrity, mechanical interlocking or frictional interlocking was introduced. The role of mechanical interlocking or frictional interlocking is to increase the longitudinal shear between the profiled sheet and concrete. This paper deals with the experimental evaluation of three types of mechanical interlocking devices namely normal stud shear connector, J-Type shear connector, U-Type shear connector. An attempt was made to evolve the shear connector which can be suitable for the composite slab as an interlocking device. Totally six number of composite slabs have been experimented with three types of shear connectors and comparison study is made. The outcome was compared with numerical model was created by ABAQUS software and analyzed for comparative purpose. The result was U-Type shear connector provided better performance and resistance.

Keywords: composite slabs, shear connector, end slip, longitudinal shear

Procedia PDF Downloads 319
1754 Cloud Design for Storing Large Amount of Data

Authors: M. Strémy, P. Závacký, P. Cuninka, M. Juhás

Abstract:

Main goal of this paper is to introduce our design of private cloud for storing large amount of data, especially pictures, and to provide good technological backend for data analysis based on parallel processing and business intelligence. We have tested hypervisors, cloud management tools, storage for storing all data and Hadoop to provide data analysis on unstructured data. Providing high availability, virtual network management, logical separation of projects and also rapid deployment of physical servers to our environment was also needed.

Keywords: cloud, glusterfs, hadoop, juju, kvm, maas, openstack, virtualization

Procedia PDF Downloads 349
1753 Cloud Computing: Major Issues and Solutions

Authors: S. Adhirai Subramaniyam, Paramjit Singh

Abstract:

This paper presents major issues in cloud computing. The paper describes different cloud computing deployment models and cloud service models available in the field of cloud computing. The paper then concentrates on various issues in the field. The issues such as cloud compatibility, compliance of the cloud, standardizing cloud technology, monitoring while on the cloud and cloud security are described. The paper suggests solutions for these issues and concludes that hybrid cloud infrastructure is a real boon for organizations.

Keywords: cloud, cloud computing, mobile cloud computing, private cloud, public cloud, hybrid cloud, SAAS, PAAS, IAAS, cloud security

Procedia PDF Downloads 337
1752 Consent and the Construction of Unlawfulness

Authors: Susanna Menis

Abstract:

The context of this study revolves around the theme of consent and the construction of unlawfulness in judicial decisions. It aims to explore the formation of societal perceptions of unlawfulness within the context of consensual sexual acts leading to harmful consequences. This study investigates how judges create legal rules that reflect social solidarity and protect against violence. Specifically, the research aims to understand the justification behind criminalising consensual sexual activity when categorised under different offences. The main question addressed in this study will evaluate the way judges create legal rules that they believe reflect social solidarity and protect against violence. The study employs a historical genealogy approach as its methodology. This approach allows for tracing back the original formation of societal perspectives on unlawfulness, thus highlighting the socially constructed nature of the present understanding. The data for this study will be collected through an extensive literature review, examining historical legal cases and documents that shape the understanding of unlawfulness. This will provide a comprehensive view of how social attitudes toward private sexual relations influenced the creation of legal rules. The theoretical importance of this research lies in its contribution to socio-legal scholarship. This study adds to the existing knowledge on the topic by exploring questions of unconscious bias and its origins. The findings shed light on how and why individuals possess unconscious biases, particularly within the judicial system. In conclusion, this study investigates judicial decisions concerning consensual sexual acts and the construction of unlawfulness. By employing a historical genealogy approach, the research sheds light on how judges create legal rules that reflect social solidarity and aim to protect against violence. The theoretical importance of this study lies in its contribution to understanding unconscious bias and its origins within the judicial system. Through data collection and analysis procedures, this study aims to provide valuable insights into the formation of social attitudes towards private sexual relations and its impact on legal rulings.

Keywords: consent, sexual offences, offences against the person, legal genealogy, social construct

Procedia PDF Downloads 53
1751 Sustainable Rehabilation of Ancient Structure

Authors: Ram Narayan Khare, Aradhna Shrivastava, Adhyatma Khare

Abstract:

This paper focuses on the damage that has been occurred in the Ancient structures due to various factors such as rainfall, climate, insects, lifespan and also most important lack of technologies in the era of its construction. The structure is of lime surkhi masonry and is made a century ago. It has crossed its durability but is of historical importance for the area, that is the reason why it needs utmost importance for its Rehabilitation. The paper deals with the damage that has been occurred in the structure and how to repair and renovate the same keeping in mind that the material deviation could not take place because it shows how in ancient era structures are made of. The building has used lime surkhi mortar along with wood apple as fibrous material for providing adhesiveness in masonry binding. The paper helps in sustainable retrofitting of the structure without changing the integrity of the structure. This helps in maintaining the originality of structure in present era and also help in providing information to the upcoming generation how ancient civil construction has been carried out that withstand even more than a century.

Keywords: Lime Surkhi masonry, rehabilitation, sustainable development, historical building

Procedia PDF Downloads 21
1750 House Extension Strategy in High-Density Informal Settlement: A Case Study in Kampung Cikini, Jakarta, Indonesia

Authors: Meidesta Pitria, Akiko Okabe

Abstract:

In high-density informal settlement, extension area at the outside of the houses could primarily happen as a spatial modification response. House extension in high-density informal settlement is not only becoming a physical spatial modification that makes a blur zone between private and public but also supporting the growth and existence of informal economy and other daily activities in both individuals and communities. This research took a case study in an informal settlement named Kampung Cikini, a densely populated area in Central Jakarta. The aim of this study is to identify and clarify house extension as a strategy in dealing with urbanization in an informal settlement. By using the perspective and information from housewives, the analysis is based on the assumption that land ownership transformation and the activities in house extension area influence the different kinds of house extension’s spatial modification and local planning policy in relation with the implementation of house extension strategy. The data collection was done in four sites, two sites are located in outer-wide alley and another two sites are located in inner-narrow alley. In this research, data of 104 housewives in 86 houses were collected through representatives of housewives and local leader of each sites. The research was started from participatory mapping process, deep interview with local leader, and initiated collaboration with housewives community in having a celebration as communal event to cultivate together the issue. This study shows that land ownership, activities, and alley are indispensable in the decision of extension space making. The more permanency status of land ownership the more permanent and various extension could be implemented. However, in some blocks, the existence of origin house or first land owner also has a significant role in coordination and agreement in using and modifying extension space. In outer-wide alley, the existence of more various activities in front area of the houses is significantly related with the chance given by having wider alley, particularly for informal income generating activities. In the inner-narrow alley, limited space in front of the houses affects more negotiations in the community for having more shared spaces, even inside their private space.

Keywords: house extension, housewives, informal settlement, kampung, high density

Procedia PDF Downloads 202
1749 Hyperthyroidism in a Private Medical Services Center, Addis Ababa: A 5-Year Experience

Authors: Ersumo Tessema, Bogale Girmaye Tamrat, Mohammed Burka

Abstract:

Background: Hyperthyroidism is a common thyroid disorder especially in women and characterized by increased thyroid hormone synthesis and secretion. The disorder manifests predominantly as Graves’ disease in iodine-sufficient areas and has increasing prevalence in iodine-deficient countries in patients with nodular thyroid disease and following iodine fortification. In Ethiopia, the magnitude of the disorder is unknown and, in Africa, due to scarcity of resources, its management remains suboptimal. Objective: The aim of this study was to analyze the pattern and management of patients with hyperthyroidism at the United Vision Medical Services Center, Addis Ababa between August 30, 2013, and February 1, 2018. Patients and methods: The study was a retrospective analysis of medical records of all patients with hyperthyroidism at the United Vision Private Medical Services Center, Addis Ababa. A questionnaire was filled out; the collected data entered into a computer and statistically analyzed using the SPSS package. The results were tabulated and discussed with literature review. Results: A total of 589 patients were included in this study. The median age was 40 years, and the male to female ratio was 1.0:7.9. Most patients (93%) presented with goiter and the associated features of toxic goiter except weight loss, sweating and tachycardia were uncommon. Majority of patients presented more than two years after the onset of their presenting symptoms. The most common physical finding (91%), as well as diagnosis, was toxic nodular goiter. The most frequent (83%) derangement in the thyroid function tests was a low thyroid-stimulating hormone, and the most commonly (94%) used antithyroid drug was a propylthiouracil. The most common (96%) surgical procedure in 213 patients was a near-total thyroidectomy with a postoperative course without incident in 92% of all the patients. Conclusion: The incidence and prevalence of hyperthyroidism are apparently on the increase in Addis Ababa, which may be related to the existing severe iodine-deficiency and or the salt iodation program (iodine-induced hyperthyroidism). Hyperthyroidism predominantly affects women and, in surgical services, toxic nodular goiter is more common than diffuse goiter, and the treatment of choice in experienced hands is a near-total thyroidectomy.

Keywords: Ethiopia, grave’s disease, hyperthyroidism, toxic nodular goiter

Procedia PDF Downloads 171
1748 Substitution of Silver-Thiosulfate (STS) with Some Essential Oils on Vase-Life of Cut Carnation cv. Liberty

Authors: Mohammad Bagher Hassanpouraghdam, Mohammad Ali Aazami Mavaloo

Abstract:

Due to the huge side-effects of chemicals; essential oils have been considered as suitable alternatives for keeping the vase-life of cut flowers mainly owing to the availability and environment-friend nature of these bio-chemicals. In the present experiment, 50% substitution of STS was achieved and tested on cut carnation flowers cv. Liberty by using the essential oils from four plants; Satureja sahendica Bornm., Echinophora platyloba DC., Tanacetum balsamita L. and Cupressus arizonica Greene., as CRD with five treatments and 3 replications. Vase-life and flower diameter were affected with 50% substitution of STS by essential oils from C. arizonica and T. balsamita. Membrane stability index, Malondialdehyde (MDA) content and Hydrogen peroxide (H2O2) amounts were affected by the substitution treatments as well. The main preservative effect belonged to the substitution with C. arizonica. So that, 50% STS substitution with Cupressus oil holds the highest membrane integrity and the least data for MDA and H2O2 content.

Keywords: Carnation, essential oil, Membrane stability index (MSI), vase life

Procedia PDF Downloads 492
1747 An AFM Approach of RBC Micro and Nanoscale Topographic Features During Storage

Authors: K. Santacruz-Gomez, E. Silva-Campa, S. Álvarez-García, V. Mata-Haro, D. Soto-Puebla, M. Pedroza-Montero

Abstract:

Blood gamma irradiation is the only available method to prevent transfusion-associated graft versus host disease (TA-GVHD). However, when blood is irradiated, determine blood shelf time is crucial. Non-irradiated blood has a self-time from 21 to 35 days when is preserved with an anticoagulated solution and stored at 4°C. During their storage, red blood cells (RBC) undergo a series of biochemical, biomechanical and molecular changes involving what is known as storage lesion (SL). SL include loss of structural integrity of RBC, a decrease of 2,3-diphosphatidylglyceric acid levels, and an increase of both ion potassium concentration and hemoglobin (Hb). On the other hand, Atomic force Microscopy (AFM) represents a versatile tool for a nano-scale high-resolution topographic analysis in biological systems. In order to evaluate SL in irradiated and non-irradiated blood, RBC topography and morphometric parameters were obtained from an AFM XE-BIO system. Cell viability was followed using flow cytometry. Our results showed that early markers as nanoscale roughness, allow us to evaluate blood quality since another perspective.

Keywords: AFM, blood γ-irradiation, roughness, storage lesion

Procedia PDF Downloads 526
1746 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System

Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji

Abstract:

Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.

Keywords: Biba model, break the glass, context, cross-domain, fine-grained

Procedia PDF Downloads 537
1745 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 104
1744 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 458
1743 Post-Earthquake Damage Detection Using System Identification with a Pair of Seismic Recordings

Authors: Lotfi O. Gargab, Ruichong R. Zhang

Abstract:

A wave-based framework is presented for modeling seismic motion in multistory buildings and using measured response for system identification which can be utilized to extract important information regarding structure integrity. With one pair of building response at two locations, a generalized model response is formulated based on wave propagation features and expressed as frequency and time response functions denoted, respectively, as GFRF and GIRF. In particular, GIRF is fundamental in tracking arrival times of impulsive wave motion initiated at response level which is dependent on local model properties. Matching model and measured-structure responses can help in identifying model parameters and infer building properties. To show the effectiveness of this approach, the Millikan Library in Pasadena, California is identified with recordings of the Yorba Linda earthquake of September 3, 2002.

Keywords: system identification, continuous-discrete mass modeling, damage detection, post-earthquake

Procedia PDF Downloads 367
1742 Examining the Racialisation of White Workers in Rural Louisiana as a Technology of Capitalist Management and Control

Authors: Kendall Artz

Abstract:

In the 1950s, a wave of violent labor unrest shook a small town in south-western Louisiana leading to the racialisation of workers—previously considered white—as ‘mixed-race’ or, in local terms, ‘Redbone.’ This paper examines why the group known as ‘Redbones’ were marked as non-white in relation to strike violence and their opposition to capitalist expansion. Utilising archival research, historiography and oral testimony, I examine how an instance of labor unrest was reinterpreted by local law enforcement, an interstate capitalist class and the national press as calling into question the racial integrity of a group of workers who had been formerly marked as white. This explosive and largely unstudied strike provides an opportunity to better understand how racialisation operates as a technology of control, even over individuals who appear phenotypically white. The strike at Elizabeth allows a glimpse at the tactics of representatives of white supremacy when white workers do not fully embrace the ‘wages of whiteness.

Keywords: American federation of labor, labor history, Louisiana history, wages of whiteness

Procedia PDF Downloads 184
1741 The Construction of Multilingual Online Gaming Community

Authors: Dina Alnefaie

Abstract:

This poster presents a study of a Discord private server with thirteen multilingual gamers, aiming to explore the elements that construct a multilingual online gaming community. The study focuses on the communication practices of four Saudi female and male gamers, using various data collection methods, including online observations through recorded videos and screenshots, interviews, and informal conversations for one year. The primary findings show that translanguaging was a prominent feature of their verbal and textual communication practices. Besides, these practices that mostly accompany cultural ones were used to facilitate communication and express their identities in an intercultural context.

Keywords: online community construction, perceptions, multilingualism, digital identity

Procedia PDF Downloads 81
1740 Seismic Response and Sensitivity Analysis of Circular Shallow Tunnels

Authors: Siti Khadijah Che Osmi, Mohammed Ahmad Syed

Abstract:

Underground tunnels are one of the most popular public facilities for various applications such as transportation, water transfer, network utilities and etc. Experience from the past earthquake reveals that the underground tunnels also become vulnerable components and may damage at certain percentage depending on the level of ground shaking and induced phenomena. In this paper a numerical analysis is conducted in evaluating the sensitivity of two types of circular shallow tunnel lining models to wide ranging changes in the geotechnical design parameter. Critical analysis has been presented about the current methods of analysis, structural typology, ground motion characteristics, effect of soil conditions and associated uncertainties on the tunnel integrity. The response of the tunnel is evaluated through 2D non-linear finite element analysis, which critically assesses the impact of increasing levels of seismic loads. The finding from this study offer significant information on improving methods to assess the vulnerability of underground structures.

Keywords: geotechnical design parameter, seismic response, sensitivity analysis, shallow tunnel

Procedia PDF Downloads 438
1739 Unpacking the Spatial Outcomes of Public Transportation in a Developing Country Context: The Case of Johannesburg

Authors: Adedayo B. Adegbaju, Carel B. Schoeman, Ilse M. Schoeman

Abstract:

The unique urban contexts that emanated from the apartheid history of South Africa informed the transport landscape of the City of Johannesburg. Apartheid‘s divisive spatial planning and land use management policies promoted sprawling and separated workers from job opportunities. This was further exacerbated by poor funding of public transport and road designs that encouraged the use of private cars. However, the democratization of the country in 1994 and the hosting of the 2010 FIFA World Cup provided a new impetus to the city’s public transport-oriented urban planning inputs. At the same time, the state’s new approach to policy formulations that entails the provision of public transport as one of the tools to end years of marginalization and inequalities soon began to largely reflect in planning decisions of other spheres of government. The Rea Vaya BRT and the Gautrain were respectively implemented by the municipal and provincial governments to demonstrate strong political will and commitment to the new policy direction. While the Gautrain was implemented to facilitate elite movement within Gauteng and to crowd investments and economic growths around station nodes, the BRT was provided for previously marginalized public transport users to provide a sustainable alternative to the dominant minibus taxi. The aim of this research is to evaluate the spatial impacts of the Gautrain and Rea Vaya BRT on the City of Johannesburg and to inform future outcomes by determining the existing potentials. By using the case study approach with a focus on the BRT and fast rail in a metropolitan context, the triangulation research method, which combines various data collection methods, was used to determine the research outcomes. The use of interviews, questionnaires, field observation, and databases such as REX, Quantec, StatsSA, GCRO observatory, national and provincial household travel surveys, and the quality of life surveys provided the basis for data collection. The research concludes that the Gautrain has demonstrated that viable alternatives to the private car can be provided, with its satisfactory feedbacks from users; while some of its station nodes (Sandton, Rosebank) have shown promises of transit-oriented development, one of the project‘s key objectives. The other stations have been unable to stimulate growth due to reasons like non-implementation of their urban design frameworks and lack of public sector investment required to attract private investors. The Rea Vaya BRT continues to be expanded in spite of both its inability to induce modal change and its low ridership figures. The research identifies factors like the low peak to base ratio, pricing, and the city‘s disjointed urban fabric as some of the reasons for its below-average performance. By drawing from the highlights and limitations, the study recommends that public transport provision should be institutionally integrated across and within spheres of government. Similarly, harmonization of the funding structure, better understanding of users’ needs, and travel patterns, underlined with continuity of policy direction and objectives, will equally promote optimal outcomes.

Keywords: bus rapid transit, Gautrain, Rea Vaya, sustainable transport, spatial and transport planning, transit oriented development

Procedia PDF Downloads 109
1738 The Influence of Activity Selection and Travel Distance on Forest Recreation Policies

Authors: Mark Morgan, Christine Li, Shuangyu Xu, Jenny McCarty

Abstract:

The National Wild and Scenic Rivers System was created by the U.S. Congress in 1968 (Public Law 90-542; 16 U.S.C. 1271 et seq.) to preserve outstanding natural, cultural, and recreational values of some U.S. rivers in a free-flowing condition for the enjoyment of present and future generations. This Act is notable for safeguarding the special character of these rivers while supporting management action that encourages public participation for co-creating river protection goals and strategies. This is not an easy task. To meet the challenges of modern ecosystem management, federal resource agencies must address many legal, environmental, economic, political, and social issues. The U.S. Forest Service manages a 44-mile section of the Eleven Point National Scenic River (EPR) in southern Missouri, mainly for outdoor recreation purposes. About half of the acreage is in private lands, while the remainder flows through the Mark Twain National Forest. Private land along the river is managed by scenic easements to ensure protection of scenic values and natural resources, without public access. A portion of the EPR lies adjacent to a 16,500-acre tract known as the Irish Wilderness. The spring-fed river has steep bluffs, deep pools, clear water, and a slow current, making it an ideal setting for outdoor enthusiasts. A 10-month visitor study was conducted at five access points along the EPR during 2019 so the US Forest Service could update their river management plan. A mail-back survey was administered to 560 on-site visitors, yielding a response rate of 53%. Although different types of visitors use the EPR, boating and fishing were the predominant forms of outdoor recreation. Some river use was from locals, but other visitors came from farther away. Formulating unbiased policies for outdoor recreation is difficult because managers must assign relative values to recreational activities and travel distance. Because policymaking is a subjective process, management decisions can affect user groups in different ways (i.e., boaters vs. fishers; proximate vs. distal visitors), as seen through a GIS analysis.

Keywords: activity selection, forest recreation, policy, travel distance

Procedia PDF Downloads 137
1737 Stakeholder Mapping and Requirements Identification for Improving Traceability in the Halal Food Supply Chain

Authors: Laila A. H. F. Dashti, Tom Jackson, Andrew West, Lisa Jackson

Abstract:

Traceability systems are important in the agri-food and halal food sectors for monitoring ingredient movements, tracking sources, and ensuring food integrity. However, designing a traceability system for the halal food supply chain is challenging due to diverse stakeholder requirements and complex needs. Existing literature on stakeholder mapping and identifying requirements for halal food supply chains is limited. To address this gap, a pilot study was conducted to identify the objectives, requirements, and recommendations of stakeholders in the Kuwaiti halal food industry. The study collected data through semi-structured interviews with an international halal food manufacturer based in Kuwait. The aim was to gain a deep understanding of stakeholders' objectives, requirements, processes, and concerns related to the design of a traceability system in the country's halal food sector. Traceability systems are being developed and tested in the agri-food and halal food sectors due to their ability to monitor ingredient movements, track sources, and detect potential issues related to food integrity. Designing a traceability system for the halal food supply chain poses significant challenges due to diverse stakeholder requirements and the complexity of their needs (including varying food ingredients, different sources, destinations, supplier processes, certifications, etc.). Achieving a halal food traceability solution tailored to stakeholders' requirements within the supply chain necessitates prior knowledge of these needs. Although attempts have been made to address design-related issues in traceability systems, literature on stakeholder mapping and identification of requirements specific to halal food supply chains is scarce. Thus, this pilot study aims to identify the objectives, requirements, and recommendations of stakeholders in the halal food industry. The paper presents insights gained from the pilot study, which utilized semi-structured interviews to collect data from a Kuwait-based international halal food manufacturer. The objective was to gain an in-depth understanding of stakeholders' objectives, requirements, processes, and concerns pertaining to the design of a traceability system in Kuwait's halal food sector. The stakeholder mapping results revealed that government entities, food manufacturers, retailers, and suppliers are key stakeholders in Kuwait's halal food supply chain. Lessons learned from this pilot study regarding requirement capture for traceability systems include the need to streamline communication, focus on communication at each level of the supply chain, leverage innovative technologies to enhance process structuring and operations and reduce halal certification costs. The findings also emphasized the limitations of existing traceability solutions, such as limited cooperation and collaboration among stakeholders, high costs of implementing traceability systems without government support, lack of clarity regarding product routes, and disrupted communication channels between stakeholders. These findings contribute to a broader research program aimed at developing a stakeholder requirements framework that utilizes "business process modelling" to establish a unified model for traceable stakeholder requirements.

Keywords: supply chain, traceability system, halal food, stakeholders’ requirements

Procedia PDF Downloads 103
1736 A Method for Evaluating Gender Equity of Cycling from Rawls Justice Perspective

Authors: Zahra Hamidi

Abstract:

Promoting cycling, as an affordable environmentally friendly mode of transport to replace private car use has been central to sustainable transport policies. Cycling is faster than walking and combined with public transport has the potential to extend the opportunities that people can access. In other words, cycling, besides direct positive health impacts, can improve people mobility and ultimately their quality of life. Transport literature well supports the close relationship between mobility, quality of life, and, well being. At the same time inequity in the distribution of access and mobility has been associated with the key aspects of injustice and social exclusion. The pattern of social exclusion and inequality in access are also often related to population characteristics such as age, gender, income, health, and ethnic background. Therefore, while investing in transport infrastructure it is important to consider the equity of provided access for different population groups. This paper proposes a method to evaluate the equity of cycling in a city from Rawls egalitarian perspective. Since this perspective is concerned with the difference between individuals and social groups, this method combines accessibility measures and Theil index of inequality that allows capturing the inequalities ‘within’ and ‘between’ groups. The paper specifically focuses on two population characteristics as gender and ethnic background. Following Rawls equity principles, this paper measures accessibility by bikes to a selection of urban activities that can be linked to the concept of the social primary goods. Moreover, as growing number of cities around the world have launched bike-sharing systems (BSS) this paper incorporates both private and public bikes networks in the estimation of accessibility levels. Additionally, the typology of bike lanes (separated from or shared with roads), the presence of a bike sharing system in the network, as well as bike facilities (e.g. parking racks) have been included in the developed accessibility measures. Application of this proposed method to a real case study, the city of Malmö, Sweden, shows its effectiveness and efficiency. Although the accessibility levels were estimated only based on gender and ethnic background characteristics of the population, the author suggests that the analysis can be applied to other contexts and further developed using other properties, such as age, income, or health.

Keywords: accessibility, cycling, equity, gender

Procedia PDF Downloads 400
1735 Crossroads of Care: Ethical Navigation in Faith-Based Counseling

Authors: Alexander Dolin

Abstract:

In the practice of Faith-based counseling, the clinician frequently faces multifaceted issues that come together when theological directives meet professional ethics to create a special set of dilemmas. The study narrates one working through the professional dilemmas of these Faith-based counselors, thereby looking into the tensions between the necessity of fidelity to faith and the requirements to follow the American Counseling Association Code of Ethics. Through a qualitative analysis of interviews with practitioners from various denominational backgrounds, the study has identified common ethical challenges and best practices that enable the integration of faith and ethics in practice. The findings provide insight into how faith-based counselors would reconcile a situation of conflict between religious belief and professional obligations but are striving to provide care that honors both their spiritual convictions and ethical responsibilities. This will add to existing discussions related to ethical decision-making in faith-based counseling by providing practical ways of dealing with these dilemmas in support of the counselor's professional integrity and spiritual mission.

Keywords: ethics, faith, common challenges, practical tools, counseling

Procedia PDF Downloads 10
1734 Is Maternity Discrimination Pushing Women out of Work? A Case Study of Maternity Experiences of Working Women in Malaysia

Authors: Nor Hafizah Selamat, Intan Hashima Mohd Hashim, Noraida Endut, Shariffah Suraya Syed Jamaludin, Sharifah Zahhura Syed Abdullah, Suziana Mat Yasin, Nurul Jannah Ambak

Abstract:

In Malaysia, report on discrimination against pregnant women at work does exist, and this issue should be taken seriously as large proportion of women in the workforce in Malaysia are of reproductive age. It has been well established that women tend to leave the workforce because of their responsibility in raising the family, to care for family members and, also due to lack of work-life balance. In this case, women find themselves disadvantaged in career and job advancements due to gender roles and expectations connected with maternity. This maternity discrimination have pushed women out of work although The Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW), to which Malaysia is a party, considers discrimination on the ground of maternity is a form of gender discrimination because it hinders women of their effective right to work and requires that special protection be provided for women during maternity to ensure their ability to enjoy the right to work (Article 11(2). What factors prevent women from returning to work and at the same time performing their gender roles expectations? Using semi-structured in-depth interviews this paper explores the experiences of maternity discrimination and their perspectives towards their work employment. 15 women employees who were pregnant or had given birth during her employment period in public and private organizations in Malaysia were participated in this study. While data were analyzed using narrative analysis, respondents were asked on issues related to managing pregnancy, maternity leave and returning to work. The findings revealed that several respondents from private companies stated that they were either dismissed or forced to take unpaid leave due to the company policies. In some cases, respondents also shared how they were treated poorly that they felt that they had to leave their jobs. However, in public organization, the maternity policy implemented showed the support that the employees received from their employer. Study shows that supportive family and employers will encourage employees to return to work. Reasonable adjustments in terms of maternity policies at workplace such as allowing sufficient time in postnatal appointments, offering clear explanation on maternity issues at workplace are something that employees expected from their employers.

Keywords: maternity discrimination, women and work, gender, maternity protection, Malaysia

Procedia PDF Downloads 113