Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1278

Search results for: socially engineered attacks

528 Transgression, Resistance and Independent Art in Russia

Authors: Oxana Vasilyeva

Abstract:

This paper draws on research in progress focusing on independent art in the Russian Federation. I am using the concept of independent art to mean art free from state control and established restrictive narratives. The Russian state pursues its interests by supporting or forbidding certain forms of art, and art that promotes values in opposition to the official political course is often forbidden. Arguments presented below draw from fieldwork carried out in Russian cities of Moscow and Saint Petersburg in June – August 2019, which included in-depth interviews with artists. This research explores socially engaged artistic works and their effect on socio-political state of affairs. It argues that artistic works entering public places have a potential to challenge autocratic system and inspire civil society to be critically engaged and to be capable to resist state propaganda. I am focusing on those artists who have a critical stance towards the current Russian political regime and analyzing their works in terms of transgression. By using the framework of transgression I aim to demonstrate how artists step across existing norms with their art influencing political and social order. To show the connection between the factors mentioned above, I will turn to two examples of transgressive aesthetics; one is individual and another is collective. The first example is Konstantin Benkovich, an artist who makes his works out of steel rebar, which is considered to be a symbol of the lack of freedom, as it is usually encountered in prison settings. The second example is a collective art practice called Monstration. It combines techniques of a demonstration and a carnival atmosphere. In 2019 Monstration was held in 30 Russian cities, despite the dissatisfaction of the authorities.

Keywords: art, culture, resistance, Russia

Procedia PDF Downloads 107
527 Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training

Authors: Shaila Rana, Wasim Alhamdani

Abstract:

Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices.

Keywords: virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training

Procedia PDF Downloads 194
526 The Potential of Small-Scale Urban Food Growing to Supplement Households’ Diets and Provide Health and Wellbeing Benefits

Authors: Bethany Leake, Samantha Caton, Paul Norman, Jill Edmondson

Abstract:

With the majority of the UK population residing in urban areas and with the pressures both environmentally and socially on rural agriculture, the role of urban food production, particularly urban horticulture (UH), is increasingly important in the future of UK food security. UH has the potential to provide an important contribution to urban diets and to provide additional benefits to human health and well-being. While allotments are the traditional focus of UH and play an important role, as access to this type of land is limited and unequal across cities, other forms of UH space, such as domestic growing, will need to be utilized to provide a significant contribution to urban diets. It is theorized that this smaller scale of growing may also be a more accessible way of engaging novice growers in UH. A collaborative research project, Urban Harvest, was designed between the University of Sheffield and Sheffield-based food organizations, which aimed to engage inexperienced gardeners in UH by providing them with home food-growing kits (Grow-Kits). Grow-Kits were provided to 189 participants across Sheffield in 2022, 48% of whom had never grown food before. Data collected through surveys and interviews will help us to evaluate the effect of small-scale food growing on health and wellbeing and the potential of this type of scheme to encourage future UH engagement. This data and increasing evidence on the co-benefits of UH have important implications not only for local food security but also for urban health inequalities and the potential use of this activity for preventative healthcare.

Keywords: urban horticulture, health and wellbeing, food security, nutrition

Procedia PDF Downloads 62
525 Site Analysis’ Importance as a Valid Factor in Building Design

Authors: Mekwa Eme, Anya chukwuma

Abstract:

The act of evaluating a particular site physically and socially in order to create a good design solution that will address the physical and interior environment of the location is known as architectural site analysis. This essay will describe site analysis as a useful design component. According to the introduction and supporting research, site evaluation and analysis are crucial to good design in terms of topography, orientation, site size, accessibility, rainfall, wind direction, and times of sunrise and sunset. Methodology: Both quantitative and qualitative analyses are used in this paper. The primary and secondary types of data collection are as follows. This information was gathered via the case study approach, already published literature, journals, the internet, a local poll, oral interviews, inquiries, and in-person interviews. The purpose of this is to clarify the benefits of site analysis for the design process and its implications for the working or building stage. Results: Each site's criteria are unique in terms of things like soil, plants, trees, accessibility, topography, and security. This will make it easier for the architect and environmentalist to decide on the idea, shape, and supporting structures of the design. It is crucial because before any design work is done, the nature of the target location will be determined through site visits and research. The location, contours, site features, and accessibility are just a few of the topics included in this site study. In order for students and working architects to understand the nature of the site they will be working on, site analysis is a key component of architectural education. The building's orientation, the site's circulation, and the sustainability of the site may all be determined with thorough research of the site's features.

Keywords: analysis, climate, statistics, design

Procedia PDF Downloads 228
524 Social Identification among Employees: A System Dynamic Approach

Authors: Muhammad Abdullah, Salman Iqbal, Mamoona Rasheed

Abstract:

Social identity among people is an important source of pride and self-esteem, consequently, people struggle to preserve a positive perception of their groups and collectives. The purpose of this paper is to explain the process of social identification and to highlight the underlying causal factors of social identity among employees. There is a little research about how the social identity of employees is shaped in Pakistan’s organizational culture. This study is based on social identity theory. This study uses Systems’ approach as a research methodology. The feedback loop approach is applied to explain the underlying key elements of employee behavior that collectively form social identity among social groups in corporate arena. The findings of this study reveal that effective, evaluative and cognitive components of an individual’s personality are associated with the social identification. The system dynamic feedback loop approach has revealed the underlying structure that is associated with social identity, social group formation, and effective component proved to be the most associated factor. This may also enable to understand how social groups become stable and individuals act according to the group requirements. The value of this paper lies in the understanding gained about the underlying key factors that play a crucial role in social group formation in organizations. It may help to understand the rationale behind how employees socially categorize themselves within organizations. It may also help to design effective and more cohesive teams for better operations and long-term results. This may help to share knowledge among employees as well. The underlying structure behind the social identification is highlighted with the help of system modeling.

Keywords: affective commitment, cognitive commitment, evaluated commitment, system thinking

Procedia PDF Downloads 117
523 The Association between Masculinity and Anxiety in Canadian Men

Authors: Nikk Leavitt, Peter Kellett, Cheryl Currie, Richard Larouche

Abstract:

Background: Masculinity has been associated with poor mental health outcomes in adult men and is colloquially referred to as toxic. Masculinity is traditionally measured using the Male Role Norms Inventory, which examines behaviors that may be common in men but that are themselves associated with poor mental health regardless of gender (e.g., aggressiveness). The purpose of this study was to examine if masculinity is associated with generalized anxiety among men using this inventory vs. a man’s personal definition of it. Method: An online survey collected data from 1,200 men aged 18-65 across Canada in July 2022. Masculinity was measured using: 1) the Male Role Norms Inventory Short Form and 2) by asking men to self-define what being masculine means. Men were then asked to rate the extent they perceived themselves to be masculine on a scale of 1 to 10 based on their definition of the construct. Generalized anxiety disorder was measured using the GAD-7. Multiple linear regression was used to examine associations between each masculinity score and anxiety score, adjusting for confounders. Results: The masculinity score measured using the inventory was positively associated with increased anxiety scores among men (β = 0.02, p < 0.01). Masculinity subscales most strongly correlated with higher anxiety were restrictive emotionality (β = 0.29, p < 0.01) and dominance (β = 0.30, p < 0.01). When traditional masculinity was replaced by a man’s self-rated masculinity score in the model, the reverse association was found, with increasing masculinity resulting in a significantly reduced anxiety score (β = -0.13, p = 0.04). Discussion: These findings highlight the need to revisit the ways in which masculinity is defined and operationalized in research to better understand its impacts on men’s mental health. The findings also highlight the importance of allowing participants to self-define gender-based constructs, given they are fluid and socially constructed.

Keywords: masculinity, generalized anxiety disorder, race, intersectionality

Procedia PDF Downloads 53
522 Exploring the Contribution of Higher Education to Sustainable Development: A Bibliometric Analysis of Research on Social Sustainability

Authors: Mestawot Beyene Tafese, Erika Kopp

Abstract:

Sustainable development, aimed at meeting current needs while safeguarding the needs of future generations, is a global imperative. Higher education stands as a pivotal force in fostering sustainable values and behaviors. However, most scholars and governments primarily focus on environmental and economic aspects. Consequently, this study examines the distribution patterns of higher education for social sustainability. The study highlights overall annual scientific production trends, leading journals and countries in scientific publication, most researched topics, and frequently used keywords. The study utilized a bibliometric method with the aid of the R Studio program. The analysis reveals Sustainability (Switzerland) as the leading journal, with 292 articles published, followed by the International Journal of Sustainability in Higher Education, which published 186 articles. Additionally, the USA is identified as the leading country, with Spain ranking second in producing research related to higher education for socially sustainable development. Among the 54 African countries, only South Africa ranks 13th, contributing fifty-nine scientific articles. Furthermore, higher education for sustainability, sustainable education, sustainable development goals, etc., emerge as the most researched topics, while the term "higher education" is prevalent in 29% and "sustainability" in 28% of the documents. Notably, according to the analysis, social sustainability is the focus of only 3% of articles. This suggests that academics researching sustainable development and higher education have overlooked social sustainability, a crucial human component of sustainable development. Consequently, the researchers concluded that social academics who are interested in studying sustainable development and higher education should give priority to social sustainability.

Keywords: higher education, bibliometric analysis, social sustainability, sustainable development

Procedia PDF Downloads 38
521 The Inhibition of Sexual Pleasure and Its Associations with Cultural Messages

Authors: Fabiola Trejo Perez, Rolando Diaz Loving

Abstract:

Sexual pleasure consists of the positively valued feelings induced by sexual stimuli, but it is also weighed down by pop-psychological baggage, and subjected to cross-cultural and cross-historical variation. Social and individual interpretations of what can or can’t be considered as pleasurable are intertwined with culture’s predominant values, norms and beliefs. For each culture, sexual norms work as a guide to be followed in order to model socially accepted behaviors. Therefore, cultural messages regarding sexuality are usually directed to restrict men and women from enjoyment, sexual satisfaction and specifically orgasm. Given that sexual pleasure hasn’t been recognized as an accepted topic of open discussion, particularly for women, people have to eventually complement their knowledge using their own experience filling in the blanks from what little has been said. Thus, this research aims to identify which are the particular social messages associated with the easing or inhibition of sexual pleasure. Three hundred Mexican men and women ages 25 to 35 years old answered a self-report survey composed by the Inventory of facilitators and inhibitors of sexual pleasure and the Sexual premises questionnaire via pencil-paper and online. Results show a high endorsement to double standard messages associated with higher levels of sexual pleasure inhibitors like feeling pressured to have sexual activity, guilt and inability to reach orgasm, in contrast with people who endorse more permissive norms and beliefs, feeling connected to their sexual partners and confident with themselves. These results illustrate that the shaping of sexuality, from experience to society, is comprised of an important relationship between culture and sexual pleasure.

Keywords: culture, sexual double standard, sexual norms and beliefs, sexual pleasure

Procedia PDF Downloads 209
520 Effect of Nicotine on the Reinforcing Effects of Cocaine in a Nonhuman Primate Model of Drug Use

Authors: Mia I. Allen, Bernard N. Johnson, Gagan Deep, Yixin Su, Sangeeta Singth, Ashish Kumar, , Michael A. Nader

Abstract:

With no FDA-approved treatments for cocaine use disorders (CUD), research has focused on the behavioral and neuropharmacological effects of cocaine in animal models, with the goal of identifying novel interventions. While the majority of people with CUD also use tobacco/nicotine, the majority of preclinical cocaine research does not include the co-use of nicotine. The present study examined nicotine and cocaine co-use under several conditions of intravenous drug self-administration in monkeys. In Experiment 1, male rhesus monkeys (N=3) self-administered cocaine (0.001-0.1 mg/kg/injection) alone and cocaine+nicotine (0.01-0.03 mg/kg/injection) under a progressive-ratio schedule of reinforcement. When nicotine was added to cocaine, there was a significant leftward shift and significant increase in peak break point. In Experiment 2, socially housed female and male cynomolgus monkeys (N=14) self-administered cocaine under a concurrent drug-vs-food choice schedule. Combining nicotine significantly decreased cocaine choice ED50 values (i.e., shifted the cocaine dose-response curve to the left) in females but not in males. There was no evidence of social rank differences. In delay discounting studies, the co-use of nicotine and cocaine required significantly larger delays to the preferred drug reinforcer to reallocate choice compared with cocaine alone. Overall, these results suggest drug interactions of nicotine and cocaine co-use is not simply a function of potency but rather a fundamentally distinctive condition that should be utilized to better understand the neuropharmacology of CUD and the evaluation of potential treatments.

Keywords: polydrug use, animal models, nonhuman primates, behavioral pharmacology, drug self-administration

Procedia PDF Downloads 75
519 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 103
518 Multiscale Model of Blast Explosion Human Injury Biomechanics

Authors: Raj K. Gupta, X. Gary Tan, Andrzej Przekwas

Abstract:

Bomb blasts from Improvised Explosive Devices (IEDs) account for vast majority of terrorist attacks worldwide. Injuries caused by IEDs result from a combination of the primary blast wave, penetrating fragments, and human body accelerations and impacts. This paper presents a multiscale computational model of coupled blast physics, whole human body biodynamics and injury biomechanics of sensitive organs. The disparity of the involved space- and time-scales is used to conduct sequential modeling of an IED explosion event, CFD simulation of blast loads on the human body and FEM modeling of body biodynamics and injury biomechanics. The paper presents simulation results for blast-induced brain injury coupling macro-scale brain biomechanics and micro-scale response of sensitive neuro-axonal structures. Validation results on animal models and physical surrogates are discussed. Results of our model can be used to 'replicate' filed blast loadings in laboratory controlled experiments using animal models and in vitro neuro-cultures.

Keywords: blast waves, improvised explosive devices, injury biomechanics, mathematical models, traumatic brain injury

Procedia PDF Downloads 232
517 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 10
516 The Role of QX-314 and Capsaicin in Producing Long-Lasting Local Anesthesia in the Animal Model of Trigeminal Neuralgia

Authors: Ezzati Givi M., Ezzatigivi N., Eimani H.

Abstract:

Trigeminal Neuralgia (TN) consists of painful attacks often triggered with general activities, which cause impairment and disability. The first line of treatment consists of pharmacotherapy. However, the occurrence of many side-effects limits its application. Acute pain relief is crucial for titrating oral drugs and making time for neurosurgical intervention. This study aimed to examine the long-term anesthetic effect of QX-314 and capsaicin in trigeminal neuralgia using an animal model. TN was stimulated by surgical constriction of the infraorbital nerve in rats. After seven days, anesthesia infiltration was done, and the duration of mechanical allodynia was compared. Thirty-five male Wistar rats were randomly divided into seven groups as follows: control (normal saline); lidocaine (2%); QX314 (30 mM); lidocaine (2%)+QX314 (15 mM); lidocaine (2%)+QX314 (22 mM); lidocaine (2%)+QX314 (30 mM); and lidocaine (2%)+QX314 (30 mM) +capsaicin (1μg). QX314 in combination with lidocaine significantly increased the duration of anesthesia, which was dose-dependent. The combination of lidocaine+QX314+capsaicin could significantly increase the duration of anesthesia in trigeminal neuralgia. In the present study, we demonstrated that the combination of QX-314 with lidocaine and capsaicin produced a long-lasting, reversible local anesthesia and was superior to lidocaine alone in the fields of the duration of trigeminal neuropathic pain blockage.

Keywords: trigeminal neuralgia, capsaicin, lidocaine, long-lasting

Procedia PDF Downloads 101
515 Structural Performance of Prefabricated Concrete and Reinforced Concrete Structural Walls under Blast Loads

Authors: S. Kamil Akin, Turgut Acikara

Abstract:

In recent years the world and our country has experienced several explosion events occurred due to terrorist attacks and accidents. In these explosion events many people have lost their lives and many buildings have been damaged. If structures were designed taking the blast loads into account, these results may not have happened or the casualties would have been less. In this thesis analysis of the protection walls have been conducted to prevent the building damage from blast loads. These analyzes was carried out for two different types of wall, concrete and reinforced concrete. Analyses were carried out on four different thicknesses of each wall element. In each wall element the stresses and displacements of the exposed surface due to the detonation charge has been calculated. The limit shear stress and displacement of the wall element according to their material properties has been taken into account. As the result of the analyses the standoff distances and TNT equivalent amount has been determined. According to equivalent TNT amounts and standoff distances the structural response of the protective wall elements has been observed. These structural responses have been observed by ABAQUS finite element package. Explosion loads were brought into effect to the protective wall element models by using the ABAQUS / CONWEP.

Keywords: blast loading, blast wave, TNT equivalent method, CONWEP, finite element analysis, detonation

Procedia PDF Downloads 422
514 The Mask of Motherhood a Changing Identity During the Transition to Motherhood

Authors: Geraldine Mc Loughlin, Mary Horgan, Rosaleen Murphy

Abstract:

Childbirth is a life-changing event, a psychological transition for the mother that must be viewed in a social context. Much has been written and documented regarding the preparation for birth and the immediate postnatal period, but the full psychological impact on the mother is not clear. One aspect of the transition process is Identity. Depending on a person’s worldview, the concept of identity is viewed differently; the nature of reality and how they construct knowledge influence these perspectives. Becoming a mother is not just an event but a process that time and experience will help to shape the understanding of the woman. To explore the emotional and psychological aspects of first-time mother’s experience during the transition to new motherhood. To identify factors affecting women’s identities in the period of 36 weeks gestation to 12 weeks postpartum. Interpretative Phenomenological Analysis (IPA) was used. It explores how these women make sense of and give meaning to their experiences. IPA is underpinned by 3 key principles: phenomenology, hermeneutics and idiographics. A purposeful sample of 10 women was recruited for this longitudinal study, to enable data to be collected during the transition to motherhood. Individual identity was interpreted and viewed as developing in response to changing contexts, such as the birth event becoming a parent, enabling one to construct one’s own sense of a meaningful life. Women effectively differentiated themselves from their personal and social identities and took responsibility for their actions. Identity is culturally and socially shaped and experienced, though not experienced similarly by all women. The individualized perspective on identity recognizes that (a) social influences are seen as external to the individual and (b) the view that social influences are, in fact, internalized by the individual.

Keywords: motherhood, transition, identity, IPA

Procedia PDF Downloads 41
513 Using Customer Satisfaction to Help Achieve Sustainable Development Goals in the Islamic Economy: A Quantitative Case Study from Amman, Jordan

Authors: Sarah A. Tobin

Abstract:

Social justice outcomes, derived from customer satisfaction, serve as a main pathway and conduit for achieving Sustainable Development Goals (SDGs) because they prompt democratizing and socially-inclusive effects that are consistent with Islamic economic values. This paper argues that achieving higher levels of social justice and the SGDs is possible only through the realization of Islamic banking and finance customer satisfaction that aligns with Islamic values in the tradition of the Shari`a (or Islamic law). Through this key manifestation of Shari`a in the banks, social justice aims of achieving SDGs become possible. This paper utilizes a case study of a large-scale survey (N=127) comparing customer satisfaction between a conventional and an Islamic bank in Amman, Jordan. Based on a series of linear regressions, the statistically-significant findings suggest that when overall customer satisfaction is high, customers are more likely to become empowered citizens demanding inclusive, quality services and corruption-free management, as well as attribute their experiences to the Islamic nature of the financial endeavors. Social justice interests and expectations increase (and SDGs are more likely met) when a customer has high levels of satisfaction. The paper concludes with policy recommendations for Islamic financial institutions that enhance customer service experiences for better achieving the social justice aims of the Islamic economy and SDGs, including transparency in transactions, exemplary customer service and follow up, and attending to Islamic values in the aesthetics of bank.

Keywords: customer satisfaction, Islamic economy, social justice, sustainable development goals

Procedia PDF Downloads 323
512 Poverty and Environmental Degeneration in Central City of Ibadan, Nigeria

Authors: Funmilayo Lanrewaju Amao, Amos Olusegun Amao, Odetoye Adeola Sunday, Joseph Joshua Olu

Abstract:

There is a high magnitude of housing inadequacy in urban centers in Nigeria. This is manifested in quantitative and qualitative terms. Severe overcrowding and insanitary physical environment characterize the housing in the urban centers. The culminating effect of this is the growth of slum areas. This paper takes a critical look at inter-allia history and anatomy, general characteristic, present condition, root causes, official responses and reactions, possible solution and advocacy housing in central city slum of Ibadan. It also examines slum development and consequent deviant behaviors in the inner-city neighborhoods of Ibadan, the capital city of Oyo State, Nigeria. Residing there are many underemployed and unemployed individuals, these are miscreants who are generally socially frustrated. The activities of this group of people are a cause of concern. Deleterious and anti-social behaviors such as prostitution and house burglary are commonplace in the neighborhoods. The paper examines building conditions in the neighborhoods and the nexus with the deviant behavior of the inhabitants. The paper affirms that there is monumental deficiency in housing quality, while the design and the arrangement of the buildings into spatial units significantly influence the behavior of the residents. The paper suggests a two-prong approach in dealing with the situation. This involves urban renewal and slum upgrading programmes on the one hand, and an improvement in the socio-economic circumstances of the inhabitants, especially an increase in employment opportunity on the other.

Keywords: slum, behavior, housing, poverty, environmental degeneration

Procedia PDF Downloads 387
511 Biological Hazards and Laboratory inflicted Infections in Sub-Saharan Africa

Authors: Godfrey Muiya Mukala

Abstract:

This research looks at an array of fields in Sub-Saharan Africa comprising agriculture, food enterprises, medicine, organisms genetically modified, microbiology, and nanotechnology that can be gained from biotechnological research and development. Findings into dangerous organisms, mainly bacterial germs, rickettsia, fungi, parasites, or organisms that are genetically engineered, have immensely posed questions attributed to the biological danger they bring forth to human beings and the environment because of their uncertainties. In addition, the recurrence of previously managed diseases or the inception of new diseases are connected to biosafety challenges, especially in rural set-ups in low and middle-income countries. Notably, biotechnology laboratories are required to adopt biosafety measures to protect their workforce, community, environment, and ecosystem from unforeseen materials and organisms. Sensitization and inclusion of educational frameworks for laboratory workers are essential to acquiring a solid knowledge of harmful biological agents. This is in addition to human pathogenicity, susceptibility, and epidemiology to the biological data used in research and development. This article reviews and analyzes research intending to identify the proper implementation of universally accepted practices in laboratory safety and biological hazards. This research identifies ideal microbiological methods, adequate containment equipment, sufficient resources, safety barriers, specific training, and education of the laboratory workforce to decrease and contain biological hazards. Subsequently, knowledge of standardized microbiological techniques and processes, in addition to the employment of containment facilities, protective barriers, and equipment, is far-reaching in preventing occupational infections. Similarly, reduction of risks and prevention may be attained by training, education, and research on biohazards, pathogenicity, and epidemiology of the relevant microorganisms. In this technique, medical professionals in rural setups may adopt the knowledge acquired from the past to project possible concerns in the future.

Keywords: sub-saharan africa, biotechnology, laboratory, infections, health

Procedia PDF Downloads 63
510 Synthesis and Two-Photon Polymerization of a Cytocompatibility Tyramine Functionalized Hyaluronic Acid Hydrogel That Mimics the Chemical, Mechanical, and Structural Characteristics of Spinal Cord Tissue

Authors: James Britton, Vijaya Krishna, Manus Biggs, Abhay Pandit

Abstract:

Regeneration of the spinal cord after injury remains a great challenge due to the complexity of this organ. Inflammation and gliosis at the injury site hinder the outgrowth of axons and hence prevent synaptic reconnection and reinnervation. Hyaluronic acid (HA) is the main component of the spinal cord extracellular matrix and plays a vital role in cell proliferation and axonal guidance. In this study, we have synthesized and characterized a photo-cross-linkable HA-tyramine (tyr) hydrogel from a chemical, mechanical, electrical, biological and structural perspective. From our experimentation, we have found that HA-tyr can be synthesized with controllable degrees of tyramine substitution using click chemistry. The complex modulus (G*) of HA-tyr can be tuned to mimic the mechanical properties of the native spinal cord via optimization of the photo-initiator concentration and UV exposure. We have examined the degree of tyramine-tyramine covalent bonding (polymerization) as a function of UV exposure and photo-initiator use via Photo and Nuclear magnetic resonance spectroscopy. Both swelling and enzymatic degradation assays were conducted to examine the resilience of our 3D printed hydrogel constructs in-vitro. Using a femtosecond 780nm laser, the two-photon polymerization of HA-tyr hydrogel in the presence of riboflavin photoinitiator was optimized. A laser power of 50mW and scan speed of 30,000 μm/s produced high-resolution spatial patterning within the hydrogel with sustained mechanical integrity. Using dorsal root ganglion explants, the cytocompatibility of photo-crosslinked HA-tyr was assessed. Using potentiometry, the electrical conductivity of photo-crosslinked HA-tyr was assessed and compared to that of native spinal cord tissue as a function of frequency. In conclusion, we have developed a biocompatible hydrogel that can be used for photolithographic 3D printing to fabricate tissue engineered constructs for neural tissue regeneration applications.

Keywords: 3D printing, hyaluronic acid, photolithography, spinal cord injury

Procedia PDF Downloads 140
509 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 329
508 Sexual Health And Male Fertility: Improving Sperm Health With Focus On Technology

Authors: Diana Peninger

Abstract:

Over 10% of couples in the U.S. have infertility problems, with roughly 40% traceable to the male partner. Yet, little attention has been given to improving men’s contribution to the conception process. One solution that is showing promise in increasing conception rates for IVF and other assisted reproductive technology treatments is a first-of-its-kind semen collection that has been engineered to mitigate sperm damage caused by traditional collection methods. Patients are able to collect semen at home and deliver to clinics within 48 hours for use in fertility analysis and treatment, with less stress and improved specimen viability. This abstract will share these findings along with expert insight and tips to help attendees understand the key role sperm collection plays in addressing and treating reproductive issues, while helping to improve patient outcomes and success. Our research was to determine if male reproductive outcomes can be increased by improving sperm specimen health with a focus on technology. We utilized a redesigned semen collection cup (patented as the Device for Improved Semen Collection/DISC—U.S. Patent 6864046 – known commercially as a ProteX) that met a series of physiological parameters. Previous research demonstrated significant improvement in semen perimeters (motility forward, progression, viability, and longevity) and overall sperm biochemistry when the DISC is used for collection. Animal studies have also shown dramatic increases in pregnancy rates. Our current study compares samples collected in the DISC, next-generation DISC (DISCng), and a standard specimen cup (SSC), dry, with the 1 mL measured amount of media and media in excess ( 5mL). Both human and animal testing will be included. With sperm counts declining at alarming rates due to environmental, lifestyle, and other health factors, accurate evaluations of sperm health are critical to understanding reproductive health, origins, and treatments of infertility. An increase in the health of the sperm as measured by extensive semen parameter analysis and improved semen parameters stable for 48 hours, expanding the processing time from 1 hour to 48 hours were also demonstrated.

Keywords: reprodutive, sperm, male, infertility

Procedia PDF Downloads 116
507 Mitigating Nitrous Oxide Production from Nitritation/Denitritation: Treatment of Centrate from Pig Manure Co-Digestion as a Model

Authors: Lai Peng, Cristina Pintucci, Dries Seuntjens, José Carvajal-Arroyo, Siegfried Vlaeminck

Abstract:

Economic incentives drive the implementation of short-cut nitrogen removal processes such as nitritation/denitritation (Nit/DNit) to manage nitrogen in waste streams devoid of biodegradable organic carbon. However, as any biological nitrogen removal process, the potent greenhouse gas nitrous oxide (N2O) could be emitted from Nit/DNit. Challenges remain in understanding the fundamental mechanisms and development of engineered mitigation strategies for N2O production. To provide answers, this work focuses on manure as a model, the biggest wasted nitrogen mass flow through our economies. A sequencing batch reactor (SBR; 4.5 L) was used treating the centrate (centrifuge supernatant; 2.0 ± 0.11 g N/L of ammonium) from an anaerobic digester processing mainly pig manure, supplemented with a co-substrate. Glycerin was used as external carbon source, a by-product of vegetable oil. Out-selection of nitrite oxidizing bacteria (NOB) was targeted using a combination of low dissolved oxygen (DO) levels (down to 0.5 mg O2/L), high temperature (35ºC) and relatively high free ammonia (FA) (initially 10 mg NH3-N/L). After reaching steady state, the process was able to remove 100% of ammonium with minimum nitrite and nitrate in the effluent, at a reasonably high nitrogen loading rate (0.4 g N/L/d). Substantial N2O emissions (over 15% of the nitrogen loading) were observed at the baseline operational condition, which were even increased under nitrite accumulation and a low organic carbon to nitrogen ratio. Yet, higher DO (~2.2 mg O2/L) lowered aerobic N2O emissions and weakened the dependency of N2O on nitrite concentration, suggesting a shift of N2O production pathway at elevated DO levels. Limiting the greenhouse gas emissions (environmental protection) from such a system could be substantially minimized by increasing the external carbon dosage (a cost factor), but also through the implementation of an intermittent aeration and feeding strategy. Promising steps forward have been presented in this abstract, yet at the conference the insights of ongoing experiments will also be shared.

Keywords: mitigation, nitrous oxide, nitritation/denitritation, pig manure

Procedia PDF Downloads 237
506 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria

Authors: Akachi Odoemene

Abstract:

There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.

Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria

Procedia PDF Downloads 230
505 Need for Shariah Screening of Companies in Nigeria: Lessons from Other Jurisdictions

Authors: Aishat Abdul-Qadir Zubair

Abstract:

Background: The absence of Shari’ah screening methodology for companies in Nigeria has further engineered the uncertainty surrounding the acceptability of investing in certain companies by people professing the religion of Islam due to the nature of the activities carried out by these companies. There are some existing shariah screening indices in other jurisdictions whose criteria can be used to check if a company or business is shariah-compliant or not. Examples such as FTSE, DJIM, Standard and Poor to mention just a few. What these indices have tried to do is to ensure that there are benchmarks to check with before investing in companies that carry out mixed activities in their business, wherein some are halal and others may be haram. Purpose: There have been numerous studies on the need to adopt certain screening methodologies as well as call for new methods in screening companies for shariah compliance in order to suit the investments needs of Muslims in other jurisdictions. It is, however, unclear how suitable these methodologies will be to Nigeria. This paper, therefore, seeks to address this gap to consider an appropriate screening methodology to be employed in Nigeria, drawing from the experience of other jurisdictions. Methods: This study employs a triangulation of both quantitative and qualitative methods to analyze the need for Shari’ah screening of companies in Nigeria. The qualitative method is used by way of ijtihad, and this study tries to apply some Islamic Principles of Maqasid al-shari’ah as well as Qawaid al-Fiqiyyah to analyze activities of companies in order to ensure that they are indeed Shari’ah compliant. In addition, using the quantitative data gathered from the interview survey, the perspective of the investors with regards to the need for Shari’ah screening of companies in Nigeria is further analyzed. Results: The result of the study shows that there is a lack of awareness from the teeming Muslim population in Nigeria on the need for Shari’ah screening of companies in Nigeria. The result further shows that there is the need to take into cognizance the peculiar nature of company activities in Nigeria before any particular Shari’ah screening methodology is adopted and setting the necessary benchmarks. Conclusion and Implications: The study concludes that there is the need to ensure that the conscious Muslims in Nigeria screen companies for Shari’ah compliance so that they can easily identify the companies to invest in. The paper, therefore, recommends that the Nigerian government need to come up with a screening methodology that will suit the peculiar nature of companies in Nigeria. The study thus has a direct implication on the Investment regulatory bodies in Nigeria such as the Securities and Exchange Commission (SEC), Central Bank of Nigeria (CBN) as well as the investor Muslims.

Keywords: Shari'ah screening, Muslims, investors, companies

Procedia PDF Downloads 152
504 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 346
503 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA

Authors: S. Saju, G. Thirugnanam

Abstract:

In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.

Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet

Procedia PDF Downloads 512
502 Bystanders' Behavior during Emergencies

Authors: Alan (Avi) Kirschenbaum, Carmit Rapaport

Abstract:

The behavior of bystanders in emergencies and disasters have been examined for over 50 years. Such acts have been cited as contributing to saving lives in terms of providing first responder help until official emergency units can arrive. Several reasons have been suggested for this type of behavior but most focused on a broad segment of individual psychological decision-making processes. Recent theoretical evidence suggests that the external factors for such bystander decisions, mainly disaster community based social contexts factors, are also important. We aim to test these competing arguments. Specifically, we examine alternative explanatory perspectives by focusing on self-efficacy as a proxy for the accepted individual psychological case and contrast it with potential bystander characteristics of the individual as well factors as embedded in the social context of the disaster community. To do so, we will utilize a random sampling of the population from a field study of an urban community in Israel that experienced five years of continuous terror attacks. The results strongly suggest that self-efficacy, as well as external factors: preparedness and having skills for intervention during emergencies along with gender best, predict potential helping behaviors. These results broaden our view of bystander behavior and open a window for enhancing this phenomenon as another element in disaster and crisis management.

Keywords: bystander behavior, disasters emergencies, psychological motivation to help, social context for helping

Procedia PDF Downloads 107
501 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 55
500 Role of Vocational Education and Training in Economic Excellence and Social Inclusion

Authors: Muhammad Ali Asadullah, Zafarullah Amir

Abstract:

In recent years, Vocational Education and Training (VET) has been under discussion by the academic researchers and remained in focus in the political grounds. Due to potential contribution of VET, the World Bank and United Nations Educational, Scientific and Cultural Organization (UNESCO) support vocational education to reduce poverty, enhance economic growth and increase competitiveness. This paper examines the impact of Vocational Education and Training on the Economic Growth and Social Inclusion with direct and mediation effect of Social Inclusion. The basic purpose of this study is to assess economic pay-offs as a result of long term investments in VET. Based on the review of Anderson Nilsson, initially we explored the increasing or decreasing trend in investment on VET. Further, the study explores that the countries which invest more on VET, tend to get more economic growth and are socially more ‘inclusive’. It is a longitudinal / panel data study with 12 years of registered data which involves 24 OECD countries. The results of the study indicate the VET has positive association with Social Inclusion and Economic Growth. Further, there is also a positive association of VET and Economic Growth through mediation of Social Inclusion. The current study considers not only issue and challenges in developing VET systems but also contributes to develop the theoretical framework for considering how VET can directly and indirectly improve economic growth and social inclusion. A wider appreciation of how VET’s benefits operate may influence a country’s decisions to invest in it. If policy makers increase investment on VET, the result would be positive in Economic Growth and Social Inclusion. It is also recommended that the same OECD model may be implemented in developing countries like Pakistan.

Keywords: Vocational Education and Training (VET), Social Inclusion, Economic Growth, OECD countries

Procedia PDF Downloads 293
499 Improvisation Transformation: An Exploration of Musical Influence between the Cuban Descarga and American Jazz Movements

Authors: Alissa Settembrino

Abstract:

Improvisation, one of the most expressive qualities of the performing arts, has allowed for entire compositions to be created through descargas. A topic relatively understudied, these combo-inspired jam sessions originated in Cuba and intrigued jazz musicians in the United States to experiment with their improvisation after the Cool Jazz era. Through the exploration of prominent improvisation-based Cuban dance styles, the crucial jazz musicians that contributed to the progression of the descarga movement and comparing such facets to that of jazz in the United States, this paper offers a critical comparative analysis to suggest how the descarga influenced American jazz. This paper specifically focuses on harmonic construction, form and rhythmic qualities, as well as how these recorded jam sessions started to change the way people listened to and enjoyed this style of music. Examining the harmonic intricacies of descargas offers the likelihood of having influenced the construction of the blues scale in American jazz. Since these recorded jam sessions originally stemmed from Cuban dance styles (the cumbia, guaracha, rumba, etc.), descarga compositions changed the way musicians structured their improvisation to meet recording guidelines as well as their audiences’ listening needs. The ways in which the descarga inspired harmonic and rhythmic change led to the movement’s influence on the jazz culture as it progressed from Cuba to New York during the 1950s. Exploring the descarga provides insight into a movement that is not commonly studied and encourages further discussion about how certain aspects of Latin American culture have influenced the United States socially and creatively.

Keywords: descarga, harmony, improvisation, jam session, jazz

Procedia PDF Downloads 148