Search results for: depression threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1502

Search results for: depression threats

662 Design of a Customized Freshly-Made Fruit Salad and Juices Vending Machine

Authors: María Laura Guevara Campos

Abstract:

The increasing number of vending machines makes it easy for people to find them more frequently in stores, universities, workplaces, and even hospitals. These machines usually offer products with high contents of sugar and fat, which, if consumed regularly, can result in serious health threats, as overweight and obesity. Additionally, the energy consumption of these machines tends to be high, which has an impact on the environment as well. In order to promote the consumption of healthy food, a vending machine was designed to give the customer the opportunity to choose between a customized fruit salad and a customized fruit juice, both of them prepared instantly with the ingredients selected by the customer. The main parameters considered to design the machine were: the storage of the preferred fruits in a salad and/or in a juice according to a survey, the size of the machine, the use of ecologic recipients, and the overall energy consumption. The methodology used for the design was the one proposed by the German Association of Engineers for mechatronics systems, which breaks the design process in several stages, from the elaboration of a list of requirements through the establishment of the working principles and the design concepts to the final design of the machine, which was done in a 3D modelling software. Finally, with the design of this machine, the aim is to contribute to the development and implementation of healthier vending machines that offer freshly-made products, which is not being widely attended at present.

Keywords: design, design methodology, mechatronics systems, vending machines

Procedia PDF Downloads 123
661 The Impact of the Economic Crisis in the European Identity

Authors: Sofía Luna, Carla González Salamanca

Abstract:

The 2008 economic crisis had huge implications in Europe. In this continent, the repercussions of the crisis were not only economic but also political and institutional. The economic stress has generated changes in the perception of the citizens, their attitude and the confidence placed in the political organizations. The lost of confidence is not only present in the debtor countries but it is also present in the European economic powers like Germany and France. This research explains how the economic crisis had an impact in the identity, population’s attitude and how this generated the rise of extreme right parties. In addition, it defines the different types of attitudes and support that exist towards these political and economic institutions. The results of this investigation show that the depression beside of its economic implications, it caused institutional, social and political difficulties for the Union. Moreover, the support and attitudes of the population were severely strained because the confidence in the political organization decreased. Furthermore, a rise in the otherness sentiment was shown. In other words, the distinction between “us” and “them” increased causing repercussions in the collective European identity. Additionally, there was a spread in national identities that caused the rise of the extreme right wing parties. In conclusion, the 2008 economic crisis caused not only economic stress but also it generated a political, social and institutional crisis in Europe.

Keywords: Europe, identity, economic crisis, otherness sentiment

Procedia PDF Downloads 484
660 Reducing Environmental Impact of Olive Oil Production in Sakaka City Using Combined Chemical, Physical, and Biological Treatment

Authors: Abdullah Alhajoj, Bassam Alowaiesh

Abstract:

This work aims to reduce the risks of discharging olive mill waste directly to the environment without treatment in Sakaka City, KSA. The organic loads expressed by chemical oxygen demand (COD) and biological oxygen demand (BOD) of the produced wastewater (OMWW) as well as the solid waste (OMW) were evaluated. The wastes emitted from the three-phase centrifuge decanters was found to be higher than that emitted from the two-phase centrifuge decanters. The olive mill wastewater (OMWW) was treated using advanced oxidation combined with filtration treatment. The results indicated that the concentration of COD, BOD, TSS, oil and grease and phenol was reduced by using complex sand filtration from 72150, 21660 10256, 36430, and 1470 mg/l to 980, 421, 58, 68, and 0.35 mg/l for three-phase OMWW and from 150562, 17955, 15325, 19658 and 2153 mg/l to 1050, 501, 29, 0.75, and 0.29 mg/l, respectively. While, by using modified trickling filter (packed with the neck of waste plastic bottles the concentration of the previously mentioned parameters was reduced to 1190, 570, 55, 0.85, and 0.3 mg/l, respectively. This work supports the application of such treatment technique for reducing the environmental threats of olive mill waste effluents in Saudi Arabia.

Keywords: two-phase, three-phase, olive mill, olive oil, waste treatment, filtration, advanced oxidation, waste plastic bottles

Procedia PDF Downloads 143
659 Community-based Mapping as a Planning Tool; Examples from Pakistan

Authors: Noman Ahmed, Fariha Tahseen

Abstract:

Since several decades, unplanned urbanization and rapid growth of informal settlements have evolved and increased in size and number. Large cities such as Karachi have been impacted with sprawl and rising share of unplanned settlements where poor communities reside. Threats of eviction, deteriorating law and order situation, lack of essential amenities and infrastructure, extortion and bullying from local and non-local musclemen and feeble response of government agencies towards their development needs are some predicaments. Non-governmental organizations (NGOs) have caused important interventions in such locations. Appraisal of the community-based mapping as a tool in supporting the development work in less privileged areas in Karachi has been the objective of this research. The Orangi Pilot Project (OPP), under the leadership of its slain director Perween Rahman had a significant role to play in developing and extending this approach in low income locations in Karachi and beyond. The paper investigates the application of mapping in the process of peri urban land invasion causing rapid transformation of traditional settlements in Karachi. Mixed methodology components comprising literature review, archival research, and unstructured interviews with key informants and case studies have been used.

Keywords: squatters (katchi abadis), land grabbing, community empowerment, housing rights, mapping, infrastructure development

Procedia PDF Downloads 304
658 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 134
657 Digital Wellbeing: A Multinational Study and Global Index

Authors: Fahad Al Beyahi, Justin Thomas, Md Mamunur Rashid

Abstract:

Various definitions of digital well-being have emerged in recent years, most of which center on the impacts -beneficial and detrimental- of digital technology on health and well-being (psychological, social, and financial). Other definitions go further, emphasizing the attainment of balance, viewing digital well-being as wholly subjective, the individual’s perception of optimal balance between the benefits and ills associated with online connectivity. Based on this broad conceptualization of digital well-being, we undertook a global survey measuring various dimensions of this emerging construct. The survey was administered across 35 nations and 7 world regions, with 1000 participants within each territory (N= 35000). Along with attitudinal, behavioral, and sociodemographic variables, the survey included measures of depression, anxiety, problematic social media use, gaming disorder, and other relevant metrics. Coupled with nation-level policy audits, these data were used to create a multinational (global) digital well-being index. Nations are ranked based on various dimensions of digital well-being, and predictive models are used to identify resilience and risk factors for problem technology use. In this paper, we will discuss key findings from the survey and the index. This work can inform public policy and shape our responses to the emerging implications of lives increasingly lived online and interconnected with digital technology.

Keywords: technology, health, behavioral addiction, digital wellbeing

Procedia PDF Downloads 60
656 A Comprehensive Review on the Effect of Corporal Punishment and Development of Defence Styles and Fear of Intimacy

Authors: Sandra Sasikumar, Noorjahan AI, Aurine Anthony

Abstract:

The background of this article is the frequently unacknowledged effects of corporal punishment in a child's life as they change into adulthood, how it may permutate into various dynamics and combinations and manifest in major areas like fear of intimacy and reactive and ineffective defending styles, which may eventually lead to much more interpersonal problems and in extreme cases psychopathology. Even though such studies require a longitudinal research design, there is a wealth of information on corporal punishment in the literature. Defense styles, or the coping mechanisms that individuals use to deal with stress and difficult emotions, can also be affected by corporal punishment. Individuals who have experienced corporal punishment may develop maladaptive defense styles, such as repression or denial, that can make it difficult for them to process and cope with their emotions. The fear of intimacy, or the fear of getting close to others, is another potential effect of corporal punishment. Individuals who have experienced physical discipline may develop a fear of physical touch, making it difficult for them to form close relationships. This fear can also lead to other mental health issues, such as anxiety and depression. It is important to note that not everyone who experiences corporal punishment will develop these issues, and other factors can contribute to the development of these problems. However, corporal punishment can have a significant impact on an individual's mental and emotional well-being.

Keywords: corporal punishment, fear of intimacy, defense styles, attachment

Procedia PDF Downloads 24
655 Trauma after Childbirth: The Mediating Effects of Subjective Experience

Authors: Grace Baptie, Jackie Andrade, Alison Bacon, Alyson Norman

Abstract:

Background: Many women experience their childbirth as traumatic, and 4-6% of mothers present with postnatal posttraumatic stress disorder (PTSD) as a result of their birth. Aims: To measure the relationship between obstetric and subjective experience of childbirth on mothers’ experience of postnatal trauma and identify salient aspects of the birth experience considered traumatic. Methods: Women who had given birth within the last year completed an online mixed-methods survey reporting on their subjective and obstetric birth experience as well as symptoms of postnatal trauma, depression and anxiety. Findings: 29% of mothers experienced their labour as traumatic and 15% met full or partial criteria for PTSD. Feeling supported and in control mediated the relationship between obstetric intervention and postnatal trauma symptoms. Five key themes were identified from the qualitative data regarding aspects of the birth considered traumatic including: obstetric complications; lack of control; concern for baby; psychological trauma and lack of support. Conclusion: Subjective birth experience is a significantly stronger predictor of postnatal trauma than level of medical intervention, the psychological consequences of which can be buffered by an increased level of support and control.

Keywords: birth trauma, perinatal mental health, postnatal PTSD, subjective experience

Procedia PDF Downloads 133
654 Risk Management for Smart Healthcare System: Multi-Criteria Decision-Making (MCDM) Approach

Authors: Abdullah, Ali, Salamai

Abstract:

Smart healthcare management systems (SHMS) play a vital role in medical centers. SHMS has various risks and threats that affect patient care. So, risk management is the best choice to identify and mitigate these risks. This study proposed a multi-criteria decision-making (MCDM) framework for identifying risks in SHMS and selecting the best project in SHMS to reduce risks. This study used the MCDM method to deal with conflict criteria. There are two MCDM methods: CRiteria Importance Through Intercriteria Correlation (CRITIC) and Additive Ration Assessment (ARAS). The CRITIC approach is used to compute the criteria weights, and the ARAS algorithm is used to select the appropriate projects in SHMS. The neutrosophic set (NS) was applied with MCDM methods to deal with inconsistent data in the evaluation process. The results show the Health Data Informational System project is the best. Sensitivity analysis was conducted to show the stability of the rank. The comparative study was conducted to show the effectiveness of the proposed methodology. The outcomes demonstrate the rank of projects is stable through all scenarios, and the proposed methodology is effective compared with MCDM methods.

Keywords: risk management, portfolio management, smart healthcare, neutrosophic set, MCDM

Procedia PDF Downloads 5
653 Strategic Mine Planning: A SWOT Analysis Applied to KOV Open Pit Mine in the Democratic Republic of Congo

Authors: Patrick May Mukonki

Abstract:

KOV pit (Kamoto Oliveira Virgule) is located 10 km from Kolwezi town, one of the mineral rich town in the Lualaba province of the Democratic Republic of Congo. The KOV pit is currently operating under the Katanga Mining Limited (KML), a Glencore-Gecamines (a State Owned Company) join venture. Recently, the mine optimization process provided a life of mine of approximately 10 years withnice pushbacks using the Datamine NPV Scheduler software. In previous KOV pit studies, we recently outlined the impact of the accuracy of the geological information on a long-term mine plan for a big copper mine such as KOV pit. The approach taken, discussed three main scenarios and outlined some weaknesses on the geological information side, and now, in this paper that we are going to develop here, we are going to highlight, as an overview, those weaknesses, strengths and opportunities, in a global SWOT analysis. The approach we are taking here is essentially descriptive in terms of steps taken to optimize KOV pit and, at every step, we categorized the challenges we faced to have a better tradeoff between what we called strengths and what we called weaknesses. The same logic is applied in terms of the opportunities and threats. The SWOT analysis conducted in this paper demonstrates that, despite a general poor ore body definition, and very rude ground water conditions, there is room for improvement for such high grade ore body.

Keywords: mine planning, mine optimization, mine scheduling, SWOT analysis

Procedia PDF Downloads 210
652 Indium-Gallium-Zinc Oxide Photosynaptic Device with Alkylated Graphene Oxide for Optoelectronic Spike Processing

Authors: Seyong Oh, Jin-Hong Park

Abstract:

Recently, neuromorphic computing based on brain-inspired artificial neural networks (ANNs) has attracted huge amount of research interests due to the technological abilities to facilitate massively parallel, low-energy consuming, and event-driven computing. In particular, research on artificial synapse that imitate biological synapses responsible for human information processing and memory is in the spotlight. Here, we demonstrate a photosynaptic device, wherein a synaptic weight is governed by a mixed spike consisting of voltage and light spikes. Compared to the device operated only by the voltage spike, ∆G in the proposed photosynaptic device significantly increased from -2.32nS to 5.95nS with no degradation of nonlinearity (NL) (potentiation/depression values were changed from 4.24/8 to 5/8). Furthermore, the Modified National Institute of Standards and Technology (MNIST) digit pattern recognition rates improved from 36% and 49% to 50% and 62% in ANNs consisting of the synaptic devices with 20 and 100 weight states, respectively. We expect that the photosynaptic device technology processed by optoelectronic spike will play an important role in implementing the neuromorphic computing systems in the future.

Keywords: optoelectronic synapse, IGZO (Indium-Gallium-Zinc Oxide) photosynaptic device, optoelectronic spiking process, neuromorphic computing

Procedia PDF Downloads 158
651 Genome-Wide Identification of Genes Resistance to Nitric Oxide in Vibrio parahaemolyticus

Authors: Yantao Li, Jun Zheng

Abstract:

Food poison caused by consumption of contaminated food, especially seafood, is one of most serious public health threats worldwide. Vibrio parahaemolyticus is emerging bacterial pathogen and the leading cause of human gastroenteritis associated with food poison, especially in the southern coastal region of China. To successfully cause disease in host, bacterial pathogens need to overcome the host-derived stresses encountered during infection. One of the toxic chemical species elaborated by the host is nitric oxide (NO). NO is generated by acidified nitrite in the stomach and by enzymes of the inducible NO synthase (iNOS) in the host cell, and is toxic to bacteria. Bacterial pathogens have evolved some mechanisms to battle with this toxic stress. Such mechanisms include genes to sense NO produced from immune system and activate others to detoxify NO toxicity, and genes to repair the damage caused by toxic reactive nitrogen species (RNS) generated during NO toxic stress. However, little is known about the NO resistance in V. parahaemolyticus. In this study, a transposon coupled with next generation sequencing (Tn-seq) technology will be utilized to identify genes for NO resistance in V. parahaemolyticus. Our strategy will include construction the saturating transposon insertion library, transposon library challenging with NO, next generation sequencing (NGS), bioinformatics analysis and verification of the identified genes in vitro and in vivo.

Keywords: vibrio parahaemolyticus, nitric oxide, tn-seq, virulence

Procedia PDF Downloads 250
650 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 105
649 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 308
648 Measurement of Natural Radioactivity and Health Hazard Index Evaluation in Major Soils of Tin Mining Areas of Perak

Authors: Habila Nuhu

Abstract:

Natural radionuclides in the environment can significantly contribute to human exposure to ionizing radiation. The knowledge of their levels in an environment can help the radiological protection agencies in policymaking. Measurement of natural radioactivity in major soils in the tin mining state of Perak Malaysia has been conducted using an HPGe detector. Seventy (70) soil samples were collected at widely distributed locations in the state. Six major soil types were sampled, and thirteen districts around the state were covered. The following were the results of the 226Ra (238U), 228Ra (232Th), and 40K activity in the soil samples: 226Ra (238U) has a mean activity concentration of 191.83 Bq kg⁻¹, more than five times the UNSCEAR reference limits of 35 Bq kg⁻¹. The mean activity concentration of 228Ra (232Th) with a value of 232.41 Bq kg⁻¹ is over seven times the UNSCEAR reference values of 30 Bq kg⁻¹. The average concentration of 40K activity was 275.24 Bq kg⁻¹, which was less than the UNSCEAR reference limit of 400 Bq Kg⁻¹. The range of external hazards index (Hₑₓ) values was from 1.03 to 2.05, while the internal hazards index (Hin) was from 1.48 to 3.08. The Hex and Hin should be less than one for minimal external and internal radiation threats as well as secure use of soil material for building construction. The Hₑₓ and Hin results generally indicate that while using the soil types and their derivatives as building materials in the study area, care must be taken.

Keywords: activity concentration, hazard index, soil samples, tin mining

Procedia PDF Downloads 94
647 Oxytocin and Sensorimotor Synchronization in Pairs of Strangers

Authors: Yana Gorina, Olga Lopatina, Elina Tsigeman, Larisa Mararitsa

Abstract:

The ability to act in concert with others, the so-called sensorimotor synchronisation, is a fundamental human ability that underlies successful interpersonal coordination. The manifestation of accuracy and plasticity in synchronisation is an adaptive aspect of interaction with the environment, as well as the ability to predict upcoming actions and behaviour of others. The ability to temporarily coordinate one’s actions with a predictable external event is manifested in such types of social behaviour as a synchronised group dance to music played live by an orchestra, group sports (rowing, swimming, etc.), synchronised actions of surgeons during an operation, applause from an admiring audience, walking rhythms, etc. Both our body and mind are involved in achieving the synchronisation during social interactions. However, it has not yet been well described how the brain determine the external rhythm and what neuropeptides coordinate and synchronise actions. Over the past few decades, there has been an increased interest among neuroscientists and neurophysiologists regarding the neuropeptide oxytocin in the context of its complex, diverse and sometimes polar effects manifested in the emotional and social aspects of behaviour (attachment, trust, empathy, emotion recognition, stress response, anxiety and depression, etc.). Presumable, oxytocin might also be involved in social synchronisation processes. The aim of our study is to test the hypothesis that oxytocin is linked to interpersonal synchronisation in a pair of strangers.

Keywords: behavior, movement, oxytocin, synchronization

Procedia PDF Downloads 47
646 Domestic Violence, Well-Being and Women's Inclusion: Evidence from Northern Ireland

Authors: Jessica Leigh Doyle

Abstract:

In recent years there has been increasing academic and policy interest in domestic violence (DV) and in the implications of DV for the physical and psychological well-being of those who experience it. Yet, despite this interest, very few detailed empirical explorations of these issues have been conducted to date. Of the detailed empirical work that does exist, most studies have focused narrowly on physical violence and the impact of physical violence on rates of depression, post-traumatic stress disorder (PTSD) and substance use. This has often been to the exclusion of wider experiences of DV in relation to psychological, sexual and financial abuse, and of broader victim self-perceptions of psychological well-being that include self-esteem, social participation and quality of life as core components. This paper contributes towards filling this gap by examining these issues on the basis of comprehensive empirical evidence from the Northern Ireland context. Using qualitative methods, the paper presents the findings from 63 semi-structured interviews with women victims of DV from across Northern Ireland. The findings discuss the varied types of violence (physical, psychological, sexual, and financial) that women experience, how these experiences shape their broad physical and psychological well-being and capacity to live active and fulfilling lives and the processes of recovery from IPV. The implications of these findings for research and policy are then discussed.

Keywords: domestic violence, gender equality, intimate partner violence, violence against women, well-being

Procedia PDF Downloads 269
645 Exploring the Challenges and Opportunities in Clinical Waste Management: The Case of Private Clinics, Selangor, Malaysia

Authors: Golyasamin Khanehzaei, Mohd. Bakri Ishak, Ahmad Makmom Hj Abdullah, Latifah Abd Manaf

Abstract:

Abstract—Management of clinical waste is a critical problem worldwide. Immediate attention is required to manage the clinical waste in an appropriate way in newly developing economy country such as Malaysia. The increasing amount of clinical waste generated is resulted from rapid urbanization and growing number of private health care facilities in developing countries such as Malaysia. In order to develop a sensible clinical waste management system and improvement of the management, information on factors affecting clinical waste generation has the crucial role. This paper is the study of management characteristics of clinical waste and the level of efficiency of clinical waste management systems operating in private clinics located in Selangor, Malaysia. Are they following the proper international standards? By taking all of this in consideration the aim of this paper is to identify and discuss the current trend, current challenges and also the present opportunities among the challenges of clinical waste management in private clinics of Selangor, Malaysia. The SWOT analysis was characterized for the evaluation of strengths, weaknesses, opportunities and threats. The methodology for this study was constituted of direct observation, Informal interviews, Conducting SWOT analysis, conduction of one sustainability dimensions analysis and application. The results show that clinical waste management in private clinics is far from an ideal model.

Keywords: clinical waste, SWOT analysis, Selangor, Malaysia

Procedia PDF Downloads 333
644 Impact of Agricultural Waste Utilization and Management on the Environment

Authors: Ravi Kumar

Abstract:

Agricultural wastes are the non-product outcomes of agricultural processing whose monetary value is less as compared to its collection cost, transportation, and processing. When such agricultural waste is not properly disposed of, it may damage the natural environment and cause detrimental pollution in the atmosphere. Agricultural development and intensive farming methods usually result in wastes that remarkably affect the rural environments in particular and the global environment in general. Agricultural waste has toxicity latent to human beings, animals, and plants through various indirect and direct outlets. The present paper explores the various activities that result in agricultural waste and the routes that can utilize the agricultural waste in a manageable manner to reduce its adverse impact on the environment. Presently, the agricultural waste management system for ecological agriculture and sustainable development has emerged as a crucial issue for policymakers. There is an urgent need to consider agricultural wastes as prospective resources rather than undesirable in order to avoid the transmission and contamination of water, land, and air resources. Waste management includes the disposal and treatment of waste with a view to eliminate threats of waste by modifying the waste to condense the microbial load. The study concludes that proper waste utilization and management will facilitate the purification and development of the ecosystem and provide feasible biofuel resources. This proper utilization and management of these wastes for agricultural production may reduce their accumulation and further reduce environmental pollution by improving environmental health.

Keywords: agricultural waste, utilization, management, environment, health

Procedia PDF Downloads 74
643 Detection of Cytotoxicity of Green Synthesized Silver, Gold, and Silver/Gold Bimetallic on Baby Hamster Kidney-21 Cells Using MTT Assay

Authors: Naila Sher, Mushtaq Ahmed, Nadia Mushtaq, Rahmat Ali Khan

Abstract:

In cancer therapy, nanoparticles (NPs) shall be applied possibly by inoculation in the veins of humans. This action will connect them with white (WBCs) and red blood cells (RBCs) in the bloodstream before they reach their main targeted cancer cells. However, possible effects of silver, gold, and silver/gold bimetallic NPs (Ag, Au, and Ag/Au BNPs) on baby hamster kidney-21 (BHK-21) cells were studied by MTT assay. Here, Ag, Au, and their Ag/Au BNPs (bimetallic nanoparticles) were synthesized by using Hippeastrum hybridum (HH) extract. These NPs were characterized by UV-visible spectroscopy, FT-IR, XRD, and EDX, and SEM analysis. XRD analysis conferring the crystal structure with an average size of 13.3, 10.72, and 8.34nm of Ag, Au, and Ag/Au BNPs, respectively. SEM showed that Ag, Au, and Ag/Au BNPs had irregular morphologies, with nano measures calculated sizes of 40, 30, and 20 nm respectively. EDX spectrometers confirmed the presence of elemental Ag signal of the AgNPs with 22.75%, Au signal of the AuNPs with 48.08%, Ag signal with 12%, and Au signal with 38.26% of the Ag/Au BNPs. The BHK-21cells were incubated in the existence of doxorubicin, plant extract, Ag, Au, and Ag/Au BNPs. The cytotoxic effects could be observed in a dose-dependent mode; doxorubicin and Ag/Au BNPs were more toxic than plant extract, Ag, and Au NPs. It is demonstrated that NPs interact with BHK-21cells and significantly reduce cell viability in a concentration-dependent manner. However, to reduce the potential threats of NPs further studies are recommended.

Keywords: hippeastrum hybridum, nanoparticle, BHK-21cells

Procedia PDF Downloads 115
642 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 62
641 Integrated Risk Management as a Framework for Organisational Success

Authors: Olakunle Felix Adekunle

Abstract:

Risk management is recognised as an essential tool to tackle the inevitable uncertainty associated with business and projects at all levels. But it frequently fails to meet expectations, with projects continuing to run late, over budget or under performing, and business is not gaining the expected benefits. The evident disconnect which often occurs between strategic vision and tactical project delivery typically arises from poorly defined project objectives and inadequate attention to the proactive management of risks that could affect those objectives. One of the main failings in the traditional approach to risk management arises from a narrow focus on the downside, restricted to the technical or operational field, addressing tactical threats to processes, performance or people. This shortcoming can be overcome by widening the scope of risk management to encompass both strategic risks and upside opportunities, creating an integrated approach which can bridge the gap between strategy and tactics. Integrated risk management addresses risk across a variety of levels in the organisation, including strategy and tactics, and covering both opportunity and threat. Effective implementation of integrated risk management can produce a number of benefits to the organisation which are not available from the typical limited-scope risk process. This paper explores how to expand risk management to deliver strategic advantage while retaining its use as a tactical tool.

Keywords: risk management, success, organization, strategy, project, tactis, vision

Procedia PDF Downloads 372
640 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 354
639 The Evaluation of Transformational Leadership Characteristics and Behaviors in Air Forces

Authors: Cuma Şimşek

Abstract:

Nowadays our globalized world is in a very rapid and sophisticated change. In the information age, notion of ‘information’ has begun to spread faster than ever also in this age, changes and transformation has gained tremendous momentum with technology boom. This continuous change and transformation, increased the competition between existing organizations and corporations. Besides, the organizations which show resistance to change has been put out of action in this competitive environment. It is not possible to sustain the existence of organizations without adapting to change and transformation by isolating itself from developments. As a consequence of improved communication and dialog possibilities by means of increasing knowledge level, there has been made a change of scene in administrative mentality, style and activation, especially in 21th century. Leaders emerge as the most important factor in this process of perception and success. At the same time it is not enough to adapt the alteration with conventional leadership abilities and behaviors. In parallel with alteration, new types of leadership are coming up. The optimal leadership type for our era and a trending topic "Transformational Leadership" is in great demand now. In this research, current situation of the Air Forces which use high-technology weapons efficiently, operates in an environment full of threats and is analyzed. It is evaluated that in order to be ready for war continuously and adjusting itself to changing terms of warfare atmosphere , Air Forces need ‘transformational leaders’ who are innovative, foreseeing and having a vision so that they can develop new methods and strategies for complex problems. Because it is the Air Force which is responsible for being the deterrent force of its country.

Keywords: transformational, change, air force, leadership

Procedia PDF Downloads 428
638 Application of Innovative Implementations in the SME Sector

Authors: Mateusz Janas

Abstract:

Innovative implementations in the micro, small, and medium-sized enterprises (MSME) sector are among the essential activities considering the current market realities, technological advancements, and digitization trends. MSMEs play a crucial role and significantly influence the economic conditions of countries, as their competitiveness directly impacts the global economy. Business development and investment in innovation and technology are integral parts of every modern enterprise's strategy, seeking to maintain and achieve a desired competitive position. The instability of the socio-economic environment, along with contemporary changes in artificial intelligence implementation and digitization, requires businesses to adopt increasingly newer solutions and actions. Enterprises must strive to survive in the global market and build competitive positions, especially in uncertain conditions. Being aware of the significance of innovative actions is crucial for MSMEs as it enables them to enhance their operations and expand their scope. It is essential for managers and executives of MSMEs to be focused on development and innovation, as their approach will also impact their employees, emphasizing results and maximizing the company's value. Managers of MSMEs must be aware of various threats, costs, opportunities, and gains that can arise from implementing new technical and organizational solutions. Businesses must view development as an integral part of their strategy and continuously strive for improvement.

Keywords: innovation, SME, develop, management

Procedia PDF Downloads 49
637 Effects of Paroxetine on Biochemical Parameters and Reproductive Function in Male Rats

Authors: Rachid Mosbah, Aziez Chettoum, Zouhir Djerrou, Alberto Mantovani

Abstract:

Selective serotonin reuptake inhibitors (SSRI) are a class of molecules used in treating depression, anxiety, and mood disorders. Paroxetine (PRT) is one of the mostly prescribed antidepressant which has attracted great attention regarding its side effects in recent years. This study was planned to assess the adverse effects of PRT on the biochemical parameters and reproductive system. Fourteen male Wistar rats were randomly allocated into two groups (7 rats or each): control and treated with PRT at dose of 5mg/kg.bw for two weeks. At the end of the experiment, blood was collected from retro orbital plexus for measuring the biochemical parameters, whereas the reproductive organs were removed for measuring semen quality and the histological investigations. Results showed that PRT induced significant changes in some biochemical parameters and alteration of semen quality including sperm count, spermatids number and sperm viability, motility, and abnormalities. The histopathological examinations of testis and epididymis revealed an alteration of spermatogenesis, cellular disorganization and vacuolization, enlargement of interstitial space, shrinkage and degenerative changes in the epithelium of seminiferous and epididymal tubules with few to nil numbers of spermatozoa in their lumen. In conclusion, PRT treatment caused changes in some biochemical parameters and sperm profile as well as histopathologic effects of reproductive organs.

Keywords: antidepressant, biochemical parameters, reproductive function, paroxetine

Procedia PDF Downloads 111
636 Gut-Microbiota-Brain-Axis, Leaky Gut, Leaky Brain: Pathophysiology of Second Brain Aging and Alzheimer’s Disease- A Neuroscientific Riddle

Authors: Bilal Ahmad

Abstract:

Alzheimer’s disease (AD) is one of the most common neurodegenerative illnesses. However, how Gut-microbiota plays a role in the pathogenesis of AD is not well elucidated. The purpose of this literature review is to summarize and understand the current findings that may elucidate the gut microbiota's role in the development of AD. Methods: A literature review of all the relevant papers known to the author was conducted. Relevant articles, abstracts and research papers were collected from well-accepted web sources like PubMed, PMC, and Google Scholar. Results: Recent studies have shown that Gut-microbiota has an important role in the progression of AD via Gut-Microbiota-Brain Axis. The onset of AD supports the ‘Hygiene Hypothesis’, which shows that AD might begin in the Gut, causing dysbiosis, which interferes with the intestinal barrier by releasing pro-inflammatory cytokines and making its way up to the brain via the blood-brain barrier (BBB). Molecular mechanisms lipopolysaccharides and serotonin kynurenine (tryptophan) pathways have a direct association with inflammation, the immune system, neurodegeneration, and AD. Conclusion: The studies helped to analyze the molecular basis of AD, other neurological conditions like depression, autism, and Parkinson's disease and how they are linked to Gut-microbiota. Further, studies to explore the therapeutic effects of probiotics in AD and cognitive enhancement should be warranted to provide significant clinical and practical value.

Keywords: gut-microbiota, Alzheimer’s disease, second brain aging, lipopolysaccharides, short-chain fatty acids

Procedia PDF Downloads 26
635 Urbanization and House Water Supply in Nigeria

Authors: Oluronke Odunjo

Abstract:

The world is becoming increasingly urbanized and Nigeria is not left out. One of the indicators of human developments is housing and as such, water is needed by households for survival. This Paper assesses sources of water being used by residents in the newly urbanized areas of Ogbomoso, Southwest, Nigeria. Multistage sampling technique was used and Oke-Adunin Community was purposively selected for the study as it has large concentration of staff and students of Ladoke Akintola University of Technology. The area was captured with Google earth and two hundred and twenty two inhabited houses were found. Questionnaire was the instrument for data collection which was administered using total enumeration technique. Data obtained however, were analyzed with descriptive and inferential statistical analyses. Findings revealed that most of the respondents were male, while 36.03% house owners were between the ages of 46 and 55 years. Sources of water used by residents include well (56.94%), water vendors (17.77%), rain (15.29%) and borehole (3.72%). Distance travelled by house owners to sources of water was as high as 5.06 metres, resulting into stress (30.00 %), depression (25.00%) and aggressiveness (18.75%). Result of correlation analysis between the sources of water of respondents and disease prevalence showed that both rain water and water vendor had very strong positive correlation with typhoid, diarrhea and dysentery, while well water only had positive correlation with dysentery. Recommendations were therefore, proffered towards solving the problems associated with water in the area.

Keywords: newly urbanized area, Ogbomoso, sources of water, residents

Procedia PDF Downloads 183
634 Occurrence of the fall armyworm, Spodoptera frugiperda (J. E. Smith) (Lepidoptera, Noctuidae), on Maize in Katsina State, Nigeria and preliminary study of its Developmental Characteristics under Laboratory Conditions

Authors: Ibrahim Sani, Suleiman Mohammed., Salisu Sulaiman, Aminu Musa

Abstract:

The fall army worm (FAW), Spodoptera frugiperda (J. E. Smith) (Lepidoptera, Noctuidae) has recently become one of the major threats to maize production in the world. It is native to tropical and subtropical America and began to spread to many African and a few Asian Countries. A survey for the observation of infestation and collection of fall armyworm was conducted in field planted with maize in the northern part of Katsina state. Eggs and immature stages were collected, place in a plastic container and brought to the laboratory for observation and study of developmental stages. FAW was identified based on the morphological characteristics, i.e. the “Y” inverted shape on the head capsule and the patterns of black spots on the abdominal segments (square and trapezoidal forms). Different growing stage of maize are affected by fall armyworm, but the damage is greatest during the early growing phase of corn. Heavy infestation on the leaves also cause defoliation. Four developmental stages (eggs larvae, pupae and adults) of the FAW were studied when fed with young corn under laboratory conditions. Furthermore, effective scouting or monitoring of FAW could be practice at early stage of growth of maize.

Keywords: infestation, katsina, maize, fall armyworm

Procedia PDF Downloads 51
633 Prospects of Oman as a Destination for Halal Tourism

Authors: Asad Rehman

Abstract:

Although a vast majority relates the concept of ‘halal’ or what is permissible in Islam to food only. However, halal industry covers many sectors such as food, fashion, transport, finance and even tourism. Halal tourism is not just about halal food; it is also about the overall experience, which is amenable with the Shariah (Islamic jurisprudence). Oman has a plethora of natural beauty and many places of interest for all types of tourists. It is one of the most secure and peaceful countries in the world. Having a well-developed Infrastructure, Oman is ready to take its tourism to new heights. The ever-hospitable Omanis are proud of their rich cultural and historical heritage. Thus, Oman appears to have all what it takes to become a prime destination for halal tourism. The objective of this study is to assess the prospects of Oman as a destination for halal tourism. Based on the interviews of experts like academicians, tourism professionals, officials and clerics, Oman’s competitiveness as a destination for halal tourism was assessed by developing a Strengths, Weaknesses, Opportunities and Threats (SWOT) profile. The findings of the SWOT were compared with the data from the Global Muslim Travel Index (GMTI) from the year 2014 to 2018. Based on the analysis, Oman is found to have the right mix of environment and enabling services for halal tourism. However, it is found lacking in public transport, communication and customer outreach. Oman is also found to be losing its rank among the top 10 destinations for halal tourism to close competitors like Qatar, Bahrain, Morocco, etc. The concerned authorities need to make conscious efforts to resolve these issues as it becomes imperative for Oman to revamp its tourism strategy.

Keywords: destination, halal, Islam, SWOT, tourism

Procedia PDF Downloads 138