Search results for: human factor in security
14349 An Assessment of Housing Affordability and Safety Measures in the Varied Residential Area of Lagos, A Case Study of the Amuwo-Odofin Local Government Area in Lagos State
Authors: Jubril Olatunbosun Akinde
Abstract:
Unplanned population growth are mostly attributed to a lack of infrastructural facilities and poor economic condition in the rural dwellings and the incidence of rural-urban migration, which has resulted in severe housing deficiency in the urban centre, with a resultant pressure on housing delivery in the cities. Affordable housing does not only encompass environmental factors that make living acceptable and comfortable, which include good access routes, ventilation, sanitation and access to other basic human needs, which include water and safety. The research assessed the housing affordability and safety measures in the varied residential area of lagos by examining the demographic and socioeconomic attributes of residents; examining the existing residential safety measures; by examining the residential quality in terms of safety; the researcher therefore examined if relationship between housing affordability and safety in the varied residential areas. The research adopted the bartlett, kotrlik and higgins (2001) method of t-test to determine the sample size which specifies different populations at different levels of significance (α). The researcher adopted primary data which was sourced from a field survey where the sample population was simply randomly selected to give a member of the population an equal chance of being selected, therefore, the sample size for the field survey was two hundred (200) respondents, and subjected to necessary testing. The research come to conclusion that housing safety and security is the responsibility of every resident, the landlords/landladies possess a better sense of security in their neighbourhood than renters in the community, therefore they need to be aware of their responsibility of ensuring the safety of lives and property.Keywords: housing, housing affordability, housing security, residential, residential quality
Procedia PDF Downloads 11214348 Nutritional Status of People Living with Human Immuno Virus/Acquired Immune Deficiency Syndrome Attending Anti-Retro Viral Treatment Clinic of BP Koirala Institute of Health Sciences, Nepal
Authors: Ghimire K., Mehta R. S., Parajuli P., Chettri R.
Abstract:
Background: Malnutrition is a common hallmark of Human Immuno Virus (HIV) disease. It plays a synergistic role in immunosuppression which is initiated by Human Immuno Virus itself, and malnutrition forms an independent risk factor for disease progression. Objectives: The objective of the study is to assess the nutritional status of the people living with Human Immuno Virus/Acquired Immune Deficiency Syndrome attending the Anti-Retro viral Treatment Clinic and find the association of nutritional status with different socio-demographic variables. Methods: A total of 101 people living with HIV/AIDS (PLWHA) were selected by convenient sampling technique. The study was conducted at the ART clinic of BPKIHS. A subjective global assessment tool was used for data collection. Descriptive and inferential statistics were used for data analysis. Results: The study demonstrated that the mean age of the respondents was 40.97+8.650 years. 65.3% were well-nourished, and 34.7% of the participants were mildly/moderately malnourished, whereas none of them were severely malnourished. BMI was statistically significant with education status, family income, and duration of illness of the participants, and nutritional status was statistically significant with gender, marital status, education status, and family history of HIV. Conclusion: On the basis of the result, it can be concluded that more than half of the respondents were well nourished. Gender, marital status, and education are associated with nutritional status.Keywords: nutritional status, people living with HIV/AIDS, ART treatment, Nepal
Procedia PDF Downloads 8614347 Development and Psychometric Properties of the Relational Mobility Scale for the Indonesian Population
Authors: Sukaesi Marianti
Abstract:
This study aims to develop the Relational Mobility Scale for the Indonesian population and to investigate its psychometric properties. New items of the scale were created taking into account the Indonesian population which consists of two parallel forms (A and A’). This study uses 30 newly orchestrated items while keeping in mind the characteristics of the targeted population. The scale was administered to 433 public high school students in Malang, Indonesia. Construct validity of its factor structure was demonstrated using exploratory factor analysis and confirmatory factor analysis. The result exhibits that he model fits the data, and that the delayed alternate form method shows acceptable result. Results yielded that 21 items of the three-dimensional Relational Mobility Scale is suitable for measuring relational mobility in high school students of Indonesian population.Keywords: confirmatory factor analysis, delayed alternate form, Indonesian population, relational mobility scale
Procedia PDF Downloads 26814346 Total Knee Arthroplasty in a Haemophilia: A Patient with High Titre of Inhibitor Using Recombinant Factor VIIa
Authors: Mohammad J. Mortazavi, Arvin Najafi, Pejman Mansouri
Abstract:
Hemophilia A is simply described as deficiency of factor VIII(FVIII) and patients with this disorder have bleeding complications in different organs. By using the recombinant factor VIII in these patients, elective orthopedic surgeries have been done approximately in 40 last years. About 10-30 % of these patients have bleeding complications in their surgeries even by using recombinant factor VIII because of their inhibitor against FVIII molecule. Preoperative haemostatic management in these patients is challenging. We treated a 28-year-old male patient with hemophilia A with FVIII inhibitor which had been detected when he was14 years old (with the titer 54 Bethesda unit(BU)) scheduled for total knee arthroplasty (TKA). We use 90 µg/kg rFVIIa just before the surgery and every 2 hours during surgery. The patient did not have any significant hemorrhage during the surgery and after that. For the 2 days after surgery, the rFVIIa repeated every 2 hours as the same as preoperative dosage(90 µg/kg) and for another 2 days of postoperative admission it continued every 4 hours. After 4th day, the rFVIIa continued every 6 hours with the same dosage until the sixth day from the surgery, and finally the patient were discharged about two weeks after surgery. Seven days after the discharge, he came back for the follow up visit. On the follow up examination, the site of the surgery had neither infection hemarthroses signs.Keywords: hemophilia, factor VIII inhibitor, total knee replacement, rFVIIa
Procedia PDF Downloads 44014345 Effect of the Food Distribution on Household Food Security Status in Iran
Authors: Delaram Ghodsi, Nasrin Omidvar, Hassan Eini-Zinab, Arash Rashidian, Hossein Raghfar
Abstract:
Food supplementary programs are policy approaches that aim to reduce financial barriers to healthy diets and tackle food insecurity. This study aimed to evaluate the effect of the supportive section of Multidisciplinary Supplementary Program for Improvement of Nutritional Status of Children (MuPINSC) on households’ food security status and nutritional status of mothers. MuPINSC is a national integrative program in Iran that distributes supplementary food basket to malnourished or growth retarded children living in low-income families in addition to providing health services, including sanitation, growth monitoring, and empowerment of families. This longitudinal study is part of a comprehensive evaluation of the program. The study participants included 359 mothers of children aged 6 to 72 month under coverage of the supportive section of the program in two provinces of Iran (Semnan and Qazvin). Demographic and economic characteristics of families were assessed by a questionnaire. Data on food security of family was collected by locally adapted Household Food Insecurity Access Scale (HFIAS) at the baseline of the study and six month thereafter. Weight and height of mothers were measured at the baseline and end of the study and mother’s BMI was calculated. Data were analysed, using paired t-test, GEE (Generalized Estimating Equation), and Chi-square tests. Based on the findings, at the baseline, only 4.7% of families were food-secure, while 13.1%, 38.7% and, 43.5% were categorized as mild, moderate and severe food insecure. After six months follow up, the distribution of different levels of food security changed significantly (P<0.001) to 7.9%, 11.6%, 42.6%, and 38%, respectively. At the end of the study, the chance of food insecurity was significantly 20% lower than the beginning (OR=0.796; 0.653-0.971). No significant difference was observed in maternal BMI based on food security (P>0.05). The findings show that the food supplementary program for children improved household food security status in the studied households. Further research is needed to assess other factors that affect the effectiveness of this large scale program on nutritional status and household’s food security.Keywords: food security, food supplementary program, household, malnourished children
Procedia PDF Downloads 40114344 Ecosystem Services and Human Well-Being: Case Study of Tiriya Village, Bastar India
Authors: S. Vaibhav Kant Sahu, Surabhi Bipin Seth
Abstract:
Human well-being has multiple constituents including the basic material for a good life, freedom and choice, health, good social relations, and security. Poverty is also multidimensional and has been defined as the pronounced deprivation of well-being. Dhurwa tribe of Bastar (India) have symbiotic relation with nature, it provisions ecosystem service such as food, fuel and fiber; regulating services such as climate regulation and non-material benefits such as spiritual or aesthetic benefits and they are managing their forest from ages. The demand for ecosystem services is now so great that trade-off among services become rule. Aim of study to explore evidences for linkages between ecosystem services and well-being of indigenous community, how much it helps them in poverty reduction and interaction between them. Objective of study was to find drivers of change and evidence concerning link between ecosystem, human development and sustainability, evidence in decision making does it opt for multi sectoral objectives. Which means human well-being as the central focus for assessment, while recognizing that biodiversity and ecosystems also have intrinsic value. Ecosystem changes that may have little impact on human well-being over days or weeks may have pronounced impacts over years or decades; so assessments needed to be conducted at spatial and temporal scales under social, political, economic scales to have high-resolution data. Researcher used framework developed by Millennium ecosystem assessment; since human action now directly or unknowingly virtually alter ecosystem. Researcher used ethnography study to get primary qualitative data, secondary data collected from panchayat office. The responses were transcribed and translated into English, as interview held in Hindi and local indigenous language. Focus group discussion were held with group of 10 women at Tiriya village. Researcher concluded with well-being is not just gap between ecosystem service supply but also increases vulnerability. Decision can have consequences external to the decision framework these consequences are called externalities because they are not part of the decision-making calculus.Keywords: Bastar, Dhurwa tribe, ecosystem services, millennium ecosystem assessment, sustainability
Procedia PDF Downloads 30214343 Corporate Social Responsibility: An Ethical or a Legal Framework?
Authors: Pouira Askary
Abstract:
Indeed, in our globalized world which is facing with various international crises, the transnational corporations and other business enterprises have the capacity to foster economic well-being, development, technological improvement and wealth, as well as causing adverse impacts on human rights. The UN Human Rights Council declared that although the primary responsibility to protect human rights lie with the State but the transnational corporations and other business enterprises have also a responsibility to respect and protect human rights in the framework of corporate social responsibility. In 2011, the Human Rights Council endorsed the Guiding Principles on Business and Human Rights, a set of guidelines that define the key duties and responsibilities of States and business enterprises with regard to business-related human rights abuses. In UN’s view, the Guiding Principles do not create new legal obligations but constitute a clarification of the implications of existing standards, including under international human rights law. In 2014 the UN Human Rights Council decided to establish a working group on transnational corporations and other business enterprises whose mandate shall be to elaborate an international legally binding instrument to regulate, in international human rights law, the activities of transnational corporations and other business enterprises. Extremely difficult task for the working group to codify a legally binding document to regulate the behavior of corporations on the basis of the norms of international law! Concentration of this paper is on the origins of those human rights applicable on business enterprises. The research will discuss that the social and ethical roots of the CSR are much more institutionalized and elaborated than the legal roots. Therefore, the first step is to determine whether and to what extent corporations, do have an ethical responsibility to respect human rights and if so, by which means this ethical and social responsibility is convertible to legal commitments.Keywords: CSR, ethics, international law, human rights, development, sustainable business
Procedia PDF Downloads 38614342 Impact of HIV/AIDS on Food Security in Pala Sub-Location, Bondo District, Kenya
Authors: S. B. Otieno, Were Fred, E. W. Kabiru, K. Waza
Abstract:
Background: HIV/AIDS is leading to the loss of labor through sickness and subsequent death, this is leading to the neglect of farm and off-farm activities, with the subsequent loss of potential income and food security. The situation is sensitive to seasonal labour peaks in agriculture. This study was done to determine the impact of high HIV prevalence in farming systems and food security in Pala Bondo District, Kenya. Methods: In this study, 386 respondents were randomly chosen in Pala Sub-Location. The respondents and key informants were interviewed using structured questionnaire. The data were entered and analyzed using SPSS version 16. Results: It was established that majority of respondents (67%) were between 18 and 35 years {χ2 = (1, N = 386) = 13.430, p = 0.000} (chimney effect). The study also established that 83.5% of respondents were married {χ2 = (1, N= 370) = 166.277 p = 0.000} and predominant occupation being farming and fishing (61%), while 52.8% of farm labour was by hand, 26% by oxen, and 4.9% mechanized. 73.2% of respondents only farm 0.25 to 2 acres, 48% mentioned lack of labour in land preparation {χ2 ((1,N = 321) = 113.146, p = 0.000), in planting {χ2 (1, N = 321) = 29.28, p = 0.000}. Majority of respondents lack food from January to June, during which 93% buy food. Conclusion: The high HIV prevalence in Pala has affected the farm labour leading to food insecurity.Keywords: food security, HIV, AIDS, labour
Procedia PDF Downloads 26914341 A Study of the Relationship between Time Management Behaviour and Job Satisfaction of Higher Education Institutes in India
Authors: Sania K. Rao, Feza T. Azmi
Abstract:
The purpose of the present study is to explore the relationship between time management behaviour and job satisfaction of academicians of higher education institutes in India. The analyses of this study were carried out with AMOS (version 20.0); and Confirmatory Factor Analysis (CFA) and Structural Equation Modelling (SEM) were conducted. The factor analysis and findings show that perceived control of time serves as the partial mediating factor to have a significant and positive influence on job satisfaction. Further, at the end, a number of suggestions to improve one’s time management behaviour were provided.Keywords: time management behaviour, job satisfaction, higher education, India, mediation analysis
Procedia PDF Downloads 38914340 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria
Authors: Anyaogu Paul
Abstract:
The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.Keywords: child labour, family income, national security, survey research
Procedia PDF Downloads 42414339 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 25114338 Secure Optical Communication System Using Quantum Cryptography
Authors: Ehab AbdulRazzaq Hussein
Abstract:
Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).
Procedia PDF Downloads 40514337 Economic Community of West African States Court of Justice and the Development of Human Rights Jurisprudence in Africa: A Difficult Take-off with a Bright and Visionary Landing
Authors: Timothy Fwa Yerima
Abstract:
This paper evaluates the development of human rights jurisprudence in Africa by the ECOWAS Court of Justice. It traces that though ECOWAS was not established with the aim of promoting and protecting human rights as the African Court of Human and Peoples’ Rights, no doubt, the 1991 ECOWAS Court Protocol and the 1993 ECOWAS Revised Treaty give the ECOWAS Court its human rights mandate. The paper, however, points out that despite the availability of these two Laws, the ECOWAS Court had difficulty in its human rights mandate, in view of the twin problems of lack of access to the Court by private parties and personal jurisdiction of the Court to entertain cases filed by private parties. The paper considers the 2005 Supplementary Protocol, not only as an effective legal framework in West African Sub-Region that tackles these problems in human rights cases but also a strong foundation upon which the Court has been developing human rights jurisprudence in Africa through the interpretation and application of this Law and other sources of Law of the Court. After a thorough analysis of some principles laid down by the ECOWAS Court so far, the paper observes that human rights jurisprudence in Africa is growing rapidly; depicting that though the ECOWAS Court initially had difficulty in its human rights mandate, today it has a bright and visionary landing. The paper concludes that West African Sub-Region will witness a more effective performance of the ECOWAS Court if some of its challenges are tackled.Keywords: access, African human rights, ECOWAS court of justice, jurisprudence, personal jurisdiction
Procedia PDF Downloads 34914336 Spin One Hawking Radiation from Dirty Black Holes
Authors: Petarpa Boonserm, Tritos Ngampitipan, Matt Visser
Abstract:
A 'clean' black hole is a black hole in vacuum such as the Schwarzschild black hole. However in real physical systems, there are matter fields around a black hole. Such a black hole is called a 'dirty black hole'. In this paper, The effect of matter fields on the black hole and the greybody factor is investigated. The results show that matter fields make a black hole smaller. They can increase the potential energy to a black hole to obstruct Hawking radiation to propagate. This causes the greybody factor of a dirty black hole to be less than that of a clean black hole.Keywords: dirty black hole, greybody factor, hawking radiation, matter fields.
Procedia PDF Downloads 59814335 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study
Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly
Abstract:
In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions
Procedia PDF Downloads 8214334 Humans as Enrichment: Human-Animal Interactions and the Perceived Benefit to the Cheetah (Acinonyx jubatus), Human and Zoological Establishment
Authors: S. J. Higgs, E. Van Eck, K. Heynis, S. H. Broadberry
Abstract:
Engagement with non-human animals is a rapidly-growing field of study within the animal science and social science sectors, with human-interactions occurring in many forms; interactions, encounters and animal-assisted therapy. To our knowledge, there has been a wide array of research published on domestic and livestock human-animal interactions, however, there appear to be fewer publications relating to zoo animals and the effect these interactions have on the animal, human and establishment. The aim of this study was to identify if there were any perceivable benefits from the human-animal interaction for the cheetah, the human and the establishment. Behaviour data were collected before, during and after the interaction on the behaviour of the cheetah and the human participants to highlight any trends with nine interactions conducted. All 35 participants were asked to fill in a questionnaire prior to the interaction and immediately after to ascertain if their perceptions changed following an interaction with the cheetah. An online questionnaire was also distributed for three months to gain an understanding of the perceptions of human-animal interactions from members of the public, gaining 229 responses. Both questionnaires contained qualitative and quantitative questions to allow for specific definitive answers to be analysed, but also expansion on the participants perceived perception of human-animal interactions. In conclusion, it was found that participants’ perceptions of human-animal interactions saw a positive change, with 64% of participants altering their opinion and viewing the interaction as beneficial for the cheetah (reduction in stress assumed behaviours) following participation in a 15-minute interaction. However, it was noted that many participants felt the interaction lacked educational values and therefore this is an area in which zoological establishments can work to further improve upon. The results highlighted many positive benefits for the human, animal and establishment, however, the study does indicate further areas for research in order to promote positive perceptions of human-animal interactions and to further increase the welfare of the animal during these interactions, with recommendations to create and regulate legislation.Keywords: Acinonyx jubatus, encounters, human-animal interactions, perceptions, zoological establishments
Procedia PDF Downloads 18914333 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors
Authors: M. S. Razana, Z. W. Shafiuddin
Abstract:
Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification
Procedia PDF Downloads 23514332 Assessment of Heavy Metal Contamination in Soil and Groundwater Due to Leachate Migration from an Open Dumping Site
Authors: Kali Prasad Sarma
Abstract:
Indiscriminate disposal of municipal solid waste (MSW) in open dumping site is a common scenario in developing countries like India which poses a risk to the environment as well as human health. The objective of the present investigation was to find out the concentration of heavy metals (Pb, Cr, Ni, Mn, Zn, Cu, and Cd) and other physicochemical parameters of leachate and soil collected from an open dumping site of Tezpur town, Assam, India and its associated potential ecological risk. Tezpur is an urban agglomeration coming under the category of Class I UAs/Towns with a population of 105,377 as per data released by Government of India for Census 2011. Impact of the leachate on the groundwater was also addressed in our study. The concentrations of heavy metals were determined using ICP-OES. Energy dispersive X-Ray (SEM-EDS) microanalysis was also conducted to see the presence of the studied metals in the soil. X-Ray diffraction analysis (XRD) and Fourier Transform Infrared (FTIR) spectroscopy were also used to identify dominant minerals present in the soil samples. The trend of measured heavy metals in the soil samples was found in the following order: Mn > Pb > Cu > Zn > Cr > Ni > Cd. The assessment of heavy metal contamination in the soil was carried out by calculating enrichment factor (EF), geo-accumulation index (Igeo), contamination factor (Cfi), degree of contamination (Cd), pollution load index (PLI) and ecological risk factor (Eri). The study showed that the concentrations of Pb, Cu, and Cd were much higher than their respective average shale value and the EF of the soil samples depicted very severe enrichment for Pb, Cu, and Cd; moderate enrichment for Cr and Zn. Calculated Igeo values indicated that the soil is moderate to strongly contaminated with Pb and uncontaminated to moderately contaminated with Cd and Cu. The Cfi value for Pb indicates a very strong contamination level of the metal in the soil. The Cfi values for Cu and Cd were 2.37 and 1.65 respectively indicating moderate contamination level. To apportion the possible sources of heavy metal contamination in soil, principal components analysis (PCA) has been adopted. From the leachate, heavy metals are accumulated at the dumping site soil which could easily percolate through the soil and reach the groundwater. The possible relation of groundwater contamination due to leachate percolation was examined by analyzing the heavy metal concentrations in groundwater with respect to distance from the dumping site. The concentrations of Cd and Pb in groundwater (at a distance of 20m from dumping site) exceeded the permissible limit for drinking water as set by WHO. Occurrence of elevated concentration of potentially toxic heavy metals such as Pb and Cd in groundwater and soil are much environmental concern as it is detrimental to human health and ecosystem.Keywords: groundwater, heavy metal contamination, leachate, open dumping site
Procedia PDF Downloads 10914331 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure
Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano
Abstract:
Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security
Procedia PDF Downloads 16514330 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women
Authors: Abeer Al Kalbani
Abstract:
Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.Keywords: food security, household food security, utilization, role of women
Procedia PDF Downloads 40514329 Human Rights to Environment: The Constitutional and Judicial Perspective in India
Authors: Varinder Singh
Abstract:
The primitive man had not known anything like human rights. In the later centuries of human progress with the development of scientific and technological knowledge, the growth of population and the tremendous changes in the human environment, the laws of nature that maintained the Eco-balance crumbled. The race for better and comfortable life landed mankind in a vicious circle. It created environmental imbalance, unplanned and uneven development, breakdown of self-sustaining village economy, mushrooming of shanty towns and slums, widening the chasm between the rich and the poor, over-exploitation of natural resources, desertification of arable lands, pollution of different kinds, heating up of earth and depletion of ozone layer. Modem International Life has been deeply marked and transformed by current endeavors to meet the needs and fulfill the requirements of protection of human person and of the environment. Such endeavors have been encouraged by the widespread recognition that protection of human being and the environment reflects common superior values and constitutes a common concern of mankind. The parallel evolutions of human rights protection and environmental protection disclose some close affinities. There was the occurrence of process of internationalization of both human rights protection and environmental protection, the former beginning with the 1948 Universal Declaration of Human Rights, the latter with the 1972 Stockholm Declaration on the Human Environment.It is now well established that it is the basic human right of every individual to live in a pollution free environment with full human dignity. The judiciary has so far pronounced a number of judgments in this regard. The Supreme Court in view of various laws relating to environment protection and the constitutional provision has held that right to pollution free environment. Article-21 is the heart of the fundamental rights and has received expanded meanings from time to time.Keywords: human rights, law, environment, polluter
Procedia PDF Downloads 22314328 Proactive Business Approaches in Human Rights: The Implications of Corporate Social Responsibility
Authors: Fatemeh Jalalvand
Abstract:
The critical human rights problems such as extreme poverty, hunger, inequalities and gender discrimination need to be addressed by powerful and influential actors in the world. In today’s globalization, corporations have become one of the potent agents in the society. They are capable of generating economic growth, reducing poverty, and increasing the well-being of individuals, thereby contributing to the betterment of a broad spectrum of human rights. However, the discussion on how business can contribute to human rights has primarily focused on not violating them (reactive approach) rather than improving the conditions and solving the problems of human rights (proactive approach). In particular, the role of corporate social responsibility (CSR) in bringing proactivity of business in human rights has gained less attention. This paper develops a conceptual framework to examine the role of different categories of CSR, including discretionary, ethical, legal, instrumental and political CSR in encouraging the proactive contribution of corporations to the betterment of human rights. The five propositions, related to the conceptual framework, outline the relationships between five categories of CSR and proactivity of corporations in human rights. The findings indicate that discretionary CSR with voluntary nature might not be able to motivate any contribution of business in human rights. Moreover, ethical CSR and legal CSR might lead to reactive strategies of business toward human rights. Meanwhile, the economic incentives behind the notion of instrumental CSR could result in partial proactive engagement of corporations in human rights. Finally, the internal motives as profit and power besides the external duties might lead to the highest level of proactivity of corporations in human rights under the context of political CSR. The model developed offers a map for business to adopt proactive human rights strategies more systematically maintaining key profit-drivers like power and profit. In sum, instrumental and political categories of CSR might lead corporations to improve the conditions of human rights proactively.Keywords: CSR, human rights, proactive approach, reactive approach
Procedia PDF Downloads 26214327 A Single Phase ZVT-ZCT Power Factor Correction Boost Converter
Authors: Yakup Sahin, Naim Suleyman Ting, Ismail Aksoy
Abstract:
In this paper, a single phase soft switched Zero Voltage Transition and Zero Current Transition (ZVT-ZCT) Power Factor Correction (PFC) boost converter is proposed. In the proposed PFC converter, the main switch turns on with ZVT and turns off with ZCT without any additional voltage or current stresses. Auxiliary switch turns on and off with zero current switching (ZCS). Also, the main diode turns on with zero voltage switching (ZVS) and turns off with ZCS. The proposed converter has features like low cost, simple control and structure. The output current and voltage are controlled by the proposed PFC converter in wide line and load range. The theoretical analysis of converter is clarified and the operating steps are given in detail. The simulation results of converter are obtained for 500 W and 100 kHz. It is observed that the semiconductor devices operate with soft switching (SS) perfectly. So, the switching power losses are minimum. Also, the proposed converter has 0.99 power factor with sinusoidal current shape.Keywords: power factor correction, zero-voltage transition, zero-current transition, soft switching
Procedia PDF Downloads 80314326 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 9614325 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 45514324 Result of Fatty Acid Content in Meat of Selenge Breed Younger Cattle
Authors: Myagmarsuren Soronzonjav, N. Togtokhbayar, L. Davaahuu, B. Minjigdorj, Seong Gu Hwang
Abstract:
The number of natural or organic product consumers is increased in recent years and this healthy demand pushes to increase usage of healthy meat. At the same time, consumers pay more attention on the healthy fat, especially on unsaturated fatty acids. These long chain carbohydrates reduce heart diseases, improve memory and eye sight and activate the immune system. One of the important issues to be solved for our Mongolia’s food security is to provide healthy, fresh, widely available and cheap meat for the population. Thus, an importance of the Selenge breed meat production is increasing in order to supply the quality meat food security since the Selenge breed cattle are rapidly multiplied, beneficial in term of income, the same quality as Mongolian breed, and well digested for human body. We researched the lipid, unsaturated and saturated fatty acid contents of meat of Selenge breed younger cattle by their muscle types. Result of our research reveals that 11 saturated fatty acids are detected. For the content of palmitic acid among saturated fatty acids, 23.61% was in the sirloin meat, 24.01% was in the round and chuck meat, and 24.83% was in the short loin meat.Keywords: chromatogram, gas chromatography, organic resolving, saturated and unsaturated fatty acids
Procedia PDF Downloads 26814323 Slavery Transcending Borders: An Analysis of Human Trafficking in Europe and the EU’s Impact on the Issue
Authors: Santiago Martínez Hernández
Abstract:
The establishment of the European Union signified the culmination of the supra-national power addressing economic, political, legal and humanitarian matters within and above a national territory. Human rights have taken a protagonist role as one of the pressing concerns that the EU addresses, and one of the most critical problems is that of human trafficking. This multi-billion dollar criminal business represents $31.6 per year made out of 2.5 million trafficked persons worldwide, making it one of the most crucial human rights problems in the world to address. The EU has developed strategies to tackle this issue through supra-national governance, however, how have they fared? What is the impact of its development on the issue? This paper will address the direct and indirect impact of the formation of the European Union as a supranational political and economic entity on the illicit industry of human trafficking in Europe. It attempts to analyse first, the situation of human trafficking in Europe, as an attempt to understand its importance in the region, addressing its root causes and the role of the states addressed. Second, the paper will examine the impact of the EU on human breaking down its policy-making at a supranational level, the role of the economic integration of the region, and the change of migration patterns since its inception.Keywords: human trafficking, human rights, European union, criminal business
Procedia PDF Downloads 35914322 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability
Authors: Özlem Turan, Şule Turhan
Abstract:
About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.Keywords: food, food safety, food systems, sustainability
Procedia PDF Downloads 38614321 An Application of Geographic Information System to Select Areas for Sanitary Landfill in Bang Nok- Khwaek Municipality
Authors: Musthaya Patchanee
Abstract:
The study of Sanitary landfill in Bang Nok-khwaek municipality consists of two procedures. First, to survey and create the spatial database by using physical factor, environmental factor, economical factor and social factor to follow the method of Geographic information system: GIS, second, to analyze the proper spatial for allocating the sanitary landfill in Bang Nok-khwaek municipality by using Overlay techniques to calculate the weighting linear total in Arc GIS program. The study found that there are 2.49 sq.km. proper spatial for the sanitary landfill in Bang Nok-khwaek municipals city which is 66.76% of the whole area. The highest proper spatial is 0.02 sq.km. which is 0.54%, The high proper spatial is 0.3 sq.km. which is 8.04%, the moderate spatial is 1.62 sq.km. which is 43.43% and the low proper spatial is 0.55 sq.km. which is 14.75%. These results will be used as the guideline to select the sanitary landfill area in accordance with sanitation standard for Subdistrict Administrative Organization and Subbdistrict Municipality in Samut Songkhram provice.Keywords: Geographic Information System (GIS), sanitary landfill, Bang Nok-Khwaek municipality, Subdistrict Administrative Organization
Procedia PDF Downloads 39314320 A Study of Behavioral Phenomena Using an Artificial Neural Network
Authors: Yudhajit Datta
Abstract:
Will is a phenomenon that has puzzled humanity for a long time. It is a belief that Will Power of an individual affects the success achieved by an individual in life. It is thought that a person endowed with great will power can overcome even the most crippling setbacks of life while a person with a weak will cannot make the most of life even the greatest assets. Behavioral aspects of the human experience such as will are rarely subjected to quantitative study owing to the numerous uncontrollable parameters involved. This work is an attempt to subject the phenomena of will to the test of an artificial neural network. The claim being tested is that will power of an individual largely determines success achieved in life. In the study, an attempt is made to incorporate the behavioral phenomenon of will into a computational model using data pertaining to the success of individuals obtained from an experiment. A neural network is to be trained using data based upon part of the model, and subsequently used to make predictions regarding will corresponding to data points of success. If the prediction is in agreement with the model values, the model is to be retained as a candidate. Ultimately, the best-fit model from among the many different candidates is to be selected, and used for studying the correlation between success and will.Keywords: will power, will, success, apathy factor, random factor, characteristic function, life story
Procedia PDF Downloads 379