Search results for: human factor in security
14289 Evaluation of Longitudinal and Hoops Stresses and a Critical Study of Factor of Safety (Fos) in the Design of a Glass-Fiber Pressure Vessel
Authors: Zainul Huda, Mohammad Hani Ajani
Abstract:
The design, manufacture, and operation of thin-walled pressure vessels must be based on maximum safe operating pressure and an adequate factor of safety (FoS). This research paper first reports experimental evaluation of longitudinal and hoops stresses based on working pressure as well as maximum pressure; and then includes a critical study of factor of safety (FoS) in the design of a glass fiber pressure vessel. Experimental work involved the use of measuring instruments and the readings from pressure gauges. Design calculations involved the computations of design stress and FoS; the latter was based on breaking strength of 55 MPa for the glass fiber (pressure-vessel material). The experimentally determined FoS value has been critically compared with the general FoS allowed in the design of glass fiber pressure vessels.Keywords: thin-walled pressure vessel, hoop stress, longitudinal stress, factor of safety (FoS), fiberglass
Procedia PDF Downloads 49114288 The Duty of State to Punish Gross Violations of Human Rights
Authors: Yustina Trihoni Nalesti Dewi
Abstract:
Gross violations of human rights consisting of crime against humanity, genocide and war crime, are serious international crimes. Prohibition such crimes have obtain to the level of international norms of jus cogens based on conventions and customary international law. Therefore, the duty of the state to punish the crimes is obligatory. The legal consequence of jus cogens is obligation erga omnes which are a matter of state responsibility. When a state is not willing or neglects to do so in its national law, it results in state responsibility to be imposed by international human rights and humanitarian law. This article reviews the concept of jus cogens and obligatio erga omnes that appear as two sides of the same coin. It also explains how international human rights and humanitarian law set down the duty of the state to punish gross violations of human rights.Keywords: duty of states, gross violations of human rights, jus cogens, obligatio erga omnes
Procedia PDF Downloads 47114287 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates
Procedia PDF Downloads 30514286 Checking Planetary Clutch on the Romania Tractor Using Mathematical Equations
Authors: Mohammad Vahedi Torshizi
Abstract:
In this investigation, at first, bending stress, contact stress, Safety factor of bending and Safety factor of contact between sun gear and planet gear tooth was determined using mathematical equations. Also, The amount of Sun Revolution in, Speed carrier, power Transmitted of the sun, sun torque, sun peripheral speed, Enter the tangential force gears, was calculated using mathematical equations. According to the obtained results, maximum of bending stress and contact stress occurred in three plantary and low status of four plantary. Also, maximum of Speed carrier, sun peripheral speed, Safety factor of bending and Safety factor of contact obtained in four plantary and maximum of power Transmitted of the sun, Enter the tangential force gears, bending stress and contact stress was in three pantry and factors And other factors were equal in the two planets.Keywords: bending stress, contact stress, plantary, mathematical equations
Procedia PDF Downloads 28914285 International Law and Its Role in Protecting Human Rights
Authors: Yrfet Shkreli
Abstract:
To determine the content of human rights norms in national constitutions, international law - in the form of treaties, declarations and case law from international monitoring bodies, and comparative case law from other countries - is often discussed in the judgments of domestic courts. This paper explores the extent to which international law has influenced domestic human rights case law in Africa. The paper first explores how the human rights provisions of African constitutions came into being before turning to the role played by international law in the constitutional order of various African states and how treaties, declarations and findings of international monitoring bodies have been used in African countries to interpret and expand on constitutional human rights provisions.Keywords: European Union, global governance, globalization, normative power
Procedia PDF Downloads 36514284 Absenteeism of Nursing Staff in Emergency Care Units of a City in the Interior of SãO Paulo
Authors: B. P. G. Figueira, I. C. Pinto, D. Ferro, F. C. M. Zacharias
Abstract:
The absenteeism at work constitutes in a temporary absence of labor functions resulting from various reasons, bringing damage to production, increasing costs of care and overburdening other workers, has its principal cause due to illness, often due exposure to several risks in the workplace. This study aims to know, identify and analyze the types and causes of absenteeism, such as the frequency at which it occurs by professional category, for employment contract and days not worked in Emergency Care Public in a city in the interior of São Paulo. We conducted exploratory and descriptive study with a quantitative approach, with nursing professionals, after selection of inclusion criteria was reached a universe of 208 subjects, the data collected are for the years from 2010-2013. Research has shown that the professional category of nursing assistant had 88,11% of total absenteeism, absenteeism lasting 1 day was the with the highest frequency, the women were responsible for 74,80% of absenteeism disease. It was concluded that absenteeism shall be monitored to plan control actions, establishing better political for the management of human resources, because it can be an aggravating factor in the quality of care.Keywords: absenteeism; nursing; emergency medical services, human resource
Procedia PDF Downloads 32614283 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 4014282 Application Programming Interface Security in Embedded and Open Finance
Authors: Andrew John Zeller, Artjoms Formulevics
Abstract:
Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management
Procedia PDF Downloads 4214281 An Exploratory Study on 'Sub-Region Life Circle' in Chinese Big Cities Based on Human High-Probability Daily Activity: Characteristic and Formation Mechanism as a Case of Wuhan
Authors: Zhuoran Shan, Li Wan, Xianchun Zhang
Abstract:
With an increasing trend of regionalization and polycentricity in Chinese contemporary big cities, “sub-region life circle” turns to be an effective method on rational organization of urban function and spatial structure. By the method of questionnaire, network big data, route inversion on internet map, GIS spatial analysis and logistic regression, this article makes research on characteristic and formation mechanism of “sub-region life circle” based on human high-probability daily activity in Chinese big cities. Firstly, it shows that “sub-region life circle” has been a new general spatial sphere of residents' high-probability daily activity and mobility in China. Unlike the former analysis of the whole metropolitan or the micro community, “sub-region life circle” has its own characteristic on geographical sphere, functional element, spatial morphology and land distribution. Secondly, according to the analysis result with Binary Logistic Regression Model, the research also shows that seven factors including land-use mixed degree and bus station density impact the formation of “sub-region life circle” most, and then analyzes the index critical value of each factor. Finally, to establish a smarter “sub-region life circle”, this paper indicates that several strategies including jobs-housing fit, service cohesion and space reconstruction are the keys for its spatial organization optimization. This study expands the further understanding of cities' inner sub-region spatial structure based on human daily activity, and contributes to the theory of “life circle” in urban's meso-scale.Keywords: sub-region life circle, characteristic, formation mechanism, human activity, spatial structure
Procedia PDF Downloads 30014280 Analysis of Interpolation Factor in Pulse Shaping Filter on MRC for CDMA 2000 Systems
Authors: Pankaj Verma, Gagandeep Singh Walia, Padma Devi, H. P. Singh
Abstract:
Code Division Multiple Access 2000 operates on various RF channel bandwidths 1.2288 or 3.6864 Mcps. CDMA offers high bandwidth and wireless broadband services but the efficiency gets decreased because of many interfering factors like fading, interference, scattering, diffraction, refraction, reflection etc. To reduce the spectral bandwidth is one of the major concerns in modern day technology and this is achieved by pulse shaping filter. This paper investigates the effect of diversity (MRC), interpolation factor in Root Raised Cosine (RRC) filter for the QPSK and BPSK modulation schemes. It is made possible to send information with minimum inter symbol interference and within limited bandwidth with proper pulse shaping technique. Bit error rate (BER) performance is analyzed by applying diversity technique by varying the interpolation factor for Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Keying (QPSK). Interpolation factor increases the original sampling rate of a sequence to a higher rate and reduces the interference and diversity reduces the fading.Keywords: CDMA2000, root raised cosine, roll off factor, ISI, diversity, interference, fading
Procedia PDF Downloads 47514279 An Assessment of the Risk and Protective Factors Impacting Criminal Gang Involvement among At-Risk Boys Resident at a Juvenile Home in Trinidad and Tobago: The Peer/Individual Domain of the Risk Factor Prevention ParadIGM
Authors: Dianne Williams
Abstract:
This study examined the peer/individual domain of the Risk Factor Prevention Paradigm (RFPP) to assess the risk and protective factors that impact criminal gang involvement among at-risk males residing in a juvenile home in Trinidad and Tobago. The RFPP allows for the identification of both risk and protective factors in a single, holistic framework to identify the relationship between risk factors, protective factors, and criminal gang involvement among at-risk male adolescents. Findings showed that having anti-social peers was the most significant risk factor associated with criminal gang involvement, while the most significant protective factor was having a positive social attitude. Moreover, while 65% of the boys reported never having been in a gang, 70% reported having hit, struck or used a weapon against someone, while 52% reported being involved in other violent incidents on more than two occasions. This suggests that while involvement with criminal gangs may not be common among this population, predisposing behavioral patterns are present. Results are expected to assist in the development of targeted strategies to reduce the attractiveness of gang membership.Keywords: risk factor prevention paradigm, risk factors, protective factors, peer/individual domain, gang involvement, at-risk youth, trinidad and tobago, juvenile home
Procedia PDF Downloads 60714278 An Assessment of the Effects of Social Conflicts on Tourism in Plateau State, Nigeria: Case Study of Jos Crisis on Hill Station Hotel
Authors: Audu Aly Fada, Adejoh Apeh Matthew
Abstract:
This research assesses the effects of social conflicts on tourism products in Plateau State. It was specifically set out to find out the major causes of social conflicts in Jos, evaluate the effects of social conflicts on the influx of tourists to Hill station hotel Jos, and the impact on revenue generation of the hotel. To achieve these objectives research questions were formulated and a sample of 30 hotel staff was selected as the respondents. Data collected were organized and analyzed using tables, percentages and mean statistics. It was found that the hospitality and tourism industry was adversely affected. The crisis brought about a decline in the number of tourist arrivals, increase in cancelled bookings, a decrease in the average length of stay of tourists and the average room occupancy. Peace is the best friend of travel and tourism, while war and insecurity are among its worst enemies. It is recommended that all stakeholders involved in tourism administration should device safer environment that supports continued patronage by providing modern security apparatus. In the same spirit, government as the main stake-holder in security provision should do more than paying lip service to guarantee security and safety of lives and properties.Keywords: social conflict, crisis, security, tourism development
Procedia PDF Downloads 40114277 Nanotechnology in Construction as a Building Security
Authors: Hanan Fayez Hussein
Abstract:
‘Due to increasing environmental challenges and security problems in the world such as global warming, storms, and terrorism’, humans have discovered new technologies and new materials in order to program daily life. As providing physical and psychological security is one of the primary functions of architecture, so in order to provide security, building must prevents unauthorized entry and harm to occupant and reduce the threat of attack by making building less attractive targets by new technologies such as; Nanotechnology, which has emerged as a major science and technology focus of the 21st century and will be the next industrial revolution. Nanotechnology is control of the properties of matter, and it deals with structures of the size 100 nanometers or smaller in at least one dimension and has wide application in various fields. The construction and architecture sectors were among the first to be identified as a promising application area for nanotechnology. The advantages of using nanomaterials in construction are enormous, and promises heighten building security by utilizing the strength of building materials to make our buildings more secure and get smart home. Access barriers such as wall and windows could incorporate stronger materials benefiting from nano-reinforcement utilizing nanotubes and nano composites to act as protective cover. Carbon nanotubes, as one of nanotechnology application, can be designed up to 250 times stronger than steel. Nano-enabled devices and materials offer both enhanced and, in some cases, completely new defence systems. In the addition, the small amount of carbon nanoparticles to the construction materials such as; cement, concrete, wood, glass, gypson, and steel can make these materials act as defence elements. This paper highlights the fact that nanotechnology can impact the future global security and how building’s envelop can act as a defensive cover for the building and can be resistance to any threats can attack it. Then focus on its effect on construction materials such as; Concrete can obtain by nanoadditives excellent mechanical, chemical, and physical properties with less material, which can acts as a precautionary shield to the building.Keywords: nanomaterial, global warming, building security, smart homes
Procedia PDF Downloads 8214276 Estimation of Subgrade Resilient Modulus from Soil Index Properties
Authors: Magdi M. E. Zumrawi, Mohamed Awad
Abstract:
Determination of Resilient Modulus (MR) is quite important for characterizing materials in pavement design and evaluation. The main focus of this study is to develop a correlation that predict the resilient modulus of subgrade soils from simple and easy measured soil index properties. To achieve this objective, three subgrade soils representing typical Khartoum soils were selected and tested in the laboratory for measuring resilient modulus. Other basic laboratory tests were conducted on the soils to determine their physical properties. Several soil samples were prepared and compacted at different moisture contents and dry densities and then tested using resilient modulus testing machine. Based on experimental results, linear relationship of MR with the consistency factor ‘Fc’ which is a combination of dry density, void ratio and consistency index had been developed. The results revealed that very good linear relationship found between the MR and the consistency factor with a coefficient of linearity (R2) more than 0.9. The consistency factor could be used for the prediction of the MR of compacted subgrade soils with precise and reliable results.Keywords: Consistency factor, resilient modulus, subgrade soil, properties
Procedia PDF Downloads 19314275 Impact of the Energy Transition on Security of Supply - A Case Study of Vietnam Power System in 2030
Authors: Phuong Nguyen, Trung Tran
Abstract:
Along with the global ongoing energy transition, Vietnam has indicated a strong commitment in the last COP events on the zero-carbon emission target. However, it is a real challenge for the nation to replace fossil-fired power plants by a significant amount of renewable energy sources (RES) while maintaining security of supply. The unpredictability and variability of RES would cause technical issues for supply-demand balancing, network congestions, system balancing, among others. It is crucial to take these into account while planning the future grid infrastructure. This study will address both generation and transmission adequacy and reveal a comprehensive analysis about the impact of ongoing energy transition on the development of Vietnam power system in 2030. This will provide insight for creating an secure, stable, and affordable pathway for the country in upcoming years.Keywords: generation adequacy, transmission adequacy, security of supply, energy transition
Procedia PDF Downloads 8614274 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security
Authors: Kenneth Harper
Abstract:
Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs
Procedia PDF Downloads 1814273 Intrusion Detection Techniques in NaaS in the Cloud: A Review
Authors: Rashid Mahmood
Abstract:
The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.Keywords: IDS, cloud, naas, detection
Procedia PDF Downloads 32014272 Body Composition Analysis of Wild Labeo Bata in Relation to Body Size and Condition Factor from Chenab, Multan, Pakistan
Authors: Muhammad Naeem, Amina Zubari, Abdus Salam, Syed Ali Ayub Bukhari, Naveed Ahmad Khan
Abstract:
Seventy three wild Labeo bata of different body sizes, ranging from 8.20-16.00 cm total length and 7.4-86.19 g body weight, were studied for the analysis of body composition parameters (Water content, ash content, fat content, protein content) in relation to body size and condition factor. Mean percentage is found as for water 77.71 %, ash 3.42 %, fat 2.20 % and protein content 16.65 % in whole wet body weight. Highly significant positive correlations were observed between condition factor and body weight (r = 0.243). Protein contents, organic content and ash (% wet body weight) increase with increasing percent water contents for Labeo bata while these constituents (% dry body weight) and fat contents (% wet and dry body weight) have no influence on percent water. It was observed that variations in the body constituents have no association to body weight or length.Keywords: Labeo bata, body size, body composition, condition factor
Procedia PDF Downloads 49714271 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects
Authors: Ma Yuzhe, Burra Venkata Durga Kumar
Abstract:
The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.Keywords: Linux, operating system, system management, security
Procedia PDF Downloads 10814270 A Study to Connect the Objective Interface Design Characters To Ergonomic Safety
Authors: Gaoguang Yang, Shan Fu
Abstract:
Human-machine interface (HMI) intermediate system information to human operators to facilitate human ability to manage and control the system. Well-designed HMI would enhance human ability. An evaluation must be performed to confirm that the designed HMI would enhance but not degrade human ability. However, the prevalent HMI evaluation techniques have difficulties in more thoroughly and accurately evaluating the suitability and fitness of a given HMI for the wide variety of uncertainty contained in both the existing HMI evaluation techniques and the large number of task scenarios. The first limitation should be attributed to the subjective and qualitative analysis characteristics of these evaluation methods, and the second one should be attributed to the cost balance. This study aims to explore the connection between objective HMI characters and ergonomic safety and step forward toward solving these limitations with objective, characterized HMI parameters. A simulation experiment was performed with the time needed for human operators to recognize the HMI information as characterized HMI parameter, and the result showed a strong correlation between the parameter and ergonomic safety level.Keywords: Human-Machine Interface (HMI), evaluation, objective, characterization, simulation
Procedia PDF Downloads 6614269 Development and Analysis of Waste Human Hair Fiber Reinforced Composite
Authors: Tesfaye Worku
Abstract:
Human hair, chicken feathers, and hairs of other birds and animals are commonly described as waste products, and the currently available disposal methods, such as burying and burning these waste products, are contributing to environmental pollution. However, those waste products are used to develop fiber-reinforced textile composite material. In this research work, the composite was developed using human hair fiber and analysis of the mechanical and physical properties of the developed composite sample. A composite sample was made with different ratios of human hair and unsaturated polyester resin, and an analysis of the mechanical and physical properties of the developed composite sample was tested according to standards. The fabricated human hair fibers reinforced polymer matrix composite sample has given encouraging results in terms of high strength and rigidity for lightweight house ceiling board material.Keywords: composite, human hair fiber, matrix, unsaturated polyester
Procedia PDF Downloads 6914268 Perceptions and Experiences of Iranian Students of Human Dignity in Canada: A Phenomenological Comparative Study
Authors: Erfaneh Razavipour Naghani, Masoud Kianpour
Abstract:
Human dignity is a subjective concept indicating an inner feeling of worth which depends on one’s perceptions and life experiences. Yet the notion is also very much under the influence of societal and cultural factors. Scholars have identified human dignity as a context-based concept that lies at the intersection of culture, gender, religion, and individual characteristics. Migration may constitute an individual or collective strategy for people seeking to situations that bolster rather than undermine their human dignity. Through the use of a phenomenological method, this study will explore how Iranian students in Canada perceive human dignity through such values and characteristics as honor, respect, self-determination, self-worth, autonomy, freedom, love, and equality in Canada as compared to their perceptions of the same in Iran. In-depth interviewing will be used to collect data from Iranian students who have lived in Canada for at least two years. The aim is to discover which essential themes constitute participants’ understanding of human dignity and how this understanding compares to their pre-Canadian experience in Iran. We will use criterion sampling as our sampling method. This study will clarify how being exposed to a different culture can affect perceptions of human dignity among university students.Keywords: Canada, human dignity, Iran, migration, university students
Procedia PDF Downloads 13814267 Calculating Stress Intensity Factor of Cracked Axis by Using a Meshless Method
Authors: S. Shahrooi, A. Talavari
Abstract:
Numeral study on the crack and discontinuity using element-free methods has been widely spread in recent years. In this study, for stress intensity factor calculation of the cracked axis under torsional loading has been used from a new element-free method as MLPG method. Region range is discretized by some dispersed nodal points. From method of moving least square (MLS) utilized to create the functions using these nodal points. Then, results of meshless method and finite element method (FEM) were compared. The results is shown which the element-free method was of good accuracy.Keywords: stress intensity factor, crack, torsional loading, meshless method
Procedia PDF Downloads 56514266 Impact of the Government Ghana Block Farm Program on Rural Households in Northern Ghana
Authors: Antwi Kwaku Dei, Lyford Conrad Power
Abstract:
This paper investigates the outcome of participating in the government of Ghana block farm program on rural households’ farm productivity, income, food security and nutritional status in Northern Ghana using cross-sectional data. Data analysis was done using the Instrumental Variable and the Heckman Selection Bias procedures. Our analysis indicates that participation in the block farm program significantly increased directly the productivity of maize, rice, and soybean by 21.3 percent, 15.8 percent, and 12.3 percent respectively. Also, the program participation was found to increase households’ farm income by 20 percent in northern Ghana. Furthermore, program participation was found to improve household food security and nutrition by 19 percent and 14 percent respectively through income effect. Based on the benefit-cost ratio of 1.59 the results from the study recommends that the program is expanded to other communities in the northern region. Further analysis indicates that rural households’ decision to participate in food security intervention programs is significantly influenced by factors including the gender of the household head, the age of the household head, and household size. Results of the study further show that gender of household head, household size, household monthly income, household assets, women educational status, the age of women, marital status of women, are significant determinants of food security and nutrition status in Northern Ghana.Keywords: block farm program, farm productivity, , household food security, Northern Ghana
Procedia PDF Downloads 28114265 Rohingya Problem and the Impending Crisis: Outcome of Deliberate Denial of Citizenship Status and Prejudiced Refugee Laws in South East Asia
Authors: Priyal Sepaha
Abstract:
A refugee crisis is manifested by challenges, both for the refugees and the asylum giving state. The situation turns into a mega-crisis when the situation is prejudicially handled by the home state, inappropriate refugee laws, exploding refugee population, and above all, no hope of any foreseeable solution or remedy. This paper studies the impact on the capability of stateless Rohingyas to migrate and seek refuge due to the enforcement of rigid criteria of movement imposed both by Myanmar as well as the adjoining countries in the name of national security. This theoretical study identifies the issues and the key factors and players which have precipitated the crisis. It further discusses the possible ramifications in the home, asylum giving, and the adjoining countries for not discharging their roles aptly. Additionally, an attempt has been made to understand the scarce response given to the impending crisis by the regional organizations like SAARC, ASEAN and CHOGAM as well as international organizations like United Nations Human Rights Council, Security Council, Office of High Commissioner for Refugees and so on, in the name of inadequacy of monetary funds and physical resources. Based on the refugee laws and practices pertaining to the case of Rohingyas, this paper analyses that the Rohingya Crisis is in dire need of an effective action plan to curb and resolve the biggest humanitarian crisis situation of the century. This mounting human tragedy can be mitigated permanently, by strengthening existing and creating new interdependencies among all stakeholders, as further ignorance can drive the countries of the Indian Sub-continent, in particular, and South East Asia, by and large into a violent civil war for seizing long-awaited civil rights by the marginalized Rohingyas. To curb this mass crisis, it will require the application of coercive pressure and diplomatic pursuance on the home country to acknowledge the rights of its fleeing citizens. This further necessitates mustering adequate monetary funds and physical resources for the asylum providing state. Additional challenges such as devising mechanisms for the refugee’s safe return, comprehensive planning for their holistic economic development and rehabilitation plan are needed. These, however, can only come into effect with a conscious strive by the regional and international community to fulfil their assigned role.Keywords: asylum, citizenship, crisis, humanitarian, human rights, refugee, rohingya
Procedia PDF Downloads 13214264 A Framework for Secure Information Flow Analysis in Web Applications
Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa
Abstract:
Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.Keywords: web applications security, secure information flow, program dependence graph, database annotation
Procedia PDF Downloads 47114263 The Application of Maintenance Strategy in Energy Power Plant: A Case Study
Authors: Steven Vusmuzi Mashego, Opeyeolu Timothy Laseinde
Abstract:
This paper presents a case study on applying maintenance strategies observed in a turbo-generator at a coal power plant. Turbo generators are one of the primary and critical components in energy generation. It is essential to apply correct maintenance strategies and apply operational procedures accordingly. The maintenance strategies are implemented to ensure the high reliability of the equipment. The study was carried out at a coal power station which will transit to a cleaner energy source in the nearest future. The study is relevant as lessons learned in this system will support plans and operational models implemented when cleaner energy sources replace coal-powered turbines. This paper first outlines different maintenance strategies executed on the turbo-generator modules. Secondly, the impacts of human factors on a coal power station are discussed, and the findings prompted recommendations for future actions.Keywords: maintenance strategies, turbo generator, operational error, human factor, electricity generation
Procedia PDF Downloads 11214262 Navigating the Cacophony of Human Rights Claims and Chains of Fraud in Nigeria: The Anti-Corruption War Perspective
Authors: Mike Omilusi
Abstract:
Since the Buhari administration came to power, it has gained the people’s confidence with its anti-corruption efforts. Making culprits account for their past unlawful deeds, in a very determined and aggressive manner ever witnessed in the nation’s political history, generates different reactions among Nigerians. However, some questions remain pertinent to this study: Are Nigerians really advocating persecution or prosecution in respect of the graft suspects? Do they want conviction without being convinced? Is their outburst propelled by emotions and revengeful anticipation of having suspected looters of the nation’s commonwealth behind bars? Can the war be successfully fought without resorting to impunity? Relying extensively on secondary sources with the aid of descriptive and narrative tools, this study seeks to interrogate the claim of fundamental human rights in the face of wanton looting of the nation’s resources. If, as opined by President Buhari, corruption is a crime against humanity, then it is argued that those who commit such crime should be subjected to penalties prescribed by law. Such crime -as corruption in this study- deprives the citizens of welfare, social amenities and good things of life. In this instance, it also poses threats to national security, having misappropriated funds meant for the war against the Boko Haram terrorism as revealed by the anti-corruption agency in the country. A theoretically-driven investigation, this essay raises some expectations within the context of good governance-propelled anti-corruption crusade, making modest recommendations as to how corruption should be prevented and combated within the confine of rule of law.Keywords: corruption, rule of law, human rights, prosecution, commonwealth
Procedia PDF Downloads 20314261 Impact of Hard Limited Clipping Crest Factor Reduction Technique on Bit Error Rate in OFDM Based Systems
Authors: Theodore Grosch, Felipe Koji Godinho Hoshino
Abstract:
In wireless communications, 3GPP LTE is one of the solutions to meet the greater transmission data rate demand. One issue inherent to this technology is the PAPR (Peak-to-Average Power Ratio) of OFDM (Orthogonal Frequency Division Multiplexing) modulation. This high PAPR affects the efficiency of power amplifiers. One approach to mitigate this effect is the Crest Factor Reduction (CFR) technique. In this work, we simulate the impact of Hard Limited Clipping Crest Factor Reduction technique on BER (Bit Error Rate) in OFDM based Systems. In general, the results showed that CFR has more effects on higher digital modulation schemes, as expected. More importantly, we show the worst-case degradation due to CFR on QPSK, 16QAM, and 64QAM signals in a linear system. For example, hard clipping of 9 dB results in a 2 dB increase in signal to noise energy at a 1% BER for 64-QAM modulation.Keywords: bit error rate, crest factor reduction, OFDM, physical layer simulation
Procedia PDF Downloads 36614260 Religion: The Human Entropy
Authors: Abul Kayum Zarzis Alam
Abstract:
Death is not a terminal; it is just a junction. From Agamas to Vedas, from Buddhism to Judaism, all the major scriptures and religions of the world always do converge to this hypothesis of death. Death is the ultimate catastrophe of life and it is the genesis of every religion on this Earth. Several hundred thousand years ago, the Homo Sapiens in Paleolithic age introduced the notion of religion on this Earth in its most primitive form just to escape from death and natural catastrophes through their belief in supernatural things which created the sense of superstition among the Homo Sapiens which has only increased over time. This sense of superstition and belief in supernatural things are building blocks of religion. Religion is like entropy, a degree of disorder. Entropy for an irreversible system like our own Universe always increases. Same is happening to our human civilization where the disorder had been increasing over time. The degree of this disorder of human civilization is religion divides and conquers over the human civilization of Earth. Religion is the human entropy which had been governing and will govern us. Just like entropy, religion is also an essential intrinsic property of the system which makes the system evolved. We have to optimize this ambivalence of the human entropy to make our civilization an inclusive and sustainable one.Keywords: death, earth, entropy, Homo sapiens, religion and human entropy
Procedia PDF Downloads 181