Search results for: general data protection regulation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30952

Search results for: general data protection regulation

29932 Heritage Impact Assessment Policy within Western Balkans, Albania

Authors: Anisa Duraj

Abstract:

As usually acknowledged, cultural heritage is the weakest component in EIA studies. The role of heritage impact assessment (HIA) in development projects is not often accounted for, and in those cases where it is, HIA is considered as a reactive response and not as a solutions provider. Because of continuous development projects, in most cases, heritage is unconsidered and often put under threat. Cultural protection and development challenges ask for prudent legal regulation and appropriate policy implementation. The challenges become even more peculiar in underdeveloped countries or endangered areas, which are generally characterized by numerous legal constraints. Therefore, the need for strategic proposals for HIA is of high importance. In order to trigger HIA as a proactive operation in the IA process and make sure to cover cultural heritage in the whole EIA framework, an appropriate system of evaluation of impacts should be provided. To obtain the required results for HIA, this last must be part of a regional policy, which will address and guide development projects toward a proper evaluation of their impacts affecting heritage. In order to get a clearer picture of existing gabs but also new possibilities for HIA, this paper will focus on the Western Balkans region and the undergoing changes that it faces. Concerning continuous development pressure in the region and within the aspiration of the Western Balkans countries to join the European Union (EU) as member states, attention should be paid to new development policies under the EU directives for conducting EIAs, and accurate support is required for the restructuration of existing policies as well as for the implementation of the UN Agenda for SDGs. In the framework of new emerging needs, if HIA is taken into account, the outcome would be an inclusive regional program that would help to overcome marginality issues of spaces and people.

Keywords: cultural heritage, impact assessment, SDGs, urban development, western Balkans, regional policy, HIA, EIA

Procedia PDF Downloads 114
29931 The Potential Role of Some Nutrients and Drugs in Providing Protection from Neurotoxicity Induced by Aluminium in Rats

Authors: Azza A. Ali, Abeer I. Abd El-Fattah, Shaimaa S. Hussein, Hanan A. Abd El-Samea, Karema Abu-Elfotuh

Abstract:

Background: Aluminium (Al) represents an environmental risk factor. Exposure to high levels of Al causes neurotoxic effects and different diseases. Vinpocetine is widely used to improve cognitive functions, it possesses memory-protective and memory-enhancing properties and has the ability to increase cerebral blood flow and glucose uptake. Cocoa bean represents a rich source of iron as well as a potent antioxidant. It can protect from the impact of free radicals, reduces stress as well as depression and promotes better memory and concentration. Wheatgrass is primarily used as a concentrated source of nutrients. It contains vitamins, minerals, carbohydrates, amino acids and possesses antioxidant and anti-inflammatory activities. Coenzyme Q10 (CoQ10) is an intracellular antioxidant and mitochondrial membrane stabilizer. It is effective in improving cognitive disorders and has been used as anti-aging. Zinc is a structural element of many proteins and signaling messenger that is released by neural activity at many central excitatory synapses. Objective: To study the role of some nutrients and drugs as Vinpocetine, Cocoa, Wheatgrass, CoQ10 and Zinc against neurotoxicity induced by Al in rats as well as to compare between their potency in providing protection. Methods: Seven groups of rats were used and received daily for three weeks AlCl3 (70 mg/kg, IP) for Al-toxicity model groups except for the control group which received saline. All groups of Al-toxicity model except one group (non-treated) were co-administered orally together with AlCl3 the following treatments; Vinpocetine (20mg/kg), Cocoa powder (24mg/kg), Wheat grass (100mg/kg), CoQ10 (200mg/kg) or Zinc (32mg/kg). Biochemical changes in the rat brain as acetyl cholinesterase (ACHE), Aβ, brain derived neurotrophic factor (BDNF), inflammatory mediators (TNF-α, IL-1β), oxidative parameters (MDA, SOD, TAC) were estimated for all groups besides histopathological examinations in different brain regions. Results: Neurotoxicity and neurodegenerations in the rat brain after three weeks of Al exposure were indicated by the significant increase in Aβ, ACHE, MDA, TNF-α, IL-1β, DNA fragmentation together with the significant decrease in SOD, TAC, BDNF and confirmed by the histopathological changes in the brain. On the other hand, co-administration of each of Vinpocetine, Cocoa, Wheatgrass, CoQ10 or Zinc together with AlCl3 provided protection against hazards of neurotoxicity and neurodegenerations induced by Al, their protection were indicated by the decrease in Aβ, ACHE, MDA, TNF-α, IL-1β, DNA fragmentation together with the increase in SOD, TAC, BDNF and confirmed by the histopathological examinations of different brain regions. Vinpocetine and Cocoa showed the most pronounced protection while Zinc provided the least protective effects than the other used nutrients and drugs. Conclusion: Different degrees of protection from neurotoxicity and neuronal degenerations induced by Al could be achieved through the co-administration of some nutrients and drugs during its exposure. Vinpocetine and Cocoa provided the most protection than Wheat grass, CoQ10 or Zinc which showed the least protective effects.

Keywords: aluminum, neurotoxicity, vinpocetine, cocoa, wheat grass, coenzyme Q10, Zinc, rats

Procedia PDF Downloads 249
29930 Effector and Memory Immune Responses Induced by Total Extracts of Naegleria fowleri Co-Administered with Cholera Toxin

Authors: Q. B. Maria de la Luz Ortega Juárez, Saúl Rojas Hernández, Itzel Berenice Rodríguez Mera, María Maricela Carrasco Yépez, Mara Gutierrez Sánchez

Abstract:

Naegleria fowleri is a free-living amoeba found mainly in temperate freshwater and is the etiologic agent of primary amebic meningoencephalitis (PAM), a fatal acute disease with a mortality rate greater than 95%. At present, there are no treatments available for MAP, and the development of effective vaccines that generate long-term immunological memory allowing protection against MAP would be of great importance. The objective of this work was to analyze the effector and memory immune response in BALB/c mice immunized with total extract of N. fowleri co-administered with cholera toxin. In this study, BALB/c mice were immunized four times intranasally with ET of N. fowleri adjuvanted with CT with or without booster at three months and were challenged or not with the lethal dose of N. fowleri, determining survival, the humoral, effector and memory response, by ELISA and flow cytometry techniques. The results obtained showed that the survival of mice immunized with booster had 60% protection compared to the group without booster, which obtained 20% protection. Evaluating the humoral response, it was found that both IgG and IgA levels were higher in sera than in nasal washes in both treatments. In the cellular response, the increase in the percentage of positive cells was found for effector T and B lymphocytes in the nasal passages (NP) in the group with boost and nasopharynx-associated lymphoid tissue (NALT) in the group without boost and lymphocytes only. B in both treatments, as well as in memory cells treatment with boost T lymphocytes in PN and NALT and without boost in cervical lymph nodes (CG) with respect to B lymphocytes, in PN, GC and NALT in treatment with boost and NALT in treatment without booster. Therefore, the involvement of the effector immune response and memory play a fundamental role for protection against N. fowleri and for the development of vaccine candidates.

Keywords: immune response, immunological memory, naegleria fowleri, primary amebic meningoencephalitis

Procedia PDF Downloads 78
29929 Creating Bridges: The Importance of Intergenerational Experiences in the Educational Context

Authors: A. Eiguren-Munitis, N. Berasategi, J. M. Correa

Abstract:

Changes in family structures, immigration, economic crisis, among others, hinder the connection between different generations. This situation gives rise to a greater lack of social protection of the groups in vulnerable situations, such as the elderly and children. There is a growing need to search for shared spaces where different generations manage to break negative stereotypes and interact with each other. The school environment provides a favourable context in which the approach of different generations can be worked on. The intergenerational experiences that take place within the school context help to introduce the educational ideology for a lifetime. This induces bilateral learning, which encourages citizen participation. For this reason, the general objective of this research is to deepen the impact that intergenerational experiences have on participating students. The research is carried out based on mixed methods. The qualitative and quantitative evaluation included pre-test and post-test questionnaires (n=148) and group interviews (n=43). The results indicate that the intergenerational experiences influence different levels, on the one hand, help to promote school motivation and on the other hand, help to reduce negative stereotypes towards older people thus contributing to greater social cohesion.

Keywords: intergenerational learning, school, stereotypes, social cohesion

Procedia PDF Downloads 142
29928 Consumer Welfare in the Platform Economy

Authors: Prama Mukhopadhyay

Abstract:

Starting from transport to food, today’s world platform economy and digital markets have taken over almost every sphere of consumers’ lives. Sellers and buyers are getting connected through platforms, which is acting as an intermediary. It has made consumer’s life easier in terms of time, price, choice and other factors. Having said that, there are several concerns regarding platforms. There are competition law concerns like unfair pricing, deep discounting by the platforms which affect the consumer welfare. Apart from that, the biggest problem is lack of transparency with respect to the business models, how it operates, price calculation, etc. In most of the cases, consumers are unaware of how their personal data are being used. In most of the cases, they are unaware of how algorithm uses their personal data to determine the price of the product or even to show the relevant products using their previous searches. Using personal or non-personal data without consumer’s consent is a huge legal concern. In addition to this, another major issue lies with the question of liability. If a dispute arises, who will be responsible? The seller or the platform? For example, if someone ordered food through a food delivery app and the food was bad, in this situation who will be liable: the restaurant or the food delivery platform? In this paper, the researcher tries to examine the legal concern related to platform economy from the consumer protection and consumer welfare perspectives. The paper analyses the cases from different jurisdictions and approach taken by the judiciaries. The author compares the existing legislation of EU, US and other Asian Countries and tries to highlight the best practices.

Keywords: competition, consumer, data, platform

Procedia PDF Downloads 144
29927 Hybrid Energy Harvesting System with Energy Storage Management

Authors: Lucian Pîslaru-Dănescu, George-Claudiu Zărnescu, Laurențiu Constantin Lipan, Rareș-Andrei Chihaia

Abstract:

In recent years, the utilization of supercapacitors for energy storage (ES) devices that are designed for energy harvesting (EH) applications has increased substantially. The use of supercapacitors as energy storage devices in hybrid energy harvesting systems allows the miniaturization of electronic structures for energy storage. This study is concerned with the concept of energy management capacitors – supercapacitors and the new electronic structures for energy storage used for energy harvesting devices. Supercapacitors are low-voltage devices, and electronic overvoltage protection is needed for powering the source. The power management device that uses these proposed new electronic structures for energy storage is better than conventional electronic structures used for this purpose, like rechargeable batteries, supercapacitors, and hybrid systems. A hybrid energy harvesting system with energy storage management is able to simultaneously use several energy sources with recovery from the environment. The power management device uses a summing electronic block to combine the electric power obtained from piezoelectric composite plates and from a photovoltaic conversion system. Also, an overvoltage protection circuit used as a voltage detector and an improved concept of charging supercapacitors is presented. The piezoelectric composite plates are realized only by pressing two printed circuit boards together without damaging or prestressing the piezoceramic elements. The photovoltaic conversion system has the advantage that the modules are covered with glass plates with nanostructured film of ZnO with the role of anti-reflective coating and to improve the overall efficiency of the solar panels.

Keywords: supercapacitors, energy storage, electronic overvoltage protection, energy harvesting

Procedia PDF Downloads 83
29926 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 148
29925 Partners Sharing Resources, Costs, and Risks

Authors: Lee Li

Abstract:

The strategic management literature posits that the major motive of strategic alliances is to share resources, costs and risks. However, the literature also indicates that such sharing leads to transaction costs which are positively correlated with environmental dynamism. As such, it is not clear why firms are willing to cover high transaction costs for sharing resources, costs and risks. This study categorizes resources into firm-specific and general resource; costs into accounting and non-accounting cost; and risks into visible and invisible risks. Using data from 167 Canadian firms in technology industries, we find that sharing firm-specific resources and non-accounting costs are negatively correlated with environmental dynamism but sharing general resources, accounting costs and visible risks are positively correlated with environmental dynamism. Findings suggest that sharing certain resources, costs and risks do not necessarily incur high transaction costs.

Keywords: environmental dynamism, strategic alliances, resource/cost/risk sharing

Procedia PDF Downloads 364
29924 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters

Authors: Vikram Chowdhary, Marek Vins

Abstract:

The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.

Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID

Procedia PDF Downloads 111
29923 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

Authors: Tun Myat Aung, Ni Ni Hla

Abstract:

This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.c

Keywords: discrete logarithm problem, general attacks, elliptic curve, prime field, binary field

Procedia PDF Downloads 233
29922 Isolation of New C₁₅ Acetogenins from the Red Alga Laurencia obtusa

Authors: Nahed O. Bawakid, Walied M. Alarif

Abstract:

With regard to the uniqueness of the red algae of the genus Laurencia as the source of C₁₅-acetogenins, along with the diversity of biological applications; the acetogenin content of the Red Sea L. obtusa was investigated. Fractionation and purification of the CH₂Cl₂/MeOH extract were done by applying several chromatographic techniques, including column and preparative thin-layer chromatography; followed by a series of ¹H nuclear magnetic resonance measurements to give rise of some interesting notes. A new rare chloroallene-based C₁₅ acetogenin, laurentusenin (1) along with a new furan ring containing C₁₅ acetogenin, laurenfuresenin (2), were isolated from the red alga L. obtusa. Comparing 1D and 2D NMR, MS, UV and IR spectral data for the new isolated compounds with the reported bromoallene containing acetogenins spectral data was played the crucial role for characterization of their hemical structures. The apoptosis induced by these two compounds was demonstrated by DNA fragmentation assay and microscopic observation. These observations suggest that (1) and (2) may be involved in regulation of programmed death in the initiation and propagation of inflammatory responses. The isolated metabolite (1) showed unusual substituted allene side chain, while (2) inserted furan ring as a new acetogenin nucleus.

Keywords: cyclic enyne, anti-inflammatory, fatty acids, marine algae, halogenations

Procedia PDF Downloads 151
29921 Applications of Big Data in Education

Authors: Faisal Kalota

Abstract:

Big Data and analytics have gained a huge momentum in recent years. Big Data feeds into the field of Learning Analytics (LA) that may allow academic institutions to better understand the learners’ needs and proactively address them. Hence, it is important to have an understanding of Big Data and its applications. The purpose of this descriptive paper is to provide an overview of Big Data, the technologies used in Big Data, and some of the applications of Big Data in education. Additionally, it discusses some of the concerns related to Big Data and current research trends. While Big Data can provide big benefits, it is important that institutions understand their own needs, infrastructure, resources, and limitation before jumping on the Big Data bandwagon.

Keywords: big data, learning analytics, analytics, big data in education, Hadoop

Procedia PDF Downloads 426
29920 Design and Development of a Safety Equipment and Accessory for Bicycle Users

Authors: Francine Siy, Stephen Buñi

Abstract:

Safety plays a significant role in everyone’s life on a day-to-day basis. We wish ourselves and our loved ones their safety as we all venture out on our daily commute. The road is undeniably dangerous and unpredictable, with abundant traffic collisions and pedestrians experiencing various injuries. For bicycle users, the risk of accidents is even more exacerbated, and injuries may be severe. Even when cyclists try their best to be safe and protected, the possibility of encountering danger is always there. Despite being equipped with protective gear, safety is never guaranteed. Cyclists often settle for helmets and standard reflector vests to establish a presence on the road. There are different types of vests available, depending on the profession. However, traditional reflector vests, mostly seen on construction workers and traffic enforcers, were not designed for riders and their protection from injuries. With insufficient protection for riders, they need access to ergonomically designed equipment and accessories that suit the riders and cater to their needs. This research aimed to offer a protective vest with safety features for riders that is comfortable, effective, durable, and intuitive. This sheds light and addresses the safety of the biker population, which continuously grows through the years. The product was designed and developed by gathering data and using the cognitive mapping method to ensure that all qualitative and quantitative data were considered in this study to improve other existing products that do not have the proper design considerations. It is known that available equipment for cyclists is often sold separately or lacks the safety features for cyclists traversing open roads. Each safety feature like the headlights, reflectors, signal or rear lights, zipper pouch, body camera attachment, and wireless remote control all play a particular role in helping cyclists embark on their daily commute. These features aid in illumination, visibility, easy maneuvering, convenience, and security, allowing cyclists to go for a safer ride that is of use throughout the day. The product is designed and produced effectively and inexpensively without sacrificing the quality and purpose of its usage.

Keywords: bicycle accessory, protective gear, safety, transport, visibility

Procedia PDF Downloads 83
29919 Luminescence Dating of Ancient Agricultural Terraced Landscapes: Prospects for Heritage Protection

Authors: Lisa Snape, Andreas Lang, Tony Brown, Dan Fallu, Ben Pears

Abstract:

Agricultural terraced landscapes are widespread in mountainous areas in a variety of climatic zones around the World. The most famous are those found associated with the famous Inca site of Machu Pichu in the Andes, the arid lands in upland areas of Yemen, and the abundant rice terraces covering the hilltops in tropical areas such as Thailand, Vietnam, and China and also Bali. Terraces were designed using advanced engineered techniques, requiring specialist knowledge of bedrock geology, soil cultivation and maintenance, and ecosystem management to grow a variety of crops in specific environmental conditions. These enigmatic landscapes were often overlooked in the past but have now received widespread attention to further understand their age, origins, and evolution as the landscapes and environment changed over time. By understanding the age and chronologies of agricultural terrace technology, we can enhance our understanding of these unique features considered widely as important ecosystem services in the present day. We present distinct luminescence dating evidence from a variety of terraced systems found in different European environmental settings, such as the UK, Italy and Belgium, as part of the wider ERC-funded TerrACE Project. Our research aims to better understand their history and advocate for their protection and effective management as important cultural, heritage and environmental assets, creating new avenues for future scientific research.

Keywords: terraces, agriculture, luminescence dating, heritage protection

Procedia PDF Downloads 54
29918 Addictive Use Due to Personality: Focused on Big Five Personality Traits and Game Addiction

Authors: Eui Jun Jeong, Hye Rim Lee, Ji Hye Yoo

Abstract:

Recent studies have verified the significant relationship of user personality with Internet use. However, in game studies, little research has emphasized on the effects of personality traits on game addiction. This study examined whether big five personality traits affect game addiction with control of psychological, social, and demographic factors. Specifically, using data from a survey of 789 game users in Korea, we conducted a regression analysis to see the associations of psychological (loneliness/depression), social (activities with family/friends), self-efficacy (game/general), gaming (daily gaming time/perception), demographic (age/gender), and personality traits (extraversion, neuroticism conscientiousness, agreeableness, & openness) with the degree of game addiction. Results showed that neuroticism increase game addiction with no effect of extraversion on the addiction. General self-efficacy negatively affected game addiction, whereas game self-efficacy increased the degree of game addiction. Loneliness enhanced game addiction while depression showed a negative effect on the addiction. Results and implications are discussed.

Keywords: game addiction, big five personality, social activities, self-efficacy, loneliness, depression

Procedia PDF Downloads 569
29917 Transcriptomic Analysis of Fragrant Rice Reveals the Involvement of Post-transcriptional Regulation in Response to Zn Foliar Application

Authors: Muhammad Imran, Sarfraz Shafiq, Xiangru Tang

Abstract:

Alternative splicing (AS) is an important post-transcriptional regulatory mechanism to generate transcripts variability and proteome diversity in plants. Fragrant rice (Oryza sativa L.) has a high economic and nutritional value, and the application of micronutrients regulate 2-acetyl-1-pyrroline (2-AP) production, which is responsible for aroma in fragrant rice. However, no systematic investigation of AS events in response to micronutrients (Zn) has been performed in fragrant rice. Furthermore, the post-transcriptional regulation of genes involved in 2-AP biosynthesis is also not known. In this study, a comprehensive analysis of AS events under two gradients of Zn treatment in two different fragrant rice cultivars (Meixiangzhan-2 and Xiangyaxiangzhan) was performed. A total of 386 and 598 significant AS events were found in Meixiangzhan-2 treated with low and high doses of Zn, respectively. In Xiangyaxiangzhan, a total of 449 and 598 significant AS events were found in low and high doses of Zn, respectively. Go analysis indicated that these genes were highly enriched in physiological processes, metabolism, and cellular process in both cultivars. However, genotype and dose-dependent AS events were also detected in both cultivars. By comparing differential AS (DAS) events with differentially expressed genes (DEGs), we found a weak overlap among DAS and DEGs in both fragrant rice cultivars, indicating that only a few genes are post-transcriptionally regulated in response to Zn treatment. We further report that Zn differentially regulates the expression of 2-AP biosynthesis-related genes in both cultivars, and Zn treatment altered the editing frequency of SNPs in the genes involved in 2-AP biosynthesis. Finally, we showed that epigenetic modifications associated with active gene transcription are generally enriched over 2-AP biosynthesis-related genes. Taken together, our results provide evidence of the post-transcriptional gene regulation in fragrant rice in response to Zn treatment and highlight that the 2-AP biosynthesis pathway may also be post-transcriptionally regulated through epigenetic modifications. These findings will serve as a cornerstone for further investigation to understand the molecular mechanisms of 2-AP biosynthesis in fragrant rice.

Keywords: fragrant rice, 2-acetyl-1-pyrroline, gene expression, zinc, alternative splicing, SNPs

Procedia PDF Downloads 112
29916 The Urban Stray Animal Identification Management System Based on YOLOv5

Authors: Chen Xi, Kuan Sinman, LI Haofeng, Huang Hongming, Zeng Chengyu, Tong Zhiyuan

Abstract:

Stray animals are on the rise in mainland China's cities. There are legal reasons for this, namely the lack of protection for domestic pets in mainland China, where only wildlife protection laws exist. At a social level, the ease with which families adopt pets and the lack of a social view of animal nature has led to the frequent abandonment and loss of stray animals. If left unmanaged, conflicts between humans and stray animals can also increase. This project provides an inexpensive and widely applicable management tool for urban management by collecting videos and pictures of stray animals captured by surveillance or transmitted by humans and using artificial intelligence technology (mainly using YOLOv5 recognition technology) and recording and managing them in a database.

Keywords: urban planning, urban governance, artificial intelligence, convolutional neural network

Procedia PDF Downloads 104
29915 Ensemble Methods in Machine Learning: An Algorithmic Approach to Derive Distinctive Behaviors of Criminal Activity Applied to the Poaching Domain

Authors: Zachary Blanks, Solomon Sonya

Abstract:

Poaching presents a serious threat to endangered animal species, environment conservations, and human life. Additionally, some poaching activity has even been linked to supplying funds to support terrorist networks elsewhere around the world. Consequently, agencies dedicated to protecting wildlife habitats have a near intractable task of adequately patrolling an entire area (spanning several thousand kilometers) given limited resources, funds, and personnel at their disposal. Thus, agencies need predictive tools that are both high-performing and easily implementable by the user to help in learning how the significant features (e.g. animal population densities, topography, behavior patterns of the criminals within the area, etc) interact with each other in hopes of abating poaching. This research develops a classification model using machine learning algorithms to aid in forecasting future attacks that is both easy to train and performs well when compared to other models. In this research, we demonstrate how data imputation methods (specifically predictive mean matching, gradient boosting, and random forest multiple imputation) can be applied to analyze data and create significant predictions across a varied data set. Specifically, we apply these methods to improve the accuracy of adopted prediction models (Logistic Regression, Support Vector Machine, etc). Finally, we assess the performance of the model and the accuracy of our data imputation methods by learning on a real-world data set constituting four years of imputed data and testing on one year of non-imputed data. This paper provides three main contributions. First, we extend work done by the Teamcore and CREATE (Center for Risk and Economic Analysis of Terrorism Events) research group at the University of Southern California (USC) working in conjunction with the Department of Homeland Security to apply game theory and machine learning algorithms to develop more efficient ways of reducing poaching. This research introduces ensemble methods (Random Forests and Stochastic Gradient Boosting) and applies it to real-world poaching data gathered from the Ugandan rain forest park rangers. Next, we consider the effect of data imputation on both the performance of various algorithms and the general accuracy of the method itself when applied to a dependent variable where a large number of observations are missing. Third, we provide an alternate approach to predict the probability of observing poaching both by season and by month. The results from this research are very promising. We conclude that by using Stochastic Gradient Boosting to predict observations for non-commercial poaching by season, we are able to produce statistically equivalent results while being orders of magnitude faster in computation time and complexity. Additionally, when predicting potential poaching incidents by individual month vice entire seasons, boosting techniques produce a mean area under the curve increase of approximately 3% relative to previous prediction schedules by entire seasons.

Keywords: ensemble methods, imputation, machine learning, random forests, statistical analysis, stochastic gradient boosting, wildlife protection

Procedia PDF Downloads 292
29914 Calculation of Organ Dose for Adult and Pediatric Patients Undergoing Computed Tomography Examinations: A Software Comparison

Authors: Aya Al Masri, Naima Oubenali, Safoin Aktaou, Thibault Julien, Malorie Martin, Fouad Maaloul

Abstract:

Introduction: The increased number of performed 'Computed Tomography (CT)' examinations raise public concerns regarding associated stochastic risk to patients. In its Publication 102, the ‘International Commission on Radiological Protection (ICRP)’ emphasized the importance of managing patient dose, particularly from repeated or multiple examinations. We developed a Dose Archiving and Communication System that gives multiple dose indexes (organ dose, effective dose, and skin-dose mapping) for patients undergoing radiological imaging exams. The aim of this study is to compare the organ dose values given by our software for patients undergoing CT exams with those of another software named "VirtualDose". Materials and methods: Our software uses Monte Carlo simulations to calculate organ doses for patients undergoing computed tomography examinations. The general calculation principle consists to simulate: (1) the scanner machine with all its technical specifications and associated irradiation cases (kVp, field collimation, mAs, pitch ...) (2) detailed geometric and compositional information of dozens of well identified organs of computational hybrid phantoms that contain the necessary anatomical data. The mass as well as the elemental composition of the tissues and organs that constitute our phantoms correspond to the recommendations of the international organizations (namely the ICRP and the ICRU). Their body dimensions correspond to reference data developed in the United States. Simulated data was verified by clinical measurement. To perform the comparison, 270 adult patients and 150 pediatric patients were used, whose data corresponds to exams carried out in France hospital centers. The comparison dataset of adult patients includes adult males and females for three different scanner machines and three different acquisition protocols (Head, Chest, and Chest-Abdomen-Pelvis). The comparison sample of pediatric patients includes the exams of thirty patients for each of the following age groups: new born, 1-2 years, 3-7 years, 8-12 years, and 13-16 years. The comparison for pediatric patients were performed on the “Head” protocol. The percentage of the dose difference were calculated for organs receiving a significant dose according to the acquisition protocol (80% of the maximal dose). Results: Adult patients: for organs that are completely covered by the scan range, the maximum percentage of dose difference between the two software is 27 %. However, there are three organs situated at the edges of the scan range that show a slightly higher dose difference. Pediatric patients: the percentage of dose difference between the two software does not exceed 30%. These dose differences may be due to the use of two different generations of hybrid phantoms by the two software. Conclusion: This study shows that our software provides a reliable dosimetric information for patients undergoing Computed Tomography exams.

Keywords: adult and pediatric patients, computed tomography, organ dose calculation, software comparison

Procedia PDF Downloads 163
29913 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 160
29912 The Gaps of Environmental Criminal Liability in Armed Conflicts and Its Consequences: An Analysis under Stockholm, Geneva and Rome

Authors: Vivian Caroline Koerbel Dombrowski

Abstract:

Armed conflicts have always meant the ultimate expression of power and at the same time, lack of understanding among nations. Cities were destroyed, people were killed, assets were devastated. But these are not only the loss of a war: the environmental damage comes to be considered immeasurable losses in the short, medium and long term. And this is because no nation wants to bear that cost. They invest in military equipment, training, technical equipment but the environmental account yet finds gaps in international law. Considering such a generalization in rights protection, many nations are at imminent danger in a conflict if the water will be used as a mass weapon, especially if we consider important rivers such as Jordan, Euphrates and Nile. The top three international documents were analyzed on the subject: the Stockholm Convention (1972), Additional Protocol I to the Geneva Convention (1977) and the Rome Statute (1998). Indeed, some references are researched in doctrine, especially scientific articles, to substantiate with consistent data about the extent of the damage, historical factors and decisions which have been successful. However, due to the lack of literature about this subject, the research tends to be exhaustive. From the study of the indicated material, it was noted that international law - humanitarian and environmental - calls in some of its instruments the environmental protection in war conflicts, but they are generic and vague rules that do not define exactly what is the environmental damage , nor sets standards for measure them. Taking into account the mains conflicts of the century XX: World War II, the Vietnam War and the Gulf War, one must realize that the environmental consequences were of great rides - never deactivated landmines, buried nuclear weapons, armaments and munitions destroyed in the soil, chemical weapons, not to mention the effects of some weapons when used (uranium, agent Orange, etc). Extending the search for more recent conflicts such as Afghanistan, it is proven that the effects on health of the civilian population were catastrophic: cancer, birth defects, and deformities in newborns. There are few reports of nations that, somehow, repaired the damage caused to the environment as a result of the conflict. In the pitch of contemporary conflicts, many nations fear that water resources are used as weapons of mass destruction, because once contaminated - directly or indirectly - can become a means of disguised genocide side effect of military objective. In conclusion, it appears that the main international treaties governing the subject mention the concern for environmental protection, however leave the normative specifications vacancies necessary to effectively there is a prevention of environmental damage in armed conflict and, should they occur, the repair of the same. Still, it appears that there is no protection mechanism to safeguard natural resources and avoid them to become a mass destruction weapon.

Keywords: armed conflicts, criminal liability, environmental damages, humanitarian law, mass weapon

Procedia PDF Downloads 420
29911 Regional Anesthesia in Carotid Surgery: A Single Center Experience

Authors: Daniel Thompson, Muhammad Peerbux, Sophie Cerutti, Hansraj Riteesh Bookun

Abstract:

Patients with carotid stenosis, which may be asymptomatic or symptomatic in the form of transient ischaemic attack (TIA), amaurosis fugax, or stroke, often require an endarterectomy to reduce stroke risk. Risks of this procedure include stroke, death, myocardial infarction, and cranial nerve damage. Carotid endarterectomy is most commonly performed under general anaesthetic, however, it can also be undertaken with a regional anaesthetic approach. Our tertiary centre generally performs carotid endarterectomy under regional anaesthetic. Our major tertiary hospital mostly utilises regional anaesthesia for carotid endarterectomy. We completed a cross-sectional analysis of all cases of carotid endarterectomy performed under regional anaesthesia across a 10-year period between January 2010 to March 2020 at our institution. 350 patients were included in this descriptive analysis, and demographic details for patients, indications for surgery, procedural details, length of surgery, and complications were collected. Data was cross tabulated and presented in frequency tables to describe these categorical variables. 263 of the 350 patients in the analysis were male, with a mean age of 71 ± 9. 172 patients had a history of ischaemic heart disease, 104 had diabetes mellitus, 318 had hypertension, and 17 patients had chronic kidney disease greater than Stage 3. 13.1% (46 patients) were current smokers, and the majority (63%) were ex-smokers. Most commonly, carotid endarterectomy was performed conventionally with patch arterioplasty 96% of the time (337 patients). The most common indication was TIA and stroke in 64% of patients, 18.9% were classified as asymptomatic, and 13.7% had amaurosis fugax. There were few general complications, with 9 wound complications/infections, 7 postoperative haematomas requiring return to theatre, 3 myocardial infarctions, 3 arrhythmias, 1 exacerbation of congestive heart failure, 1 chest infection, and 1 urinary tract infection. Specific complications to carotid endarterectomy included 3 strokes, 1 postoperative TIA, and 1 cerebral bleed. There were no deaths in our cohort. This analysis of a large cohort of patients from a major tertiary centre who underwent carotid endarterectomy under regional anaesthesia indicates the safety of such an approach for these patients. Regional anaesthesia holds the promise of less general respiratory and cardiac events compared to general anaesthesia, and in this vulnerable patient group, calls for comparative research between local and general anaesthesia in carotid surgery.

Keywords: anaesthesia, carotid endarterectomy, stroke, carotid stenosis

Procedia PDF Downloads 121
29910 Analysis of Standard Tramway Surge Protection Methods Based on Real Cases

Authors: Alain Rousseau, Alfred Aragones, Gilles Rougier

Abstract:

The study is based on lightning and surge standards mainly the EN series 62305 for facility protection, EN series 61643 for Low Voltage Surge Protective Devices, High Voltage surge arrester standard en 60099-4 and the traction arrester standards namely EN 50526-1 and 50526-1 dealing respectively with railway applications fixed installations D.C. surge arresters and voltage limiting devices. The more severe stress for tramways installations is caused by direct lightning on the catenary line. In such case, the surge current propagates towards the various poles and sparkover the insulators leading to a lower stress. If the impact point is near enough, a significant surge current will flow towards the traction surge arrester that is installed on the catenary at the location the substation is connected. Another surge arrester can be installed at the entrance of the substation or even inside the rectifier to avoid insulation damages. In addition, surge arresters can be installed between + and – to avoid damaging sensitive circuits. Based on disturbances encountered in a substation following a lighting event, the engineering department of RATP has decided to investigate the cause of such damage and more generally to question the efficiency of the various possible protection means. Based on the example of a recent tramway line the paper present the result of a lightning study based on direct lightning strikes. As a matter of fact, the induced surges on the catenary are much more frequent but much less damaging. First, a lightning risk assessment is performed for the substations that takes into account direct lightning and induced lightning both on the substation and its connected lines such as the catenary. Then the paper deals with efficiency of the various surge arresters is discussed based on field experience and calculations. The efficiency of the earthing system used at the bottom of the pole is also addressed based on high frequency earthing measurement. As a conclusion, the paper is making recommendations for an enhanced efficiency of existing protection means.

Keywords: surge arrester, traction, lightning, risk, surge protective device

Procedia PDF Downloads 259
29909 Gravitational Frequency Shifts for Photons and Particles

Authors: Jing-Gang Xie

Abstract:

The research, in this case, considers the integration of the Quantum Field Theory and the General Relativity Theory. As two successful models in explaining behaviors of particles, they are incompatible since they work at different masses and scales of energy, with the evidence that regards the description of black holes and universe formation. It is so considering previous efforts in merging the two theories, including the likes of the String Theory, Quantum Gravity models, and others. In a bid to prove an actionable experiment, the paper’s approach starts with the derivations of the existing theories at present. It goes on to test the derivations by applying the same initial assumptions, coupled with several deviations. The resulting equations get similar results to those of classical Newton model, quantum mechanics, and general relativity as long as conditions are normal. However, outcomes are different when conditions are extreme, specifically with no breakdowns even for less than Schwarzschild radius, or at Planck length cases. Even so, it proves the possibilities of integrating the two theories.

Keywords: general relativity theory, particles, photons, Quantum Gravity Model, gravitational frequency shift

Procedia PDF Downloads 359
29908 Parental Separation and 'the Best Interests of the Child' at International Law: Guidance for Nation States in the 21st Century

Authors: Cassandra Seery

Abstract:

During the twentieth century, the notion of child rights at the international level began with the League of Nations’ Geneva Declaration of the Rights of the Child 1924, culminating in the development and adoption of the UN Convention on the Rights of the Child (‘the Convention’) in 1989. A key foundation of child rights lies in the development of the ‘best interests of the child’ principle and its subsequent incorporation into domestic legislation across the globe. This principle has become a key concept in child rights protection and has become a widely recognized principle in the protection of child rights. However, despite its status as the primary operating standard in child and family law and its ‘deepening hold in domestic and international instruments’, the meaning of the ‘best interests of the child’ principle has been criticised as open-ended and vague. This paper explores the evolution and development of the principle in the context of parental separation at international law throughout the 21st century and identifies opportunities for the Nation States to further improve legislative responses in associated child protection cases. An extensive review of relevant United Nations documentation (including instruments, resolutions and comments, jurisprudence, reports, guidelines and policies, training materials and so forth) explores: (i) what progress has been made to further develop the principle at the international level with regard to parental separation; and (ii) what developments participating the Nation States should consider as part of future legal and social policy reforms in this space. It will highlight opportunities for improvement and explore the benefit and relevance of international approaches for the Nation States moving forward.

Keywords: international human rights, best interests of the child, legal and social policy, child rights

Procedia PDF Downloads 261
29907 Smart Meter Incorporating UWB Technology

Authors: T. A. Khan, A. B. Khan, M. Babar, T. A. Taj, Imran Ijaz Imran

Abstract:

Smart Meter is a key element in the evolving concept of Smart Grid, which plays an important role in interaction between the consumer and the supplier. In general, the smart meter is an intelligent digital energy meter that measures the consumption of electrical energy and provides other additional services as compared to the conventional energy meters. One of the important element that makes a meter smart and different is its communication module. Smart meters usually have two way and real-time communication between the consumer and the supplier through which its transfer data and information. In this paper, Ultra Wide Band (UWB) is recommended as communication platform because of its high data-rate and presents the physical layer, which could be easily incorporated in existing Smart Meters. The physical layer is simulated in MATLAB Simulink and the results are provided.

Keywords: Ultra Wide Band (UWB), Smart Meter, MATLAB, transfer data

Procedia PDF Downloads 516
29906 Qualitative Approaches to Mindfulness Meditation Practices in Higher Education

Authors: Patrizia Barroero, Saliha Yagoubi

Abstract:

Mindfulness meditation practices in the context of higher education are becoming more and more common. Some of the reported benefits of mediation interventions and workshops include: improved focus, general well-being, diminished stress, and even increased resilience and grit. A series of workshops free to students, faculty, and staff was offered twice a week over two semesters at Hudson County Community College, New Jersey. The results of an exploratory study based on participants’ subjective reactions to these workshops will be presented. A qualitative approach was used to collect and analyze the data and a hermeneutic phenomenological perspective served as a framework for the research design and data collection and analysis. The data collected includes three recorded videos of semi-structured interviews and several written surveys submitted by volunteer participants.

Keywords: mindfulness meditation practices, stress reduction, resilience, grit, higher education success, qualitative research

Procedia PDF Downloads 75
29905 Subway Stray Current Effects on Gas Pipelines in the City of Tehran

Authors: Mohammad Derakhshani, Saeed Reza Allahkarama, Michael Isakhani-Zakaria, Masoud Samadian, Hojjat Sharifi Rasaey

Abstract:

In order to investigate the effects of stray current from DC traction systems (subway) on cathodically protected gas pipelines, the subway and the gas network maps in the city of Tehran were superimposed and a comprehensive map was prepared. 213 intersections and about 100150 meters of parallel sections of gas pipelines were found with respect to the railway right of way which was specified for field measurements. The potential measurements data were logged for one hour in each test point. 24-hour potential monitoring was carried out in selected test points as well. Results showed that dynamic stray current from subway on pipeline potential appears as fluctuations in its static potential that is visible in the diagrams during night periods. These fluctuations can cause the pipeline potential to exit the safe zone and lead to corrosion or overprotection. In this study, a maximum potential shift of 100 mv in the pipe-to-soil potential was considered as a criterion for dynamic stray current effective presence. Results showed that a potential fluctuation range between 100 mV to 3 V exists in measured points on pipelines which exceeds the proposed criterion and needs to be investigated. Corrosion rates influenced by stray currents were calculated using coupons. Results showed that coupon linked to the pipeline in one of the locations at region 1 of the city of Tehran has a corrosion rate of 4.2 mpy (with cathodic protection and under influence of stray currents) which is about 1.5 times more than free corrosion rate of 2.6 mpy.

Keywords: stray current, DC traction, subway, buried Pipelines, cathodic protection list

Procedia PDF Downloads 822
29904 Review of the Road Crash Data Availability in Iraq

Authors: Abeer K. Jameel, Harry Evdorides

Abstract:

Iraq is a middle income country where the road safety issue is considered one of the leading causes of deaths. To control the road risk issue, the Iraqi Ministry of Planning, General Statistical Organization started to organise a collection system of traffic accidents data with details related to their causes and severity. These data are published as an annual report. In this paper, a review of the available crash data in Iraq will be presented. The available data represent the rate of accidents in aggregated level and classified according to their types, road users’ details, and crash severity, type of vehicles, causes and number of causalities. The review is according to the types of models used in road safety studies and research, and according to the required road safety data in the road constructions tasks. The available data are also compared with the road safety dataset published in the United Kingdom as an example of developed country. It is concluded that the data in Iraq are suitable for descriptive and exploratory models, aggregated level comparison analysis, and evaluation and monitoring the progress of the overall traffic safety performance. However, important traffic safety studies require disaggregated level of data and details related to the factors of the likelihood of traffic crashes. Some studies require spatial geographic details such as the location of the accidents which is essential in ranking the roads according to their level of safety, and name the most dangerous roads in Iraq which requires tactic plan to control this issue. Global Road safety agencies interested in solve this problem in low and middle-income countries have designed road safety assessment methodologies which are basing on the road attributes data only. Therefore, in this research it is recommended to use one of these methodologies.

Keywords: road safety, Iraq, crash data, road risk assessment, The International Road Assessment Program (iRAP)

Procedia PDF Downloads 256
29903 H.264 Video Privacy Protection Method Using Regions of Interest Encryption

Authors: Taekyun Doo, Cheongmin Ji, Manpyo Hong

Abstract:

Like a closed-circuit television (CCTV), video surveillance system is widely placed for gathering video from unspecified people to prevent crime, surveillance, or many other purposes. However, abuse of CCTV brings about concerns of personal privacy invasions. In this paper, we propose an encryption method to protect personal privacy system in H.264 compressed video bitstream with encrypting only regions of interest (ROI). There is no need to change the existing video surveillance system. In addition, encrypting ROI in compressed video bitstream is a challenging work due to spatial and temporal drift errors. For this reason, we propose a novel drift mitigation method when ROI is encrypted. The proposed method was implemented by using JM reference software based on the H.264 compressed videos, and experimental results show the verification of our proposed methods and its effectiveness.

Keywords: H.264/AVC, video encryption, privacy protection, post compression, region of interest

Procedia PDF Downloads 340