Search results for: physical security
7449 Fracking the UK's Shale Gas Regulatory Regime
Authors: Yanal Abul Failat
Abstract:
The production of oil and natural gas from shale formations is becoming a trend, and many countries with technically and economically recoverable unconventional resources are endeavoring to explore how shale formations may benefit the economy and achieve energy security. The trajectory of shale gas development in the UK is highly supported by the government; in the Gas Generation Strategy Paper published by the UK government on 5 December 2013, it is recognized that the shale gas production would decrease reliance on imports and thus enhance the UK’s energy security. Moreover, the UK Institute of Directors report on UK Shale Gas Potential explains that in the UK there is a potential of production peaking at around 1.13 trillion cubic feet (“tcf”) and a sector that could support around 70,000 jobs and secure net benefit to the Treasury in tax revenues. On this basis, there has been a growing interest in the benefits of exploring the UK’s shale gas but a combination of technical challenges faced in shale gas operations, a stern opposition by environmentalists and concerns on the adequacy of the legal framework have slowed the progress of the emerging UK shale industry.Keywords: shale gas, UK, legal, oil and gas, energy
Procedia PDF Downloads 7117448 Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations
Authors: Sadiq Nasir
Abstract:
The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture.Keywords: cybersecurity, cybersecurity awareness, human factor in security, human security
Procedia PDF Downloads 867447 Spaces in the City to Practice Physical Activities: Case Study of Conchal, São Paulo, Brazil
Authors: Ana Maria Girotti Sperandio, Jussara Conceição Guarnieri, Lauro Luiz Francisco Filho, Ana Claudia Martins Alves, Adriana Aparecida Carneiro Rosa
Abstract:
The urban planning of a city should contemplate the construction of healthy spaces to provide quality of life for people. In a Brazilian municipality located 180 km from the capital of São Paulo with around 27,000 thousand inhabitants, the federal government made possible a program that allows the improvement of the quality of life of the inhabitants through the practice of physical activity. To describe health promotion strategies in the city that collaborate in the reduction of chronic non-communicable diseases (CDNT) and the improvement the quality of its residents. Considering the CDNT as a fundamental public health concern in different countries, the methodology of this work considered the different actions of health promotion that occurred in the city for the implementation of the Polo Health Academy with the objective of increasing the population's access to places that could develop targeted physical activities. As an instrument, it used records of participants of this academy such as: assessment sheets, evolution, photos, filming and daily reports of physical activities. Results: The implantation and implementation process of the Polo Health Academy in the city of Conchal / SP / Brazil was in accordance with the principles and values of the National Health Promotion Policy (PNaPS) in Brazil and with the city statute, that provides improvement in the quality of life of the Brazilian population. An increase was observed in the number of participants in different hours practicing physical activities in the territory linked to one of the five Health Units, showing the program provides that happiness and well-being to the students. The Brazilian health promotion policy, combined with the city’s development policy, provides the population with access to programs that stimulate the reduction of CDNTs, confirming the urban planning of a healthy city.Keywords: health city, health promotion, physical activity, urban planning
Procedia PDF Downloads 1927446 Comparative Analysis between Wired and Wireless Technologies in Communications: A Review
Authors: Jafaru Ibrahim, Tonga Agadi Danladi, Haruna Sani
Abstract:
Many telecommunications industry are looking for new ways to maximize their investment in communication networks while ensuring reliable and secure information transmission. There is a variety of communications medium solutions, the two must popularly in used are wireless technology and wired options, such as copper and fiber-optic cable. Wired network has proven its potential in the olden days but nowadays wireless communication has emerged as a robust and most intellect and preferred communication technique. Each of these types of communication medium has their advantages and disadvantages according to its technological characteristics. Wired and wireless networking has different hardware requirements, ranges, mobility, reliability and benefits. The aim of the paper is to compare both the Wired and Wireless medium on the basis of various parameters such as usability, cost, efficiency, flexibility, coverage, reliability, mobility, speed, security etc.Keywords: cost, mobility, reliability, speed, security, wired, wireless
Procedia PDF Downloads 4707445 COVID-19 Impact on Online Digital Marketing Business Activities
Authors: Balwinder Singh, Veerpaul Kaur Mann
Abstract:
The COVID-19 had a dramatic impact on several countries across the world. National governments have imposed widespread restrictions to prevent the growth of this pandemic. The new health competitive scenario induced by the COVID-19 crisis raised many issues on how business activities should be reorganized due to the difficulties of physical interactions with distributors, suppliers and customers. The pandemic has particularly affected the whole marketing processes because of the relevant issues emerged in managing physical sale channels and interactions with one another, both in the Business-to-Consumer and in the Business-to-Business markets. Recent research about the appropriate actions and strategies that could help firms overcome the crisis has highlighted the key role of digital technologies that may ensure connections and, thus, help business activities to run smoothly. This could be true, especially with the emergence of strong limitations on physical interactions during the COVID-19 pandemic. In such a scenario, the online channel becomes the most important conducive for online customers to get in contact with the firm and carry out online purchasing activities.Keywords: COVID-19, business, digital marketing, online customers
Procedia PDF Downloads 567444 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection
Authors: Muhammad Ali
Abstract:
Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection
Procedia PDF Downloads 1257443 Privacy for the Internet of Things and its Different Dimensions
Authors: Maryam M Esfahani
Abstract:
The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies
Procedia PDF Downloads 987442 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict
Authors: Christopher Holroyd
Abstract:
With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.Keywords: human trafficking, reconstruction, security, terrorism
Procedia PDF Downloads 1327441 Study on Network-Based Technology for Detecting Potentially Malicious Websites
Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park
Abstract:
Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits
Procedia PDF Downloads 3667440 Economic and Social Well-Being for Migrant Workers: Asian Experiences
Authors: Mohsin Reza, Thirunaukarasu Subramaniam, M. Rezaul Islam
Abstract:
In Asia, economic and social well-being issues are rarely addressed. The major characteristics of the migrant workers in Asian countries are seriously exploited, marginalized, and infrequently looked from human rights perspective. This paper explored the opportunities and shortages of economic and social well-being for the migrant workers in Asia. A Qualitative Interpretative Meta-Synthesis (QIMS) was conducted to analyze the contextual socio-economic factors that characterized migrant workers’ economic and social well-being. It is perceived that in most of the recruiting countries, there are lacks of government commitments to the international protocols, conventions and laws that they ratified towards safeguarding migrant workers’ economic and social well-being. Results showed that the migrant workers had lack of job security, poor salary, long working hours, low access to the public services, poor health, poor living and working conditions, lack of legal rights, physical and mental threats. The finding would be important guideline to the governments, policy makers, legal rights practitioners, and human rights organizations.Keywords: Asia, economic well-being, social well-being, migrant workers, human rights
Procedia PDF Downloads 3237439 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation
Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin
Abstract:
The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.Keywords: ISMS success factors, IT project management, IS success, information security
Procedia PDF Downloads 3157438 Modeling and Calculation of Physical Parameters of the Pollution of Water by Oil and Materials in Suspensions
Authors: Ainas Belkacem, Fourar Ali
Abstract:
The present study focuses on the mathematical modeling and calculation of physical parameters of water pollution by oil and sand in regime fully dispersed in water. In this study, the sand particles and oil are suspended in the case of fully developed turbulence. The study consists to understand, model and predict the viscosity, the structure and dynamics of these types of mixtures. The work carried out is Numerical and validated by experience.Keywords: multi phase flow, pollution, suspensions, turbulence
Procedia PDF Downloads 2387437 Learning Academic Skills through Movement: A Case Study in Evaluation
Authors: Y. Salfati, D. Sharef Bussel, J. Zamir
Abstract:
In this paper, we present an Evaluation Case Study implementing the eight principles of Collaborative Approaches to Evaluation (CAE) as designed by Brad Cousins in the past decade. The focus of this paper is sharing a rich experience in which we achieved two main goals. The first was the development of a valuable and meaningful new teacher training program, and the second was a successful implementation of the CAE principles. The innovative teacher training program is based on the idea of including physical movement during the process of teaching and learning academic themes. The program is called Learning through Movement. This program is a response to a call from the Ministry of Education, claiming that today children sit in front of screens and do not exercise any physical activity. In order to contribute to children’s health, physical, and cognitive development, the Ministry of Education promotes learning through physical activities. Research supports the idea that sports and physical exercise improve academic achievements. The Learning through Movement program is operated by Kaye Academic College. Students in the Elementary School Training Program, together with students in the Physical Education Training Program, implement the program in collaboration with two mentors from the College. The program combines academic learning with physical activity. The evaluation began at the beginning of the program. During the evaluation process, data was collected by means of qualitative tools, including interviews with mentors, observations during the students’ collaborative planning, class observations at school and focus groups with students, as well as the collection of documentation related to the teamwork and to the program itself. The data was analyzed using content analysis and triangulation. The preliminary results show outcomes relating to the Teacher Training Programs, the student teachers, the pupils in class, the role of Physical Education teachers, and the evaluation. The Teacher Training Programs developed a collaborative approach to lesson planning. The students' teachers demonstrated a change in their basic attitudes towards the idea of integrating physical activities during the lessons. The pupils indicated higher motivation through full participation in classes. These three outcomes are indicators of the success of the program. An additional significant outcome of the program relates to the status and role of the physical education teachers, changing their role from marginal to central in the school. Concerning evaluation, a deep sense of trust and confidence was achieved, between the evaluator and the whole team. The paper includes the perspectives and challenges of the heads and mentors of the two programs as well as the evaluator’s conclusions. The evaluation unveils challenges in conducting a CAE evaluation in such a complex setting.Keywords: collaborative evaluation, training teachers, learning through movement
Procedia PDF Downloads 1467436 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India
Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer
Abstract:
The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.Keywords: East Himalaya, local community, wild edible plants, nutrition, food security
Procedia PDF Downloads 2627435 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners
Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi
Abstract:
Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression
Procedia PDF Downloads 2227434 A Gendered Perspective on the Influences of Transport Infrastructure on User Access
Authors: Ajeni Ari
Abstract:
In addressing gender and transport, considerations of mobility disparities amongst users are important. Public transport (PT) policy and design do not efficiently account for the varied mobility practices between men and women, with literature only recently showing a movement towards gender inclusion in transport. Arrantly, transport policy and designs remain gender-blind to the variation of mobility needs. The global movement towards sustainability highlights the need for expeditious strategies that could mitigate biases within the existing system. At the forefront of such plan of action may, in part, be mandated inclusive infrastructural designs that stimulate user engagement with the transport system. Fundamentally access requires a means or an opportunity to entity, which for PT is an establishment of its physical environment and/or infrastructural design. Its practicality may be utilised with knowledge of shortcomings in tangible or intangible aspects of the service offerings allowing access to opportunities. To inform on existing biases in PT planning and design, this study analyses qualitative data to examine the opinions and lived experiences among transport user in Ireland. Findings show that infrastructural design plays a significant role in users’ engagement with the service. Paramount to accessibility are service provisions that cater to both user interactions and those of their dependents. Apprehension to use the service is more so evident with women in comparison to men, particularly while carrying out household duties and caring responsibilities at peak times or dark hours. Furthermore, limitations are apparent with infrastructural service offerings that do not accommodate the physical (dis)ability of users, especially universal design. There are intersecting factors that impinge on accessibility, e.g., safety and security, yet essentially, infrastructural design is an important influencing parameter to user perceptual conditioning. Additionally, data discloses the need for user intricacies to be factored in transport planning geared towards gender inclusivity, including mobility practices, travel purpose, transit time or location, and system integration.Keywords: public transport, accessibility, women, transport infrastructure
Procedia PDF Downloads 787433 Walking the Talk? Thinking and Acting – Teachers' and Practitioners' Perceptions about Physical Activity, Health and Well-Being, Do They 'Walk the Talk' ?
Authors: Kristy Howells, Catherine Meehan
Abstract:
This position paper presents current research findings into the proposed gap between teachers’ and practitioners’ thinking and acting about physical activity health and well-being in childhood. Within the new Primary curriculum, there is a focus on sustained physical activity within a Physical Education and healthy lifestyles in Personal, Health, Social and Emotional lessons, but there is no curriculum guidance about what sustained physical activity is and how it is defined. The current health guidance on birth to five suggests that children should not be inactive for long periods and specify light and energetic activities, however there is the a suggested period of time per day for young children to achieve, but the guidance does not specify how this should be measured. The challenge therefore for teachers and practitioners is their own confidence and understanding of what “good / moderate intensity” physical activity and healthy living looks like for children and the children understanding what they are doing. There is limited research about children from birth to eight years and also the perceptions and attitudes of those who work with this age group of children, however it was found that children at times can identify different levels of activity and it has been found that children can identify healthy foods and good choices for healthy living at a basic level. Authors have also explored teachers’ beliefs about teaching and learning and found that teachers could act in accordance to their beliefs about their subject area only when their subject knowledge, understanding and confidence of that area is high. It has been proposed that confidence and competence of practitioners and teachers to integrate ‘well-being’ within the learning settings has been reported as being low. This may be due to them not having high subject knowledge. It has been suggested that children’s life chances are improved by focusing on well-being in their earliest years. This includes working with parents and families, and being aware of the environmental contexts that may impact on children’s wellbeing. The key is for practitioners and teachers to know how to implement these ideas effectively as these key workers have a profound effect on young children as role models and due to the time of waking hours spent with them. The position paper is part of a longitudinal study at Canterbury Christ Church University and currently we will share the research findings from the initial questionnaire (online, postal, and in person) that explored and evaluated the knowledge, competence and confidence levels of practitioners and teachers as to the structure and planning of sustained physical activity and healthy lifestyles and how this progresses with the children’s age.Keywords: health, perceptions, physical activity, well-being
Procedia PDF Downloads 4037432 The Effect of Exposure to High Noise Level on the Performance and Rate of Error in Manual Activities
Authors: Zahra Zamanian, Alireza Zamanian, Jafar Hasanzadeh
Abstract:
Background: Unwanted sound, as one of the most important physical factors in the majority of production units, imposes a great number of problems on the industrial workers. Sound is one of the environmental factors which can cause physical as well as psychological damages and also affects the individuals’ performance and productivity. Therefore, the present study aimed to determine the effect of noise exposure on human performance. Methods: The present study assessed the effect of noise on the performance of 50 students of Shiraz University of Medical Sciences (25 males and 25 females) at the sound pressures of 70, 90, and 110 dB by using two factors of physical features and the creation of different conditions of sound pressure source as well as applying Two-Arm coordination Test. Results: The results of the present study revealed no significant difference between male and female subjects as well as different conditions of creating sound pressure regarding the length of performance (p> 0.05). In addition, as the sound pressure increased, the length of performance increased, as well. According to the results, no significant difference was found between the performance at 70 and 90 dB. On the other hand, the performance at 110 dB was significantly different from the performance at 70 and 90 dB (p<0.05 and p<0.001). Conclusion: In general, as the sound pressure increases, the performance decreases which results in a considerable increase in the individuals’ rate of error.Keywords: physical factors, two-arm coordination test, Shiraz University of Medical Sciences, noise
Procedia PDF Downloads 3057431 Investigation of the Level of Physical and Mental Health of Patients Undergoing in Chronic or Transient Hemodialysis at Artificial Kidney Unit
Authors: Styliani Kotrotsiou, Evagelia Kotrotsiou, Fani Mokia, Theodosis Paralikas, Konstantinos Tsaras
Abstract:
Objective: The objective of this study was the investigation of the mental health of patients undergoing chronic or transient hemodialysis at Artificial Kidney Unit, as well as its relationship to the demographic characteristic of patients. Material and Method: The study took place in Larisa during the month of December in 2016 and the sample was composed of 60 patients undergoing in chronic or transient hemodialysis at Artificial Kidney Unit of the University General Hospital of Larisa. For the investigation of the physical and mental health of patients who participated in the study, the tool measurement << General Health Questionnaire- 28 >> (GHQ-28) was used. The questionnaires were administered with the interview method during the hemodialysis. This survey is designed for the existence or not of a mental disorder. It examines four factors (physical symptoms, anxiety, social dysfunction and depression). Results: The hemodialysis patients gave the following scores: -to the physical symptoms, women showed a higher average value than men (1,16 ± 1,26 against 0,49 ± 0,93), -at the anxiety scale, it seems that women are superior to men (1,68 ± 1,20 against 0,90 ± 1,22), -at the social dysfunction scale, the elderly patients ( > 65 years old) were presented a with higher average (2,59), and -at the depression scale, patients with a higher average value were those who lived in non-urban areas. The appearance of mental disorder, in relation to patient characteristics, did not show significant statistical correlation. The sex, the age and the place of residence affect more the assessment of mental health, while education did not seem to have any significant effect on the other. Conclusions: The hemodialysis process can significantly affect the patient’s Quality of Life and it can bring adverse changes in lifestyle, affecting the physical, social and psychological state of the individual. For that reason, hemodialysis should be aimed not only at extending life but in upgrading the Quality of Life.Keywords: hemodialysis, chronic kidney disease, depression, social dysfunction, physical condition
Procedia PDF Downloads 1647430 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks
Authors: Habib Gorine, Rabia Saleh
Abstract:
Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation
Procedia PDF Downloads 3207429 Physical and Mechanical Behavior of Compressed Earth Blocks Stabilized with Ca(OH)2 on Sub-Humid Warm Weather
Authors: D. Castillo T., Luis F. Jimenez
Abstract:
The compressed earth blocks (CEBs) constitute an alternative as a constructive element for building homes in regions with high levels of poverty and marginalization. Such is the case of Southeastern Mexico, where the population, predominantly indigene, build their houses with feeble materials like wood and palm, vulnerable to extreme weather in the area, because they do not have the financial resources to acquire concrete blocks. There are several advantages that can provide BTCs compared to traditional vibro-compressed concrete blocks, such as the availability of materials, low manufacturing cost and reduced CO2 emissions to the atmosphere for not be subjected to a burning process. However, to improve its mechanical properties and resistance to adverse weather conditions in terms of humidity and temperature of the sub-humid climate zones, it requires the use of a chemical stabilizer; in this case we chose Ca(OH)2. The stabilization method Eades-Grim was employed, according to ASTM C977-03. This method measures the optimum amount of lime required to stabilize the soil, increasing the pH to 12.4 or higher. The minimum amount of lime required in this experiment was 1% and the maximum was 10%. The employed material was clay unconsolidated low to medium plasticity (CL type according to the Unified Soil Classification System). Based on these results, the CEBs manufacturing process was determined. The obtained blocks were from 10x15x30 cm using a mixture of soil, water and lime in different proportions. Later these blocks were put to dry outdoors and subjected to several physical and mechanical tests, such as compressive strength, absorption and drying shrinkage. The results were compared with the limits established by the Mexican Standard NMX-C-404-ONNCCE-2005 for the construction of housing walls. In this manner an alternative and sustainable material was obtained for the construction of rural households in the region, with better security conditions, comfort and cost.Keywords: calcium hydroxide, chemical stabilization, compressed earth blocks, sub-humid warm weather
Procedia PDF Downloads 4017428 Woody Plant Encroachment Effects on the Physical Properties of Vertic Soils in Bela-Bela, Limpopo Province
Authors: Rebone E. Mashapa, Phesheya E. Dlamini, Sandile S. Mthimkhulu
Abstract:
Woody plant encroachment, a land cover transformation that reduces grassland productivity may influence soil physical properties. The objective of the study was to determine the effect of woody plant encroachment on physical properties of vertic soils in a savanna grassland. In this study, we quantified and compared soil bulk density, aggregate stability and porosity in the top and subsoil of an open and woody encroached savanna grassland. The results revealed that soil bulk density increases, while porosity and mean weight diameter decreases with depth in both open and woody encroached grassland soil. Compared to open grassland, soil bulk density was 11% and 10% greater in the topsoil and subsoil, while porosity was 6% and 9% lower in the topsoil and subsoil of woody encroached grassland. Mean weight diameter, an indicator of soil aggregation increased by 38% only in the subsoil of encroached grasslands due to increasing clay content with depth. These results suggest that woody plant encroachment leads to compaction of vertic soils, which in turn reduces pore size distribution.Keywords: soil depth, soil physical properties, vertic soils, woody plant encroachment
Procedia PDF Downloads 1477427 Landmines and the Postcolonial Security Discourse in Zimbabwe
Authors: Fradreck Jockonia Mujuru
Abstract:
The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.Keywords: landmines, postcolonial, repression, security, violence
Procedia PDF Downloads 767426 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks
Authors: Faisal Al Yahmadi, Muhammad R. Ahmed
Abstract:
Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.Keywords: smart grid network, security, threats, vulnerabilities
Procedia PDF Downloads 1397425 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States
Authors: Mai Kaneda, Sarah Feeney
Abstract:
This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.Keywords: attachment, career decision-making, college students, self-efficacy
Procedia PDF Downloads 2217424 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism
Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe
Abstract:
National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.Keywords: counter-terrorism, discourse, Nigeria, security, terrorism
Procedia PDF Downloads 4867423 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia
Authors: Clara Voyvodic
Abstract:
Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences
Procedia PDF Downloads 1327422 Insight into the Physical Ageing of Poly(Butylene Succinate)
Authors: I. Georgousopoulou, S. Vouyiouka, C. Papaspyrides
Abstract:
The hydrolytic degradation of poly(butylene succinate) (PBS) was investigated when exposed to different humidity-temperature environments. To this direction different PBS grades were submitted to hydrolysis runs. Results indicated that the increment of hydrolysis temperature and relative humidity induced significant decrease in the molecular weight and thermal properties of the bioplastic. Τhe derived data can be considered to construct degradation kinetics based on carboxyl content variation versus time.Keywords: hydrolytic degradation, physical ageing, poly(butylene succinate), polyester
Procedia PDF Downloads 2847421 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Abstract:
Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system
Procedia PDF Downloads 1837420 Study on Chinese High School Students’ Physical Activity Promotion
Abstract:
Health promotion of high school students is essential for the construction of ‘Healthy China’, and increasing high school students’ physical activity is a must for their health promotion. School plays a crucial role in increasing high school students’ physical activity. Therefore, to have a comprehensive command of the school physical activity promotion strategies is of great significance for the health promotion of high school students in China and will shed some light on physical activity promotion worldwide. Literature review and interview survey are the main methods adopted for this research. It has been found that reforms of P.E. classes, improving the overall quality of P.E. teachers, and construction of school fields and facilities are among the major strategies to promote students’ physical activities. Even though it has been stipulated that primary and middle school students should take 3-4 times of P.E. classes per week, the execution is greatly influenced by the exam-oriented educational system. Randomly canceling P.E. classes or taking up the time to study other subjects is common, so it is difficult to guarantee the quantity of P.E. classes. According to national surveys, only 20%-40% of schools have 3-4 times of P.E. classes per week. In order to reduce the hindering effects of the exam-oriented educational system, a physical education test is included in the senior middle school entrance exam. The exam items include 1000m run for boys, 800m run for girls, and the basic skills for basketball/football/volleyball. The scores of the physical education test will greatly influence the admission of senior middle schools. China is now developing the ‘campus football’ policy and has established 20,000 football featured schools by 2017. Especially in these schools, football has become an important part of the students’ P.E. classes and a major means to promote students’ physical activity. As the Winter Olympics will be held in Beijing in 2022, China has promoted the ‘winter sports for all’ movement. The aim is to encourage 300 million people to winter sports, and the high school students are among the most potential participants. The primary and middle schools in Beijing have introduced winter sports to their P.E. curriculum, providing opportunities for the students to experience ice hockey and curling. Some Winter Olympics champions also go to the schools to popularize winter sports among the students. This greatly adds variety to the students’ physical activity regimen at school. In November 2017, seven ministries, including the General Administration of Sport of China and Ministry of Education of the People’s Republic of China, release Youth Sport Promotion Strategy. The strategy stipulates to strengthen the construction of youth sport facilities and implement the cultivation plan for P.E. teachers. It also emphasizes that school sport facilities should be open to students during holidays and vacations for free or at an affordable price. Overall speaking, the Chinese government stresses the importance of youth physical activity promotion and has issued a series of related policies and strategies, but the implementation still needs improvement.Keywords: China, physical activity, promotion, school
Procedia PDF Downloads 99