Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4288

Search results for: security safe

2998 The Securitization of the European Migrant Crisis (2015-2016): Applying the Insights of the Copenhagen School of Security Studies to a Comparative Analysis of Refugee Policies in Bulgaria and Hungary

Authors: Tatiana Rizova

Abstract:

The migrant crisis, which peaked in 2015-2016, posed an unprecedented challenge to the European Union’s (EU) newest member states, including Bulgaria and Hungary. Their governments had to formulate sound migration policies with expediency and sensitivity to the needs of millions of people fleeing violent conflicts in the Middle East and failed states in North Africa. Political leaders in post-communist countries had to carefully coordinate with other EU member states on joint policies and solutions while minimizing the risk of alienating their increasingly anti-migrant domestic constituents. Post-communist member states’ governments chose distinct policy responses to the crisis, which were dictated by factors such as their governments’ partisan stances on migration, their views of the European Union, and the decision to frame the crisis as a security or a humanitarian issue. This paper explores how two Bulgarian governments (Boyko Borisov’s second and third government formed during the 43rd and 44th Bulgarian National Assembly, respectively) navigated the processes of EU migration policy making and managing the expectations of their electorates. Based on a comparative analysis of refugee policies in Bulgaria and Hungary during the height of the crisis (2015-2016) and a temporal analysis of refugee policies in Bulgaria (2015-2018), the paper advances the following conclusions. Drawing on insights of the Copenhagen school of security studies, the paper argues that cultural concerns dominated domestic debates in both Bulgaria and Hungary; both governments framed the issue predominantly as a matter of security rather than humanitarian disaster. Regardless of the similarities in issue framing, however, the two governments sought different paths of tackling the crisis. While the Bulgarian government demonstrated its willingness to comply with EU decisions (such as the proposal for mandatory quotas for refugee relocation), the Hungarian government defied EU directives and became a leading voice of dissent inside the EU. The current Bulgarian government (April 2017 - present) appears to be committed to complying with EU decisions and accepts the strategy of EU burden-sharing, while the Hungarian government has continually snubbed the EU’s appeals for cooperation despite the risk of hefty financial penalties. Hungary’s refugee policies have been influenced by the parliamentary representation of the far right-wing party Movement for a Better Hungary (Jobbik), which has encouraged the majority party (FIDESZ) to adopt harsher anti-migrant rhetoric and more hostile policies toward refugees. Bulgaria’s current government is a coalition of the center-right Citizens for a European Development of Bulgaria (GERB) and its far right-wing junior partners – the United Patriots (comprised of three nationalist political parties). The parliamentary presence of Jobbik in Hungary’s parliament has magnified the anti-migrant stance, rhetoric, and policies of Mr. Orbán’s Civic Alliance; we have yet to observe a substantial increase in the anti-migrant rhetoric and policies in Bulgaria’s case. Analyzing responses to the migrant/refugee crisis is a critical opportunity to understand how issues of cultural identity and belonging, inclusion and exclusion, regional integration and disintegration are debated and molded into policy in Europe’s youngest member states in the broader EU context.

Keywords: Copenhagen School, migrant crisis, refugees, security

Procedia PDF Downloads 112
2997 Impact of Tourists on HIV (Human Immunodeficiency Virus) Incidence

Authors: Ofosuhene O. Apenteng, Noor Azina Ismail

Abstract:

Recently tourism is a major foreign exchange earner in the World. In this paper, we propose the mathematical model to study the impact of tourists on the spread of HIV incidences using compartmental differential equation models. Simulation studies of reproduction number are used to demonstrate new insights on the spread of HIV disease. The periodogram analysis of a time series was used to determine the speed at which the disease is spread. The results indicate that with the persistent flow of tourism into a country, the disease status has increased the epidemic rate. The result suggests that the government must put more control on illegal prostitution, unprotected sexual activity as well as to emphasis on prevention policies that include the safe sexual activity through the campaign by the tourism board.

Keywords: HIV/AIDS, mathematical transmission modeling, tourists, stability, simulation

Procedia PDF Downloads 379
2996 An Examination of the Impact of Sand Dunes on Soils, Vegetation and Water Resources as the Major Means of Livelihood in Gada Local Government Area of Sokoto State, Nigeria

Authors: Abubakar Aminu

Abstract:

Sand dunes, as a major product of desertification, is well known to affect soil resources, water resources and vegetation, especially in arid and semi-arid region; this scenario disrupt the livelihood security of people in the affected areas. The research assessed the episode of sand dune accumulation on water resources, soil and vegetation in Gada local government of Sokoto State, Nigeria. In this paper, both qualitative and quantitative methods were used to generate data which was analyzed and discussed. The finding of the paper shows that livelihood was affected by accumulations of sand dunes as water resources and soils were affected negatively thereby reducing crop yields and making livestock domestication a very difficult and expensive task; the finding also shows that 60% of the respondents agreed to planting of trees as the major solution to combat sand dunes accumulation. However, the soil parameters tested indicated low Organic carbon, low Nitrogen, low Potassium, Calcium and Phosphorus but higher values were recorded in Sodium and Cation exchange capacity which served as evidence of the high or strong aridity nature of the soil in the area. In line with the above, the researcher recommended a massive tree planting campaign to curtail desertification as well as using organic manures for higher agricultural yield and as such, improvement in livelihood security.

Keywords: soils, vegetatio, water, desertification

Procedia PDF Downloads 51
2995 Layersomes for Oral Delivery of Amphotericin B

Authors: A. C. Rana, Abhinav Singh Rana

Abstract:

Layer by layer coating of biocompatible polyelectrolytes converts the liposomes into stable version i.e 'layersomes'. This system was further used to deliver the Amphotericin B through the oral route. Extensive optimization of different process variables resulted in the formation of layersomes with the particle size of 238.4±5.1, PDI of 0.24±0.16, the zeta potential of 34.6±1.3, and entrapment efficiency of 71.3±1.2. TEM analysis further confirmed the formation of spherical particles. Trehalose (10% w/w) resulted in the formation of fluffy and easy to redisperse cake in freeze dried layersomes. Controlled release up to 50 % within 24 h was observed in the case of layersomes. The layersomes were found stable in simulated biological fluids and resulted in the 3.59 fold higher bioavailability in comparison to free Amp-B. Furthermore, the developed formulation was found to be safe in comparison to Fungizone as indicated by blood urea nitrogen (BUN) and creatinine level.

Keywords: amphotericin B, layersomes, liposomes, toxicity

Procedia PDF Downloads 516
2994 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chaiwchan

Abstract:

This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).

Keywords: social network, behaviors, social media, computer information systems

Procedia PDF Downloads 382
2993 Plantar Neuro-Receptor Activation in Total Knee Arthroplasty Patients: Impact on Clinical Function, Pain, and Stiffness - A Randomized Controlled Trial

Authors: Woolfrey K., Woolfrey M., Bolton C. L., Warchuk D.

Abstract:

Objectives: Osteoarthritis is the most common joint disease of adults worldwide. Despite total knee arthroplasty (TKA) demonstrating high levels of success, 20% of patients report dissatisfaction with their result. VOXX Wellness Stasis Socks are embedded with a proprietary pattern of neuro-receptor activation points that have been proven to activate a precise neuro-response, according to the pattern theory of haptic perception, which stimulates improvements in pain and function. The use of this technology in TKA patients may prove beneficial as an adjunct to recovery as many patients suffer from deficits to their proprioceptive system caused by ligamentous damage and alterations to mechanoreceptors during the procedure. We hypothesized that VOXX Wellness Stasis Socks are a safe, cost-effective, and easily scalable strategy to support TKA patients through their recovery. Design: Double-blinded, placebo-controlled randomized trial. Participants: Patients scheduled to receive TKA were considered eligible for inclusion in the trial. Interventions: Intervention group (I): VOXX Wellness Stasis socks containing receptor point-activation technology. Control group (C): VOXX Wellness Stasis socks without receptor point-activation technology. Sock use during the waking hours x 6 weeks. Main Outcome Measures: Western Ontario McMaster Universities Osteoarthritis Index (WOMAC) questionnaire completed at baseline, 2 weeks, and 6 weeks to assess pain, stiffness, and physical function. Results: Data analysis using SPSS software. P-values, effect sizes, and confidence intervals are reported to assess clinical relevance of the finding. Physical status classifications were compared using t-test. Within-subject and between-subject differences in the mean WOMAC were analyzed by ANOVA. Effect size was analyzed using Cramer’s V. Consistent improvement in WOMAC scores for pain and stiffness at 2 weeks post op in the I over the C group. The womac scores assessing physical function showed a consistent improvement at both 2 and 6 weeks post op in the I group compared to C group. Conclusions: VOXX proved to be a low cost, safe intervention in TKA to help patients improve with regard to pain, stiffness, and physical function. Disclosures: None

Keywords: osteoarthritis, RCT, pain management, total knee arthroplasty

Procedia PDF Downloads 518
2992 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 391
2991 Effect of Lime Stabilization on E. coli Destruction and Heavy Metal Bioavailability in Sewage Sludge for Agricultural Utilization

Authors: G. Petruzzelli, F. Pedron, M. Grifoni, A. Pera, I. Rosellini, B. Pezzarossa

Abstract:

The addition of lime as Ca(OH)2 to sewage sludge to destroy pathogens (Escherichia coli), was evaluated also in relation to heavy metal bioavailability. The obtained results show that the use of calcium hydroxide at the dose of 3% effectively destroyed pathogens ensuring the stability at high pH values over long period and the duration of the sewage sludge stabilization. In general, lime addition decreased the total extractability of heavy metals indicating a reduced bioavailability of these elements. This is particularly important for a safe utilization in agricultural soils to reduce the possible transfer of heavy metals to the food chain.

Keywords: biological sludge, Ca(OH)2, copper, pathogens, sanitation, zinc

Procedia PDF Downloads 414
2990 Integrated Microsystem for Multiplexed Genosensor Detection of Biowarfare Agents

Authors: Samuel B. Dulay, Sandra Julich, Herbert Tomaso, Ciara K. O'Sullivan

Abstract:

An early, rapid and definite detection for the presence of biowarfare agents, pathogens, viruses and toxins is required in different situations which include civil rescue and security units, homeland security, military operations, public transportation securities such as airports, metro and railway stations due to its harmful effect on the human population. In this work, an electrochemical genosensor array that allows simultaneous detection of different biowarfare agents within an integrated microsystem that provides an easy handling of the technology which combines a microfluidics setup with a multiplexing genosensor array has been developed and optimised for the following targets: Bacillus anthracis, Brucella abortis and melitensis, Bacteriophage lambda, Francisella tularensis, Burkholderia mallei and pseudomallei, Coxiella burnetii, Yersinia pestis, and Bacillus thuringiensis. The electrode array was modified via co-immobilisation of a 1:100 (mol/mol) mixture of a thiolated probe and an oligoethyleneglycol-terminated monopodal thiol. PCR products from these relevant biowarfare agents were detected reproducibly through a sandwich assay format with the target hybridised between a surface immobilised probe into the electrode and a horseradish peroxidase-labelled secondary reporter probe, which provided an enzyme based electrochemical signal. The potential of the designed microsystem for multiplexed genosensor detection and cross-reactivity studies over potential interfering DNA sequences has demonstrated high selectivity using the developed platform producing high-throughput.

Keywords: biowarfare agents, genosensors, multipled detection, microsystem

Procedia PDF Downloads 261
2989 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 21
2988 Analysing the Stability of Electrical Grid for Increased Renewable Energy Penetration by Focussing on LI-Ion Battery Storage Technology

Authors: Hemendra Singh Rathod

Abstract:

Frequency is, among other factors, one of the governing parameters for maintaining electrical grid stability. The quality of an electrical transmission and supply system is mainly described by the stability of the grid frequency. Over the past few decades, energy generation by intermittent sustainable sources like wind and solar has seen a significant increase globally. Consequently, controlling the associated deviations in grid frequency within safe limits has been gaining momentum so that the balance between demand and supply can be maintained. Lithium-ion battery energy storage system (Li-Ion BESS) has been a promising technology to tackle the challenges associated with grid instability. BESS is, therefore, an effective response to the ongoing debate whether it is feasible to have an electrical grid constantly functioning on a hundred percent renewable power in the near future. In recent years, large-scale manufacturing and capital investment into battery production processes have made the Li-ion battery systems cost-effective and increasingly efficient. The Li-ion systems require very low maintenance and are also independent of geographical constraints while being easily scalable. The paper highlights the use of stationary and moving BESS for balancing electrical energy, thereby maintaining grid frequency at a rapid rate. Moving BESS technology, as implemented in the selected railway network in Germany, is here considered as an exemplary concept for demonstrating the same functionality in the electrical grid system. Further, using certain applications of Li-ion batteries, such as self-consumption of wind and solar parks or their ancillary services, wind and solar energy storage during low demand, black start, island operation, residential home storage, etc. offers a solution to effectively integrate the renewables and support Europe’s future smart grid. EMT software tool DIgSILENT PowerFactory has been utilised to model an electrical transmission system with 100% renewable energy penetration. The stability of such a transmission system has been evaluated together with BESS within a defined frequency band. The transmission system operators (TSO) have the superordinate responsibility for system stability and must also coordinate with the other European transmission system operators. Frequency control is implemented by TSO by maintaining a balance between electricity generation and consumption. Li-ion battery systems are here seen as flexible, controllable loads and flexible, controllable generation for balancing energy pools. Thus using Li-ion battery storage solution, frequency-dependent load shedding, i.e., automatic gradual disconnection of loads from the grid, and frequency-dependent electricity generation, i.e., automatic gradual connection of BESS to the grid, is used as a perfect security measure to maintain grid stability in any case scenario. The paper emphasizes the use of stationary and moving Li-ion battery storage for meeting the demands of maintaining grid frequency and stability for near future operations.

Keywords: frequency control, grid stability, li-ion battery storage, smart grid

Procedia PDF Downloads 138
2987 Biostimulation Effect of Ozone Therapy and Superficial Peeling on Facial Rejuvenation: A Case Report and Literature Review

Authors: Ferreira R., Rocha K.

Abstract:

Ozone therapy is indicated for improving skin aesthetics, adjusting oxidative tissue levels, increasing collagen production, and even skin volumizing. This paper aims to carry out a case report that demonstrates the positive results of ozone therapy in association with superficial peeling. The application in association showed positive results for bio-stimulating activities in the reported case demonstrating to be a viable clinical technique. The bio-stimulating effect of ozone therapy in association with peeling is a promising aesthetic therapeutic modality with fast and safe results as an aesthetic therapeutic option.

Keywords: bio-stimulating effect, ozone therapy, neocollagenesis, peeling

Procedia PDF Downloads 90
2986 The Risk of Bleeding in Knee or Shoulder Injections in Patients on Warfarin Treatment

Authors: Muhammad Yasir Tarar

Abstract:

Background: Intraarticular steroid injections are an effective option in alleviating the symptoms of conditions like osteoarthritis, rheumatoid arthritis, crystal arthropathy, and rotator cuff tendinopathy. Most of these injections are conducted in the elderly who are on polypharmacy, including anticoagulants at times. Up to 6% of patients aged 80-84 years have been reported to be taking Warfarin. The literature availability on safety quotient for patients undergoing intraarticular injections on Warfarin is scarce. It has remained debatable over the years which approach is safe for these patients. Continuing warfarin has a theoretical bleeding risk, and stopping it can lead to even severe life-threatening thromboembolic events in high-risk patients. Objectives: To evaluate the risk of bleeding complications in patients on warfarin undergoing intraarticular injections or arthrocentesis. Study Design & Methods: A literature search of MEDLINE (1946 to present), EMBASE (1974 to present), and Cochrane CENTRAL (1988 to present) databases were conducted using any combination of the keywords, Injection, Knee, Shoulder, Joint, Intraarticular, arthrocentesis, Warfarin, and Anticoagulation in November 2020 for articles published in any language with no publication year limit. The study inclusion criteria included reporting on the rate of bleeding complications following injection of the knee or shoulder in patients on warfarin treatment. Randomized control trials and prospective and retrospective study designs were included. An electronic standardized Performa for data extraction was made. The Preferred Reporting Items for Systematic Review and Meta-Analyses (PRISMA) the methodology was used. The articles were appraised using the methodological index for nonrandomized studies. The Cochrane Risk of Bias Tool used to assess the risk of bias in included RCTs and the MINORS tool for assessment of bias in observational studies. Results: The search of databases resulted in a total of 852 articles. Relevant articles as per the inclusion criteria were shortlisted, 7 articles deemed suitable to be include. A total of 1033 joints sample size was undertaken with specified knee and shoulder joints of a total of 820. Only 6 joints had bleeding complications, 5 early bleeding at the time of injection or aspiration, and one late bleeding complication with INR of 5, additionally, 2 patients complained of bruising, 3 of pain, and 1 managed for infection. Conclusions: The results of the metanalysis show that it is relatively safe to perform intraarticular injections in patients on Warfarin regardless of the INR range.

Keywords: arthrocentesis, warfarin, bleeding, injection

Procedia PDF Downloads 66
2985 Farmers Willingness to Pay for Irrigated Maize Production in Rural Kenya

Authors: Dennis Otieno, Lilian Kirimi Nicholas Odhiambo, Hillary Bii

Abstract:

Kenya is considered to be a middle level income country and usuaaly does not meet household food security needs especially in North and South eastern parts. Approximately half of the population is living under the poverty line (www, CIA 1, 2012). Agriculture is the largest sector in the country, employing 80% of the population. These are thereby directly dependent on the sufficiency of outputs received. This makes efficient, easy-accessible and cheap agricultural practices an important matter in order to improve food security. Maize is the prime staple food commodity in Kenya and represents a substantial share of people’s nutritional intake. This study is the result of questionnaire based interviews, Key informant and focus group discussion involving 220 small scale maize farmers Kenyan. The study was located to two separated areas; Lower Kuja, Bunyala, Nandi, Lower Nzoia, Perkerra, Mwea Bura, Hola and Galana Kulalu in Kenya. The questionnaire captured the farmers’ use and perceived importance of the use irrigation services and irrigated maize production. Viability was evaluated using the four indices which were all positive with NPV giving positive cash flows in less than 21 years at most for one season output. The mean willingness to pay was found to be KES 3082 and willingness to pay increased with increase in irrigation premiums. The economic value of water was found to be greater than the willingness to pay implying that irrigated maize production is sustainable. Farmers stated that viability was influenced by high output levels, good produce quality, crop of choice, availability of sufficient water and enforcement the last two factors had a positive influence while the other had negative effect on the viability of irrigated maize. A regression was made over the correlation between the willingness to pay for irrigated maize production using scheme and plot level factors. Farmers that already use other inputs such as animal manure, hired labor and chemical fertilizer should also have a demand for improved seeds according to Liebig's law of minimum and expansion path theory. The regression showed that premiums, and high yields have a positive effect on willingness to pay while produce quality, efficient fertilizer use, and crop season have a negative effect.

Keywords: maize, food security, profits, sustainability, willingness to pay

Procedia PDF Downloads 207
2984 Strategies for E-Waste Management: A Literature Review

Authors: Linh Thi Truc Doan, Yousef Amer, Sang-Heon Lee, Phan Nguyen Ky Phuc

Abstract:

During the last few decades, with the high-speed upgrade of electronic products, electronic waste (e-waste) has become one of the fastest growing wastes of the waste stream. In this context, more efforts and concerns have already been placed on the treatment and management of this waste. To mitigate their negative influences on the environment and society, it is necessary to establish appropriate strategies for e-waste management. Hence, this paper aims to review and analysis some useful strategies which have been applied in several countries to handle e-waste. Future perspectives on e-waste management are also suggested. The key findings found that, to manage e-waste successfully, it is necessary to establish effective reverse supply chains for e-waste, and raise public awareness towards the detrimental impacts of e-waste. The result of the research provides valuable insights to governments, policymakers in establishing e-waste management in a safe and sustainable manner.

Keywords: e-waste, e-waste management, life cycle assessment, recycling regulations

Procedia PDF Downloads 260
2983 English Reading Preferences among Primary Pupils

Authors: Jezza Mae T. Francisco, Marianet R. Delos Santos, Crisjame C. Toribio

Abstract:

This study aims to determine the reading preference for English enrichment and reading comprehension among primary students and the difference in the reading preference and comprehension for English enrichment among primary students. This study employed a Descriptive-Quantitative Correlational Research Design. This study yielded the following findings: (1) It reveals that primary students got fair on their reading comprehension, and (2) It shows that there is no significant relationship between the reading preference for English enrichment and reading comprehension of the students. It is safe to conclude that the students’ reading preference is growing evidently in various milieus. This can inform the English department curriculum planners to consider their students’ text preferences that interest them to maximize engagement within a dynamic interactive learning process.

Keywords: reading preferences, reading comprehension, primary student, English enrichment

Procedia PDF Downloads 99
2982 Personality Characteristics Managerial Skills and Career Preference

Authors: Dinesh Kumar Srivastava

Abstract:

After liberalization of the economy, technical education has seen rapid growth in India. A large number of institutions are offering various engineering and management programmes. Every year, a number of students complete B. Tech/M. Tech and MBA programmes of different institutes, universities in India and search for jobs in the industry. A large number of companies visit educational institutes for campus placements. These companies are interested in hiring competent managers. Most students show preference for jobs from reputed companies and jobs having high compensation. In this context, this study was conducted to understand career preference of postgraduate students and junior executives. Personality characteristics influence work life as well as personal life. In the last two decades, five factor model of personality has been found to be a valid predictor of job performance and job satisfaction. This approach has received support from studies conducted in different countries. It includes neuroticism, extraversion, and openness to experience, agreeableness, and conscientiousness. Similarly three social needs, namely, achievement, affiliation and power influence motivation and performance in certain job functions. Both approaches have been considered in the study. The objective of the study was first, to analyse the relationship between personality characteristics and career preference of students and executives. Secondly, the study analysed the relationship between personality characteristics and skills of students. Three managerial skills namely, conceptual, human and technical have been considered in the study. The sample size of the study was 266 including postgraduate students and junior executives. Respondents have completed BE/B. Tech/MBA programme. Three dimensions of career preference namely, identity, variety and security and three managerial skills were considered as dependent variables. The results indicated that neuroticism was not related to any dimension of career preference. Extraversion was not related to identity, variety and security. It was positively related to three skills. Openness to experience was positively related to skills. Conscientiousness was positively related to variety. It was positively related to three skills. Similarly, the relationship between social needs and career preference was examined using correlation. The results indicated that need for achievement was positively related to variety, identity and security. Need for achievement was positively related to managerial skills Need for affiliation was positively related to three dimensions of career preference as well as managerial skills Need for power was positively related to three dimensions of career preference and managerial skills Social needs appear to be stronger predictor of career preference and managerial skills than big five traits. Findings have implications for selection process in industry.

Keywords: big five traits, career preference, personality, social needs

Procedia PDF Downloads 264
2981 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 141
2980 Contribution of Home Gardens to Rural Household Income in Raymond Mhlaba Local Municipality, Eastern Cape Province, South Africa

Authors: K. Alaka, A. Obi

Abstract:

Home garden has proved to be significant to rural inhabitants by providing a wide range of useful products such as fruits, vegetables and medicine. There is need for quantitative information on its benefits and contributions to rural household. The main objective of this study is to investigate contributions of home garden to income of rural households in Raymond Mhlaba Local Municipality, formerly Nkonkobe Local Municipality of Eastern Cape Province South Africa. The stratified random sampling method was applied in order to choose a sample of 160 households.The study was conducted among 80 households engaging in home gardens and 80 non- participating households in the study area. Data analysis employed descriptive statistics with the use of frequency table and one way sample T test to show actual contributions. The overall model shows that social grant has the highest contribution to total household income for both categories while income generated from home garden has the second largest share to total household income, this shows that the majority of rural households in the study area rely on social grant as their source of income. However, since most households are net food buyers, it is essential to have policies that are formulated with an understanding that household food security is not only a function of the food that farming households produce for their own consumption but more so a function of total household income. The results produced sufficient evidence that home gardens contribute significantly to income of rural household.

Keywords: food security, home gardening, household, income

Procedia PDF Downloads 211
2979 Border Trade Policy to Promote Thailand - Myanmar Mae Sai, Chiang Rai Province

Authors: Sakapas Saengchai, Pichamon Chansuchai

Abstract:

Research Thai- Myanmar Border Trade Promotion Policy, Mae Sai District, Chiang Rai Province The objectives of this study were to study the policy of promoting Thai- Myanmar border trade in Mae Sai district, Chiang Rai province. And suitable models for the development of border trade in Mae Sai. Chiang Rai province This research uses qualitative methodology. The method of collecting data from research papers. Participatory Observation In-depth interviews in which the information is important, the governor of Chiang Rai. Chiang Rai Customs Service Executive Office of Mae Sai Immigration Bureau Maesai Chamber of Commerce and Private Entrepreneurs By specific sampling Data analysis uses content analysis. The study indicated that Border Trade Promotion Policy The direction taken by the government to focus on developing 1. Security is further reducing crime. Smuggling and human trafficking Including the preparation to protect people from terrorism and natural disasters. And cooperation with Burma on border security. 2. The development of wealth is the promotion of investment. The transport links, logistics value chain. Products and services across the Thai-Myanmar border. Improve the regulations and laws to promote fair trade. Convenient and fast 3. Sustainable development is the ability to generate income, quality of life of people in the Thai border to increase continuously. By using balanced natural resources, production and consumption are environmentally friendly. Which featured the participation of all sectors of the public and private sectors in the region to drive the development of the border with Thailand. Chiang Rai province To be more competitive .

Keywords: Border, Trade, Policy, Promote

Procedia PDF Downloads 152
2978 Saudi State Arabia’s Struggle for a Post-Rentier Regional Order

Authors: Omair Anas

Abstract:

The Persian Gulf has been in turmoil for a long time since the colonial administration has handed over the role to the small and weak kings and emirs who were assured of protection in return of many economic and security promises to them. The regional order, Saudi Arabia evolved was a rentier regional order secured by an expansion of rentier economy and taking responsibility for much of the expenses of the regional order on behalf of relatively poor countries. The two oil booms helped the Saudi state to expand the 'rentier order' driven stability and bring the countries like Egypt, Jordan, Syria, and Palestine under its tutelage. The disruptive misadventure, however, came with Iran's proclamation of the Islamic Revolution in 1979 which it wanted to be exported to its 'un-Islamic and American puppet' Arab neighbours. For Saudi Arabia, even the challenge presented by the socialist-nationalist Arab dictators like Gamal Abdul Nasser and Hafez Al-Assad was not that much threatening to the Saudi Arabia’s then-defensive realism. In the Arab uprisings, the Gulf monarchies saw a wave of insecurity and Iran found it an opportune time to complete the revolutionary process it could not complete after 1979. An alliance of convenience and ideology between Iran and Islamist groups had the real potential to challenge both Saudi Arabia’s own security and its leadership in the region. The disruptive threat appeared at a time when the Saudi state had already sensed an impending crisis originating from the shifts in the energy markets. Low energy prices, declining global demands, and huge investments in alternative energy resources required Saudi Arabia to rationalize its economy according to changing the global political economy. The domestic Saudi reforms remained gradual until the death of King Abdullah in 2015. What is happening now in the region, the Qatar crisis, the Lebanon crisis and the Saudi-Iranian proxy war in Iraq, Syria, and Yemen has combined three immediate objectives, rationalising Saudi economy and most importantly, the resetting the Saudi royal power for Saudi Arabia’s longest-serving future King Mohammad bin Salman. The Saudi King perhaps has no time to wait and watch the power vacuum appearing because of Iran’s expansionist foreign policy. The Saudis appear to be employing an offensive realism by advancing a pro-active regional policy to counter Iran’s threatening influence amid disappearing Western security from the region. As the Syrian civil war is coming to a compromised end with ceding much ground to Iran-controlled militias, Hezbollah and Al-Hashad, the Saudi state has lost much ground in these years and the threat from Iranian proxies is more than a reality, more clearly in Bahrain, Iraq, Syria, and Yemen. This paper attempts to analyse the changing Saudi behaviour in the region, which, the author understands, is shaped by an offensive-realist approach towards finding a favourable security environment for the Saudi-led regional order, a post-rentier order perhaps.

Keywords: terrorism, Saudi Arabia, Rentier State, gulf crisis

Procedia PDF Downloads 120
2977 Geographical Information System and Multi-Criteria Based Approach to Locate Suitable Sites for Industries to Minimize Agriculture Land Use Changes in Bangladesh

Authors: Nazia Muhsin, Tofael Ahamed, Ryozo Noguchi, Tomohiro Takigawa

Abstract:

One of the most challenging issues to achieve sustainable development on food security is land use changes. The crisis of lands for agricultural production mainly arises from the unplanned transformation of agricultural lands to infrastructure development i.e. urbanization and industrialization. Land use without sustainability assessment could have impact on the food security and environmental protections. Bangladesh, as the densely populated country with limited arable lands is now facing challenges to meet sustainable food security. Agricultural lands are using for economic growth by establishing industries. The industries are spreading from urban areas to the suburban areas and using the agricultural lands. To minimize the agricultural land losses for unplanned industrialization, compact economic zones should be find out in a scientific approach. Therefore, the purpose of the study was to find out suitable sites for industrial growth by land suitability analysis (LSA) by using Geographical Information System (GIS) and multi-criteria analysis (MCA). The goal of the study was to emphases both agricultural lands and industries for sustainable development in land use. The study also attempted to analysis the agricultural land use changes in a suburban area by statistical data of agricultural lands and primary data of the existing industries of the study place. The criteria were selected as proximity to major roads, and proximity to local roads, distant to rivers, waterbodies, settlements, flood-flow zones, agricultural lands for the LSA. The spatial dataset for the criteria were collected from the respective departments of Bangladesh. In addition, the elevation spatial dataset were used from the SRTM (Shuttle Radar Topography Mission) data source. The criteria were further analyzed with factors and constraints in ArcGIS®. Expert’s opinion were applied for weighting the criteria according to the analytical hierarchy process (AHP), a multi-criteria technique. The decision rule was set by using ‘weighted overlay’ tool to aggregate the factors and constraints with the weights of the criteria. The LSA found only 5% of land was most suitable for industrial sites and few compact lands for industrial zones. The developed LSA are expected to help policy makers of land use and urban developers to ensure the sustainability of land uses and agricultural production.

Keywords: AHP (analytical hierarchy process), GIS (geographic information system), LSA (land suitability analysis), MCA (multi-criteria analysis)

Procedia PDF Downloads 252
2976 Preparation of Wireless Networks and Security; Challenges in Efficient Accession of Encrypted Data in Healthcare

Authors: M. Zayoud, S. Oueida, S. Ionescu, P. AbiChar

Abstract:

Background: Wireless sensor network is encompassed of diversified tools of information technology, which is widely applied in a range of domains, including military surveillance, weather forecasting, and earthquake forecasting. Strengthened grounds are always developed for wireless sensor networks, which usually emerges security issues during professional application. Thus, essential technological tools are necessary to be assessed for secure aggregation of data. Moreover, such practices have to be incorporated in the healthcare practices that shall be serving in the best of the mutual interest Objective: Aggregation of encrypted data has been assessed through homomorphic stream cipher to assure its effectiveness along with providing the optimum solutions to the field of healthcare. Methods: An experimental design has been incorporated, which utilized newly developed cipher along with CPU-constrained devices. Modular additions have also been employed to evaluate the nature of aggregated data. The processes of homomorphic stream cipher have been highlighted through different sensors and modular additions. Results: Homomorphic stream cipher has been recognized as simple and secure process, which has allowed efficient aggregation of encrypted data. In addition, the application has led its way to the improvisation of the healthcare practices. Statistical values can be easily computed through the aggregation on the basis of selected cipher. Sensed data in accordance with variance, mean, and standard deviation has also been computed through the selected tool. Conclusion: It can be concluded that homomorphic stream cipher can be an ideal tool for appropriate aggregation of data. Alongside, it shall also provide the best solutions to the healthcare sector.

Keywords: aggregation, cipher, homomorphic stream, encryption

Procedia PDF Downloads 244
2975 Pedestrian Safe Bumper Design from Commingled Glass Fiber/Polypropylene Reinforced Sandwich Composites

Authors: L. Onal

Abstract:

The aim of this study is to optimize manufacturing process for thermoplastic sandwich composite structures for the pedestrian safety of automobiles subjected to collision condition. In particular, cost-effective manufacturing techniques for sandwich structures with commingled GF/PP skins and low-density foam cores are being investigated. The performance of these structures under bending load is being studied. Samples are manufactured using compression moulding technique. The relationship of this performance to processing parameters such as mould temperature, moulding time, moulding pressure and sequence of the layers during moulding is being investigated. The results of bending tests are discussed in the light of the moulding conditions and conclusions are given regarding optimum set of processing conditions using the compression moulding route

Keywords: twintex, flexural properties, automobile composites, sandwich structures

Procedia PDF Downloads 417
2974 Enhancing VR Exposure Therapy for the Treatment of Phobias with the Use of Photorealistic VR Environments and Stimuli, and the Use of Tactile Feedback Suits and Responsive Systems

Authors: Vardan Melkonyan, Arman Azizyan, Astghik Boyajyan

Abstract:

Virtual reality (VR) exposure therapy is a form of cognitive-behavioral therapy that uses immersive virtual environments to expose individuals to the feared stimuli or situations that trigger their phobia. VR exposure therapy has become an increasingly popular treatment for phobias, including fear of heights, public speaking, and flying, due to its ability to provide a controlled and safe environment for individuals to confront their fears while also allowing therapists to tailor the virtual exposure to the specific needs and goals of each individual. It is also a cost-effective and accessible treatment option, as it can be delivered remotely and does not require the use of drugs. Overall, VR exposure therapy has the potential to be a valuable tool for therapists in the treatment of phobias. But current methods may be improved by incorporating advanced technology such as photorealistic VR environments, tactile feedback suits, and responsive systems. The aim of this study was to identify the most effective approach for enhancing VR exposure therapy for the treatment of phobias. Photorealistic VR environments and stimuli can greatly enhance the effectiveness of VR exposure therapy for the treatment of phobias. By creating immersive, realistic virtual environments that closely mimic the real-life situations that trigger phobia responses, patients are able to more fully engage in the therapeutic process and confront their fears in a controlled and safe manner. This can help to reduce the severity of phobia symptoms and increase treatment outcomes. The use of tactile feedback suits and responsive systems can further enhance the VR exposure therapy experience by adding a physical element to the virtual environment. These suits, which can mimic the sensations of touch, pressure, and movement, allow patients to fully immerse themselves in the virtual world and feel as if they are physically present in the situation. This can help to increase the realism of the virtual environment and make it more effective in reducing phobia symptoms. Additionally, responsive systems can be used to trigger specific events or responses within the virtual environment based on the patient's actions, providing a more interactive and personalized treatment experience. A comprehensive literature review was conducted, including studies on VR exposure therapy for phobias and the use of advanced technology to enhance the therapy. Results indicate that incorporating these enhancements may significantly increase the effectiveness of VR exposure therapy for phobias. Further research is needed to fully understand the potential of these enhancements and to determine the optimal combination and implementation.

Keywords: virtual reality, mental health, phobias, fears, treatment, photorealistic, immersive, phobia

Procedia PDF Downloads 76
2973 Evolving Maritime Geopolitics of the Indo-Pacific

Authors: Pragya Pandey

Abstract:

A major discussion in the 21st -century international affairs has been around the shifting economic and political center of gravity to Asia. In the maritime realm, it translates into a shift in focus from the Atlantic to the Pacific-Indian Ocean region or what is now popularly called the Indo-Pacific region. The Indo-Pacific is rapidly eclipsing once dominant Asia-Pacific as center of trade, investment, competition and cooperation. The growing inter-connectivity between the Indian Ocean and the Pacific Ocean is bringing forth the ‘confluence of the two seas’. Therefore, the Indo-Pacific strategic arc is acquiring greater salience in consonance with the changing realities of the time. The region is undergoing unprecedented transformation in its security outlook. At present, the region is at an interesting historic epoch- witnessing the simultaneous rise India and China, their economic growth, naval modernization and power projection capabilities, alongside the continued presence of the United States, particularly with its rebalancing strategy. Besides the interplay among the three major stakeholders, other regional players like Japan, Australia, and Indonesia, would play a crucial role in the geopolitical re-arrangement of the Indo-Pacific region. The region will be the future theater of activities to determine the shifts and distribution of sea power, by the virtue of its strategic location, intrinsic value of the energy resources and significant maritime trade routes of the region. Therefore, the central theme of the paper would be to scrutinize the maritime security environment of the region against the backdrop of the tricky geopolitical landscape, contributing to the change in the regional and global balance of power.

Keywords: China, geopolitics, India, United States

Procedia PDF Downloads 247
2972 Database Management System for Orphanages to Help Track of Orphans

Authors: Srivatsav Sanjay Sridhar, Asvitha Raja, Prathit Kalra, Soni Gupta

Abstract:

Database management is a system that keeps track of details about a person in an organisation. Not a lot of orphanages these days are shifting to a computer and program-based system, but unfortunately, most have only pen and paper-based records, which not only consumes space but it is also not eco-friendly. It comes as a hassle when one has to view a record of a person as they have to search through multiple records, and it will consume time. This program will organise all the data and can pull out any information about anyone whose data is entered. This is also a safe way of storage as physical data gets degraded over time or, worse, destroyed due to natural disasters. In this developing world, it is only smart enough to shift all data to an electronic-based storage system. The program comes with all features, including creating, inserting, searching, and deleting the data, as well as printing them.

Keywords: database, orphans, programming, C⁺⁺

Procedia PDF Downloads 131
2971 The Effect of the Environmental Activities of Organizations on Financial Performance

Authors: Fatemeh Khalili Varnamkhasti

Abstract:

Natural administration has outside impacts such that companies regularly respect natural input as a fetched with no clear advantage. In this manner, in case natural security can bring financial benefits, showing that natural security and financial interface are in concordance, companies will effectively fulfill their obligation to ensure the environment. Contamination is, for the most part, related to the squandering of assets, misplaced vitality, and crude materials not completely utilized. Contamination avoidance and clean innovation, as inner organizational hones, can offer assistance to play down taken toll and to develop economic aptitudes for the long run, whereas outside organizational hones (item stewardship and maintainability vision) can offer assistance to coordinated partner sees into trade operations and to define future commerce directions. Taken together, these practices can drive shareholder esteem while at the same time contributing to a more feasible world. On the off chance that the company's budgetary execution is nice, it'll draw in financial specialists to contribute and progress the company's execution. In this way, budgetary execution is additionally the determinant of the progression of a company. This can be because the monetary back gotten by the company gets to be the premise for the running of trade forms in the future. Moreover, A green picture can assist firms in pulling in more clients by influencing shopper choices and moving forward with buyer brand dependability. Numerous shoppers need to purchase items from ecologically inviting firms, in spite of the fact that there are, of course, a few who will not pay premium costs for green items.

Keywords: environmental activities, financial performanance, advantage, clients

Procedia PDF Downloads 42
2970 Drivers of Deforestation in the Colombian Amazon: An Empirical Causal Loop Diagram of Food Security and Land-Use Change

Authors: Jesica López, Deniz Koca, Asaf Tzachor

Abstract:

In 2016 the historic peace accord between the Colombian government and the Revolutionary Armed Forces of Colombia (FARC) had no strong mechanism for managing changes to land use and the environment. Since the end of a 60-year conflict in Colombia, large areas of forest in the Amazon region have been rapidly converted to agricultural uses, most recently by cattle ranching. This suggests that the peace agreement presents a threat to the conservation of the country's rainforest. We analyze the effects of cattle ranching as a driver and accelerator of deforestation from a systemic perspective, focusing on two key leverage points the legal and illegal activities involved in the cattle ranching practices. We map and understand the inherent dynamic complexity of deforestation, including factors such as land policy instruments, national strategy to tackle deforestation, land use nexus with Amazonian food systems, and loss of biodiversity. Our results show that deforestation inside Colombian Protected Areas (PAs) in the Amazon region and the surrounding buffer areas has accelerated with the onset of peace. By using a systems analysis approach, we contextualized the competition of land between cattle ranching and the need to protect tropical forests and their biodiversity loss. We elaborate on future recommendations for land use management decisions making suggest the inclusion of an Amazonian food system, interconnecting and visualizing the synergies between sustainable development goals, climate action (SDG 13) and life on land (SDG 15).

Keywords: tropical rainforest, deforestation, sustainable land use, food security, Colombian Amazon

Procedia PDF Downloads 81
2969 Integrated Intensity and Spatial Enhancement Technique for Color Images

Authors: Evan W. Krieger, Vijayan K. Asari, Saibabu Arigela

Abstract:

Video imagery captured for real-time security and surveillance applications is typically captured in complex lighting conditions. These less than ideal conditions can result in imagery that can have underexposed or overexposed regions. It is also typical that the video is too low in resolution for certain applications. The purpose of security and surveillance video is that we should be able to make accurate conclusions based on the images seen in the video. Therefore, if poor lighting and low resolution conditions occur in the captured video, the ability to make accurate conclusions based on the received information will be reduced. We propose a solution to this problem by using image preprocessing to improve these images before use in a particular application. The proposed algorithm will integrate an intensity enhancement algorithm with a super resolution technique. The intensity enhancement portion consists of a nonlinear inverse sign transformation and an adaptive contrast enhancement. The super resolution section is a single image super resolution technique is a Fourier phase feature based method that uses a machine learning approach with kernel regression. The proposed technique intelligently integrates these algorithms to be able to produce a high quality output while also being more efficient than the sequential use of these algorithms. This integration is accomplished by performing the proposed algorithm on the intensity image produced from the original color image. After enhancement and super resolution, a color restoration technique is employed to obtain an improved visibility color image.

Keywords: dynamic range compression, multi-level Fourier features, nonlinear enhancement, super resolution

Procedia PDF Downloads 539