Search results for: identity threat
1244 Identification of Workplace Hazards of Underground Coal Mines
Authors: Madiha Ijaz, Muhammad Akram, Sima Mir
Abstract:
Underground mining of coal is carried out manually in Pakistan. Exposure to ergonomic hazards (musculoskeletal disorders) are very common among the coal cutters of these mines. Cutting coal in narrow spaces poses a great threat to both upper and lower limbs of these workers. To observe the prevalence of such hazards, a thorough study was conducted on 600 workers from 30 mines (20 workers from 1 mine), located in two districts of province Punjab, Pakistan. Rapid Upper Limb Assessment sheet and Rapid Entire Body Assessment sheet were used for the study along with a standard Nordic Musculoskeleton disorder questionnaire. SPSS, 25, software was used for data analysis on upper and lower limb disorders, and regression analysis models were run for upper and lower back pain. According to the results obtained, it was found that work stages (drilling & blasting, coal cutting, timbering & supporting, etc.), wok experience and number of repetitions performed/minute were significant (with p-value 0.00,0.004 and 0.009, respectively) for discomfort in upper and lower limb. Age got p vale 0.00 for upper limb and 0.012 for lower limb disorder. The task of coal cutting was strongly associated with the pain in upper back (with odd ratios13.21, 95% confidence interval (CI)14.0-21.64)) and lower back pain (3.7, 95% confidence interval 1.3-4.2). scored on RULA and REBA sheets, every work-stage was ranked at 7-highest level of risk involved. Workers were young (mean value of age= 28.7 years) with mean BMI 28.1 kg/m2Keywords: workplace hazards, ergonomic disorders, limb disorders, MSDs.
Procedia PDF Downloads 841243 Study of Human Position in Architecture with Contextual Approach
Authors: E. Zarei, M. Bazaei, A. seifi, A. Keshavarzi
Abstract:
Contextuallism has been always the main component of urban science. It not only has great direct and indirect impact on behaviors, events and interactions, but also is one of the basic factors of an urban values and identity. Nowadays there might be some deficiencies in the cities. In the theories of environment designing, humanistic orientations with the focus on culture and cultural variables would enable us to transfer information. To communicate with the context in which human lives, he needs some common memories, understandable symbols and daily activities in that context. The configuration of a place can impact on human’s behaviors. The goal of this research is to review 7 projects in different parts of the world with various usages and some factors such as ‘sense of place’, ‘sense of belonging’ and ‘social and cultural relations’ will be discussed in these projects. The method used for research in this project is descriptive- analytic. Library information and Internet are the main sources of gathering information and the method of reasoning used in this project is inductive. The consequence of this research will be some data in the form of tables that has been extracted from mentioned projects.Keywords: contextuallism with humanistic approach, sense of place, sense of belonging, social and cultural relations
Procedia PDF Downloads 3961242 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA
Procedia PDF Downloads 3981241 Argument Representation in Non-Spatial Motion Bahasa Melayu Based Conceptual Structure Theory
Authors: Nurul Jamilah Binti Rosly
Abstract:
The typology of motion must be understood as a change from one location to another. But from a conceptual point of view, motion can also occur in non-spatial contexts associated with human and social factors. Therefore, from the conceptual point of view, the concept of non-spatial motion involves the movement of time, ownership, identity, state, and existence. Accordingly, this study will focus on the lexical as shared, accept, be, store, and exist as the study material. The data in this study were extracted from the Database of Languages and Literature Corpus Database, Malaysia, which was analyzed using semantics and syntax concepts using Conceptual Structure Theory - Ray Jackendoff (2002). Semantic representations are represented in the form of conceptual structures in argument functions that include functions [events], [situations], [objects], [paths] and [places]. The findings show that the mapping of these arguments comprises three main stages, namely mapping the argument structure, mapping the tree, and mapping the role of thematic items. Accordingly, this study will show the representation of non- spatial Malay language areas.Keywords: arguments, concepts, constituencies, events, situations, thematics
Procedia PDF Downloads 1291240 Hydrodeoxygenation of Furfural over RU Sub-Nano Particles Supported on Al₂O₃-SIO₂ Mixed Oxides
Authors: Chaima Zoulikha Tabet Zatla, Nihel Dib, Sumeya Bedrane, Juan Carlos Hernandez Garrido, Redouane Bachir, Miguel Angel Cauqui, Jose Juan Calvino Gamez
Abstract:
These last year's our planet has witnessed global warming, which is a serious threat to our lives; it has many causes, such as the CO₂ excess in the atmosphere that results from our activity, for the purpose of living in a neater and better environment, working and improving an eco-responsible energy system is a must. Valorization of biomass to produce biofuels is among the most compelling routes to decrease air pollution without considerable modification in current vehicle technology. Effective transformation of lignocellulosic biomass-derived compounds into liquid fuels and value-added chemicals is an economically viable solution. Presently, very competitive technics for the conversion of lignocellulosic biomass into platform chemicals, such as furfural and Hydroxymethylfurfural (HMF), are used. Furfural (C₅H₄O₂) is a major hemi cellulosic biomass-derived platform molecule. In our work, we focus on the valorization of lignocellulosic biomass derivative furfural that is transformed into biofuel through a hydrodeoxygenation reaction in general and involving a catalytic process. In order to get to this point, we are synthesizing and characterizing a series of catalysts with different amounts of Ru (0.5%, 1% and 2%) supported on alumina-silica mixed oxides with various molar ratios (Si/Al = 2.5; 5; 7; 10; 15). These catalysts will be characterized by numerous technics such as N₂ adsorption/desorption, Pyridine adsorption (acidity measure), FTIR, X-rays diffraction, AAS, TEM and SEM.Keywords: furfural, ruthenium, silica-alumina, biomass, biofuel
Procedia PDF Downloads 841239 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours
Authors: Elham Rajabian
Abstract:
The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture
Procedia PDF Downloads 971238 A Multi-Science Study of Modern Synergetic War and Its Information Security Component
Authors: Alexander G. Yushchenko
Abstract:
From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism
Procedia PDF Downloads 1341237 Young Carers’ Dilemma: Family Responsibility, Bonding and Commitment to Supporting Their Mentally Ill Parent in Taiwan
Authors: Esabella Yuan
Abstract:
This study explored the recollections of young carers who lived with and cared for their mentally ill parent and how they managed life difficulties in Taiwan. 19 former young carers took part in the study, conducted from July to October 2021. The findings provided the unique view that all the participants acknowledged being taught by the mainstream culture to honour family value and prioritize the needs of parents over their own ones, they stepped in to care for the ill parent out of love and out of necessity through there having no-one to turn to, they were willing to assume long-term caring responsibilities, strikingly, a much more common experience was that the participants hided parental illness and young carer identity in the community through the fear of social discrimination attached to mental illness. As a result, these former young carers stayed in hidden circumstances and coped alone with caring challenges. The findings suggest that there needs multi-disciplinary services working together to recognize the needs of young carers and provide appropriate intervention to young carers based on a family-focus approach and ensure to serve the best interests of young carers and their families. It is to be hope that young carers can grow up safely and healthily within the community.Keywords: young carers, family well-being, mental health, parental mental illness
Procedia PDF Downloads 891236 The Evolution of Online Hate: How Decades of Tactical and Technological Innovation Created a Hate Epidemic
Authors: Kashvi Jain, Adam Burston
Abstract:
Right-wing social movements are a dominant force in American politics, as evidenced by the January 6th Insurrection, the prevalence of extremist conspiracy theories, and a nationwide surge in hate crime. Despite an abundance of scholarship on contemporary right-wing extremism, there is little scholarship that explains their rise. This paper examines how the white power movement developed through tactical innovation and strategic use of increasingly powerful digital technologies. Using qualitative content analysis of archived digital bulletin boards and websites, we examine right-wing extremists’ digital communication during three consequential time periods of tactical and technological innovation: pre-internet (1980s), web 1.0 (1990s), and web 2.0 (2000s). Our analysis suggests that right-wing activists innovatively exploited the features and affordances of digital technologies and their knowledge of free speech rights to spread supremacist collective identity and ideology. Beyond our empirical contribution, we offer policy advice that school administrators can employ to limit hate.Keywords: leaderless resistance, technological affordances, anti-defamation league, white power movement, tactical
Procedia PDF Downloads 691235 Coral Lifeform Structure in Selected Marine Protected Areas in Southern Cebu, Philippines
Authors: Gloria G. Delan, Alfonso S. Piquero, Rachel Luz V. Rica, Christine M. Corrales
Abstract:
The selected marine protected areas (MPAs) of southern Cebu, Philippines were assessed after these have been established between the years 2000 to 2007. These include Casay of Argao, Cawayan of Dalaguete, Guiwang-Daang Lungsod of Alcoy, North Granada of Boljoon and Sta. Cruz of Ronda. These MPAs were assessed to gather baseline information on its coral life-form structure. Point-intercept transect (PIT) method was used in the observation. Benthic life form and reef substrate at each 0.25 m point interval were identified and recorded along 50 meters transect line both inside and outside of these MPAs. It has been observed that massive, branching and digitate form of corals dominated among the five sanctuaries. Percentage of Live Hard Corals was much higher inside than outside in all sanctuaries. Common to all sanctuaries were noticeable presence of dead corals with algae and coral rubbles indicating an over-exploited habitat. Casay, Cawayan and Daan-Lungsod MPAs had some Crown of Thorn Starfish (COTS) which may pose threat to its coral community. It has been recommended that there should be strict law enforcement and a long term monitoring to continuously conserve and protect coral reef which is an important habitat for fishes for its sustainability as food for human.Keywords: coral rubbles, coral reef, live hard coral, point-intercept transect
Procedia PDF Downloads 4181234 Distinguishing Borrowings from Code Mixes: An Analysis of English Lexical Items Used in the Print Media in Sri Lanka
Authors: Chamindi Dilkushi Senaratne
Abstract:
Borrowing is the morphological, syntactic and (usually) phonological integration of lexical items from one language into the structure of another language. Borrowings show complete linguistic integration and due to the frequency of use become fossilized in the recipient language differentiating them from switches and mixes. Code mixes are different to borrowings. Code mixing takes place when speakers use lexical items in casual conversation to serve a variety of functions. This study presents an analysis of lexical items used in English newspapers in Sri Lanka in 2017 which reveal characteristics of borrowing or code mixes. Both phenomena arise due to language contact. The study will also use data from social media websites that comment on newspaper articles available on the web. The study reiterates that borrowings are distinguishable from code mixes and that they are two different phenomena that occur in language contact situations. The study also shows how existing morphological processes are used to create new vocabulary in language use. The study sheds light into how existing morphological processes are used by the bilingual to be creative, innovative and convey a bilingual identity.Keywords: borrowing, code mixing, morphological processes
Procedia PDF Downloads 2191233 Investigating the Socio-ecological Impacts of Sea Level Rise on Coastal Rural Communities in Ghana
Authors: Benjamin Ankomah-Asare, Richard Adade
Abstract:
Sea level rise (SLR) poses a significant threat to coastal communities globally. Ghana has over the years implemented protective measures such as the construction of groynes and revetment to serve as barriers to sea waves in major cities and towns to prevent sea erosion and flooding. For vulnerable rural coastal communities, the planned retreat is often proposed; however, relocation costs are often underestimated as losses of future social and cultural value are not always adequately taken into account. Through a mixed-methods approach combining qualitative interviews, surveys, and spatial analysis, the study examined the experiences of coastal rural communities in Ghana and assess the effectiveness of relocation strategies in addressing the socio-economic and environmental challenges posed by sea level rise. The study revealed the devastating consequences of sea level rise on these communities, including increased flooding, erosion, and saltwater intrusion into freshwater sources. Moreover, it highlights the adaptive capacities within these communities and how factors such as infrastructure, economic activities, cultural heritage, and governance structures shape their resilience in the face of environmental change. While relocation can be an effective strategy in reducing the risks associated with sea level rise, the study recommends that proper implementation of this adaptation strategy can be achieved when coupled with community-led planning, participatory decision-making, and targeted support for vulnerable groups.Keywords: sea level rise, relocation, socio-ecological impacts, rural communities
Procedia PDF Downloads 491232 Removal of Gaseous Pollutant from the Flue Gas in a Submerged Self-Priming Venturi Scrubber
Authors: Manisha Bal, B. C. Meikap
Abstract:
Hydrogen chloride is the most common acid gas emitted by the industries. HCl gas is listed as Title III hazardous air pollutant. It causes severe threat to the human health as well as environment. So, removal of HCl from flue gases is very imperative. In the present study, submerged self-priming venturi scrubber is chosen to remove the HCl gas with water as a scrubbing liquid. Venturi scrubber is the most popular device for the removal of gaseous pollutants. Main mechanism behind the venturi scrubber is the polluted gas stream enters at converging section which accelerated to maximum velocity at throat section. A very interesting thing in case of submerged condition, venturi scrubber is submerged inside the liquid tank and liquid is entered at throat section because of suction created due to large pressure drop generated at the throat section. Maximized throat gas velocity atomizes the entered liquid into number of tiny droplets. Gaseous pollutant HCl is absorbed from gas to liquid droplets inside the venturi scrubber due to interaction between the gas and water. Experiments were conducted at different throat gas velocity, water level and inlet concentration of HCl to enhance the HCl removal efficiency. The effect of throat gas velocity, inlet concentration of HCl, and water level on removal efficiency of venturi scrubber has been evaluated. Present system yielded very high removal efficiency for the scrubbing of HCl gas which is more than 90%. It is also concluded that the removal efficiency of HCl increases with increasing throat gas velocity, inlet HCl concentration, and water level height.Keywords: air pollution, HCl scrubbing, mass transfer, self-priming venturi scrubber
Procedia PDF Downloads 1411231 Validity and Reliability of the Iranian Version of the Self-Expansion Questionnaire
Authors: Mehravar Javid, James Sexton, Farzaneh Amani, Kainaz Patravala
Abstract:
Self-expansion is a procedure through which people expand the dimensions of their self-concept by incorporating novel content into their sense and experience of identity. Greater self-expansion predicts positive consequences for individuals and romantic relationships. The self-expansion questionnaire (SEQ) originally developed by Lewandowski & Aron (2002) assumes that self-expansion is constituted of key components from the self-expansion model. This study aimed to confirm the factor structure of SEQ and adapt the questions of the scale to the Iranian culture. The sample included 190 participants who responded to 14 items and were selected by simple random sampling. Using Amos-21 and SPSS-21, descriptive statistics, Pearson correlation and Confirmatory Factor Analysis (CFA) were calculated. Cronbach’s alpha coefficient for total SEQ items was 0.92. Results of CFA supported the factor structure SEQ [RMSEA=0.08, GFI=0.88 and CFI=0.92] that showed the model has a good fit and also all the items of SEQ, have a high correlation and have a direct and significant relationship. So, the SEQ demonstrated acceptable psychometric properties in Tehran University students. Looking forward, it would be interesting and exciting to see the implications of the scale as applied to romantic relationships.Keywords: validity, reliability, confirmatory factor analysis, self-expansion questionnaire
Procedia PDF Downloads 821230 Behavioral Changes and Gill Histopathological Alterations of Red Hybrid Tilapia (Oreochromis sp.) Exposed to Glyphosate Herbicide
Authors: Abubakar Muhammad Umar, Nur Adeela Yasid, Hassan Mohd Daud, Mohd Yunus Abd Shukor
Abstract:
Glyphosate [N-(phosphonomethyl) glycine] is among the most broadly and generally recognised broad-spectrum herbicides used in agriculture due to its low cost and effectiveness in weed management. The pollution of glyphosate in the aquatic environment can be via water run-off from agricultural lands, or by spray drift, aerial spraying or due to industrial discharge, which may be seen as a threat to aquatic biota. Fish is one of the best organisms to study the toxicological aspects of glyphosate. A 49 days experiment was conducted under laboratory conditions to ascertain the effects of technical grade glyphosate on behaviour and histopathological conditions in the gills of red hybrid tilapia using a light inverted microscope. Air gasping, erratic swimming, fin movement, mucus secretion, hemorrhages, and loss of scales were observed as behavioural changes in the exposed fish. There was no histopathological complication observed in the gill of the control fish, but various levels of alterations were seen in the gills of the fish exposed to glyphosate herbicide. These include lifting of primary lamella, congestion of secondary lamella, as well as hyperplasia in both primary and secondary gill lamella, and hypertrophy of secondary gill lamella. Based on the findings of this study, glyphosate herbicide exerts behavioural and histopathological changes in the gill of red hybrid tilapia, and therefore, the fish is considered a good bioindicator in aquatic environment monitoring. Excessive usage of glyphosate herbicide near aquatic habitats should be discouraged.Keywords: behavioural, histopathological, Oreochromis niloticus, glyphosate
Procedia PDF Downloads 471229 The Lived Experience of People with a Mental Illness of Their Engagement in Therapeutic Recreation
Authors: Caroline Picton, Lorna Moxham, Christopher Patterson, Dana Perlman, Ellie Taylor, Renee Brighton
Abstract:
The purpose of this study was to extrapolate the meaning for people living with a mental illness of their participation in a therapeutic recreation experience. The study’s participants engaged in a five-day adventure camp, known as Recovery Camp, alongside undergraduate health care students. An interpretive phenomenological approach was used as an exploratory method to interview 25 participants (n=25). Van Kaam’s structured analytical framework guided the analysis of the transcribed narratives. The findings provide insight into using therapeutic recreation to enhance personal mental health recovery. Recovery Camp was viewed by participants as having a transformational effect on forming positive social connectedness and improving their self-identity. Participants perceived the Recovery Camp experience as one that gave them a sense of purpose and increased their motivation to undertake further activities. The insights gained of the benefits of therapeutic recreation for people living with a mental illness can be used to promote purposeful community engagement.Keywords: interpretive phenomenology, lived experience, mental illness, personal mental health recovery
Procedia PDF Downloads 4991228 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene
Authors: Saidu I. R., Shittu S. S.
Abstract:
As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.Keywords: security, BYOD, vulnerability, risk, cyber hygiene
Procedia PDF Downloads 761227 Political Corruption and Workplace Misconduct
Authors: Masako Darrough, Mahmud Hossain, Santanu Mitra
Abstract:
The prevalent and increasing workplace misconduct in the United States presents a significant threat to social welfare. Despite efforts by enforcement agencies, U.S. workers remain vulnerable to employer exploitation, as evidenced by rising workplace injuries and discrimination lawsuits. While existing literature has identified several factors associated with unethical labor practices, the influence of political corruption remains largely unexplored. This paper aims to fill this gap by investigating the relationship between political corruption and workplace misconduct in the U.S. context. Using the data from the U.S. Bureau of Labor Statistics, the Equal Employment Opportunity Commission, and corruption convictions reported by the Department of Justice, we find a positive association between political corruption and workplace misconduct among U.S.-listed firms that are headquartered in different states from 2004 to 2022. Both unionization and stricter labor laws attenuate the positive association between corruption and unethical labor practices. Our analyses also address potential endogeneity concerns via difference-in-differences, instrumental variables, and propensity-score-matched analyses, reaffirming the robustness of our findings. This research contributes to the literature by shedding light on how corrupt political climates influence organizational operational behavior and unethical practices. It also underscores the importance of stakeholder trust and the role of regulatory frameworks and offers practical insights to policymakers by suggesting a judicious allocation of enforcement resources to more corrupt states.Keywords: workplace misconduct, political corruption, unionization, labor law strictness
Procedia PDF Downloads 221226 A Deep Learning Approach to Online Social Network Account Compromisation
Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang
Abstract:
The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.Keywords: computer security, network security, online social network, account compromisation
Procedia PDF Downloads 1191225 Modern Saigon Drag Queen Show: Voice of the Trans Vietnamese for Gender Equality
Authors: Ly Quyet Tien
Abstract:
Starting in the 1990s and growing in tandem with the LGBTQI movement in Vietnam, Modern Saigon Lottery Show is one of the most popular Vietnamese drag queen shows in Ho Chi Minh City, Vietnam. Transgender by nature, underprivileged by status, avoided by the family, and despised by society for decades, these queer artists came out of the closet and decided to change their own destiny by organizing lottery music shows. Unprofessionally in the start, they gradually appeared professionally on stage in big cities and won the heart of the larger public. Their success affirms themself, promotes their gender right, and assures their life in a proud way: honest, independent, and sustainable. This paper aims to give the readers a full portrait of Modern Saigon’s activities through musical bingo. It examines the background into which the drag queen show was born and developed: its styles, themes as well as own particularity. It also studies its identity, diversity in the entertainment industry, and its revolutionary role in the promotion of the welfare of Vietnamese transgender citizens and the local popular queer culture in Vietnam and Asia.Keywords: transgender, lottery show, equality, culture
Procedia PDF Downloads 981224 Evaluation of Nematicidal Action of Some Botanicals on Plant-Parasitic Nematode
Authors: Lakshmi, Yakshita Awasthi, Deepika, Lovleen Jha, Archna Kumar
Abstract:
From the back of centuries, plant-parasitic nematodes (PPN) have been recognized as a major threat to agriculturalists globally. It causes 21.3% global food loss annually. The utilization of harmful chemical pesticides to minimize the nematode population may cause acute and delayed health hazards and harmful impacts on human health. In recent years, a variety of plants have been evaluated for their nematicidal properties and efficacy in the management of plant-parasitic nematodes. Several Phyto-nematicides are available, but most of them are incapable of sustainable management of PPN, especially Meloidogyne spp. Thus, there is a great need for a new eco-friendly, highly efficient, sustainable control measure for this nematode species. Keeping all these facts and after reviewing the literature, aqueous extract of Cymbopogon citratus, Tagetes erecta, and Azadirachta indica were prepared by adding distilled water (1 g sample mixed with 10ml of water). In vitro studies were conducted to evaluate the efficacious nature of targeted botanicals against PPN Meloidogyne spp. The mortality status of PPN was recorded by counting the live and dead individuals after applying 100μl of selected extract. The impact was observed at different time durations, i.e., 24h and 48h. The result showed that the highest 100% mortality was at 48h in all three extracts. Thus, these extracts, with the addition of a suitable shelf-life enhancer, may be exploited in different nematode control programs as an economical, sustainable measure.Keywords: Meloidogyne, Cymbopogon citratus, Tagetes erecta, Azadirachta indica, nematicidal
Procedia PDF Downloads 1651223 EU Citizenship, Brexit, and Democracy
Authors: Noemi Bessa Vilela
Abstract:
The citizenship of the European Union nowadays established under article 20/1 of the Treaty on the Functioning of the European Union has been a hallmark of the EU’s political integration since the adoption of the Maastricht Treaty. Initially received with some doubt regarding what it would mean to be a European citizen, and what would happen to individual national citizenships, the Union’s citizenship appears to have been relegated at present times to a secondary position in relation to other, more pressing, economic and market policies. Notwithstanding the veritable myriad of specific rights and freedoms attributed to citizens of the Union, it is not hard to understand that, given the importance of citizenship as a true cohesion policy at its core, somewhere along the way the Union has failed in its mission of giving its citizens a feeling of European identity, along with the values it so bravely wants to defend and promote. In fact, notwithstanding the ever-so-permanent presence of the blue and yellow flag next to national flags, and the elections to European Parliament, most citizens have no idea of the relevance of EU law as an integral part of their legal heritage. In fact, it is safe to state, while the majority of traveling nationals are aware of i.e. their right to freely move in between Member-States, most overlook the fact that this is a result of their status as EU citizens. We have now arrived at a crossroad between accepting the law as it is, or to create new possibilities. The question raised is whether the citizens of UK may, or may not, and shall or shall not, keep the EU citizenship.Keywords: Brexit, democracy, EU citizenship, EU law, TFUE
Procedia PDF Downloads 1301222 Assessment of Conventional Drinking Water Treatment Plants as Removal Systems of Virulent Microsporidia
Authors: M. A. Gad, A. Z. Al-Herrawy
Abstract:
Microsporidia comprises various pathogenic species can infect humans by means of water. Moreover, chlorine disinfection of drinking-water has limitations against this protozoan pathogen. A total of 48 water samples were collected from two drinking water treatment plants having two different filtration systems (slow sand filter and rapid sand filter) during one year period. Samples were collected from inlet and outlet of each plant. Samples were separately filtrated through nitrocellulose membrane (142 mm, 0.45 µm), then eluted and centrifuged. The obtained pellet from each sample was subjected to DNA extraction, then, amplification using genus-specific primer for microsporidia. Each microsporidia-PCR positive sample was performed by two species specific primers for Enterocytozoon bieneusi and Encephalitozoon intestinalis. The results of the present study showed that the percentage of removal for microsporidia through different treatment processes reached its highest rate in the station using slow sand filters (100%), while the removal by rapid sand filter system was 81.8%. Statistically, the two different drinking water treatment plants (slow and rapid) had significant effect for removal of microsporidia. Molecular identification of microsporidia-PCR positive samples using two different primers for Enterocytozoon bieneusi and Encephalitozoon intestinalis showed the presence of the two pervious species in the inlet water of the two stations, while Encephalitozoon intestinalis was detected in the outlet water only. In conclusion, the appearance of virulent microsporidia in treated drinking water may cause potential health threat.Keywords: removal, efficacy, microsporidia, drinking water treatment plants, PCR
Procedia PDF Downloads 2111221 Mitigation Measures for the Acid Mine Drainage Emanating from the Sabie Goldfield: Case Study of the Nestor Mine
Authors: Rudzani Lusunzi, Frans Waanders, Elvis Fosso-Kankeu, Robert Khashane Netshitungulwana
Abstract:
The Sabie Goldfield has a history of gold mining dating back more than a century. Acid mine drainage (AMD) from the Nestor mine tailings storage facility (MTSF) poses a serious threat to the nearby ecosystem, specifically the Sabie River system. This study aims at developing mitigation measures for the AMD emanating from the Nestor MTSF using materials from the Glynns Lydenburg MTSF. The Nestor MTSF (NM) and the Glynns Lydenburg MTSF (GM) each provided about 20 kg of bulk composite samples. Using samples from the Nestor MTSF and the Glynns Lydenburg MTSF, two mixtures were created. MIX-A is a mixture that contains 25% weight percent (GM) and 75% weight percent (NM). MIX-B is the name given to the second mixture, which contains 50% AN and 50% AG. The same static test, i.e., acid–base accounting (ABA), net acid generation (NAG), and acid buffering characteristics curve (ABCC) was used to estimate the acid-generating probabilities of samples NM and GM for MIX-A and MIX-B. Furthermore, the mineralogy of the Nestor MTSF samples consists of the primary acid-producing mineral pyrite as well as the secondary minerals ferricopiapite and jarosite, which are common in acidic conditions. The Glynns Lydenburg MTSF samples, on the other hand, contain primary acid-neutralizing minerals calcite and dolomite. Based on the assessment conducted, materials from the Glynns Lydenburg are capable of neutralizing AMD from Nestor MTSF. Therefore, the alkaline tailings materials from the Glynns Lydenburg MTSF can be used to rehabilitate the acidic Nestor MTSF.Keywords: Nestor Mine, acid mine drainage, mitigation, Sabie River system
Procedia PDF Downloads 851220 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation
Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques
Procedia PDF Downloads 2871219 The Combination of Curcuma Extract and IgG Colostrum on Strongyloides Infection in CD1 Mice
Authors: Laurentius J. M. Rumokoy, Jimmy Posangi, Wisje Lusia Toar, Julio Lopez Aban
Abstract:
The threat of pathogen infection agents to the neonates is a major health problem to the new born life livestock. Neonate losses became an important case in the world as well as in Indonesia. This condition can be triggered by an infection with nematode in conjunction with a failure of immunoglobulin passive transfer. The study was conducted to evaluate the role of the curcuma combined with IgG colostrum on the development of parasites in the gut of CD1 mice. Animal experiments were divided in four groups (G) based on the treatment: G1 (infection only); G2 (curcuma+infection), G3 (IgG + infection) and G4 (curcuma+IgG+infection). The parameters measured were EPG (eggs per gram) and female in the intestine. The results obtained showed that the treatment has no a significant influence on the number of eggs per gram of feces in the group infected compared to the control group without receiving IgG nor curcuma. However, the EGP response tended to decrease at day 6 in G3 and G4 with a minimum number at zero eggs. This performant showed that the immunoglobulin-G and curcuma substances could slightly decreased the number of eggs in animal infected with Strongyloides. The results obtained showed also that the treatment has no significant difference (P > 0.05) on female larva in the gut of MCD1 experimental. In other side, we found that the best performance to inhibit the female quantity in the gut was the treatment with IgG and infection of parasite in G3. In this treatment, the minimum number was five female only in the gut. The results described IgG response was better than the curcuma single use in reducing the female parasite in the gut. This positive response of IgG compared to other controls group was associated with the function of colostrum antibodies.Keywords: parasites, livestock, curcuma, colostrums
Procedia PDF Downloads 1761218 Depression in Immigrants and Refugees
Authors: Fatou Cisse
Abstract:
Depression is one of the most serious health problems experienced by immigrants and refugees, who are likely to undergo heightened political, economic, social, and environmental stressors as they transition to a new culture. The purpose of this literature review is to identify and compare risks associated with depression among young adult immigrants and refugees aged 18 to 25. Ten articles focused on risks associated with depression symptoms among this population were reviewed, revealing several common themes: Stress, identity, culture, language barriers, discrimination, social support, self-esteem, length of time in the receiving country, origins, or background. Existing research has failed to account adequately for sample size, language barriers, how the concept of "depression" differs across cultures, and stressors immigrants and refugees experience prior to the transition to the new culture. The study revealed that immigrants and refugees are at risk for depression and that the risk is greater in the refugee population due to their history of trauma. The Roy Adaptation Model was employed to understand the coping mechanisms that refugees and immigrants could use to reduce rates of depression. The psychiatric nurse practitioner must be prepared to intervene and educate this population on these coping mechanisms to help them overcome the feelings that lead to depression and facilitate a smooth integration into the new culture.Keywords: immigration, refugees, depression, young adults
Procedia PDF Downloads 1991217 The Prevalence of Blood-Borne Viral Infections among Autopsy Cases in Jordan
Authors: Emad Al-Abdallat, Faris G. Bakri, Azmi Mahafza, Rayyan Al Ali, Nidaa Ababneh, Ahmed Idhair
Abstract:
Background: Morgues are high-risk areas for the spread of infection from the cadavers to the staff during the postmortem examination. Infection can spread from corpses to workers by the airborne route, by direct contact, or from needle and sharp object injuries. Objective: Knowledge about the prevalence of these infections among autopsies is prudent to appreciate any risk of transmission and to further enforce safety measures. Method: A total of 242 autopsies were tested. Age ranged from 3 days to 94 years (median 75.5 years, mean 45.3 (21.9 ± SD)). There were 172 (71%) males. Results: The cause of death was considered natural in 137 (56.6%) cases, accidental in 89 (36.8%), homicidal in 9 (3.7%), suicidal in 4 (1.7%), and unknown in 3 (1.2%). Hepatitis B surface antigen was positive in 5 (2.1%) cases. Hepatitis C virus antibody was detected in 5 (2.1%) cases and the hepatitis C virus polymerase chain reaction was positive in 2 of them (0.8%). HIV antibody was not detected in any of the cases. Conclusions: Autopsies can be associated with exposure to blood borne viruses. Autopsies performed during the study period were tested for hepatitis B surface antigen, hepatitis C virus antibody, and human immunodeficiency virus antibody. Positive tests were subsequently confirmed by polymerase chain reaction. There is low prevalence of infections with these viruses in our autopsy cases. However, the risk of transmission remains a threat. Healthcare workers in the forensic departments should adhere to standard precautions.Keywords: autopsy, hepatitis B virus, hepatitis C virus, human immunodeficiency virus, Jordan
Procedia PDF Downloads 3801216 New Employee on-Boarding Program: Effective Tool for Reducing the Prevalence of Workplace Injuries/Accidents
Authors: U. Ugochukwu, J. Lee, P. Conley
Abstract:
According to a recent survey by the UT Southwestern Workplace Safety Committee, the three most common on-the-job injuries reported by workers at the medical center are musculoskeletal injuries, slip-and-fall injuries and repetitive motion injuries. Last year alone, of the 650 documented workplace injuries and accidents, 45% were seen in employees in their first-two years of employment. UT Southwestern New Employee On-Boarding program was created and modeled to follows OSHA’s model that consist of: determining if training is needed, identifying training needs, identifying goals and objectives, developing learning activities, conducting the training, evaluating program effectiveness, and improving the program. The hospital’s management best practices were recreated to limit and control workplace injuries and accidents. Regular trainings and workshops on workplace safety and compliance were initiated for new employees. Various computer workstations were evaluated and recommendations were made to reduce musculoskeletal disorders. Post exposure protocols and workers protection programs were remodeled for infectious agents and chemicals used in the hospital, and medical surveillance programs were updated, for every emerging threat, to ensure they are in compliance with the US policy, regulatory and standard setting organizations. If ignorance of specific job hazards and of proper work practices is to blame for this higher injury rate, then training will help to provide a solution. Use of this program in training activities is just one of many ways UT Southwestern complied with the OSHA standards that relate to training while enhancing the safety and health of their employees.Keywords: ergonomics, hazard, on-boarding, surveillance, workplace
Procedia PDF Downloads 3301215 The Importance of Artificial Intelligence on Arts and Design
Authors: Mariam Adel Hakim Fouad
Abstract:
This quantitative examine investigates innovative arts teachers' perceptions regarding the implementation of an Inclusive innovative Arts curriculum. The study employs a descriptive method utilizing a 5-point Likert scale questionnaire comprising 15 objects to acquire data from innovative arts educators. The Census, with a disproportionate stratified sampling approach, became utilized to pick out 226 teachers from five academic circuits (Circuit A, B, C, D & E) within Offinso Municipality, Ghana. The findings suggest that most innovative arts instructors maintain a wonderful belief in enforcing an inclusive, innovative arts curriculum. Wonderful perceptions and attitudes amongst teachers are correlated with improved scholar engagement and participation in class sports. This has a look at recommends organizing workshops and in-carrier schooling periods centered on inclusive innovative arts schooling for creative Arts instructors. Moreover, it shows that colleges of education and universities accountable for trainer schooling integrate foundational guides in creative arts and special schooling into their number one schooling teacher training packages.Keywords: arts-in-health, evidence based medicine, arts for health, expressive arts therapiesarts, cultural heritage, digitalization, ICTarts, design, font, identity
Procedia PDF Downloads 23