Search results for: interest flooding attack
3387 Building Resilience to El Nino Related Flood Events in Northern Peru Using a Structured Facilitation Approach to Interdisciplinary Problem Solving
Authors: Roger M. Wall, David G. Proverbs, Yamina Silva, Danny Scipion
Abstract:
This paper critically reviews the outcomes of a 4 day workshop focused on building resilience to El Niño related Flood Events in northern Perú. The workshop was run jointly by Birmingham City University (BCU) in partnership with Instituto Geofísico del Perú (IGP) and was hosted by the Universidad de Piura (UDEP). The event took place in August 2018 and was funded by the Newton-Paulet fund administered by the British Council. The workshop was a response to the severe flooding experienced in Piura during the El Niño event of March 2017 which damaged over 100,000 homes and destroyed much local infrastructure including around 100 bridges. El Niño is a recurrent event and there is concern that its frequency and intensity may change in the future as a consequence of climate change. A group of 40 early career researchers and practitioners from the UK and Perú were challenged with working together across disciplines to identify key cross-cutting themes and make recommendations for building resilience to similar future events. Key themes identified on day 1 of the workshop were governance; communities; risk information; river management; urban planning; health; and infrastructure. A field study visit took place on day 2 so that attendees could gain first-hand experience of affected and displaced communities. Each of the themes was then investigated in depth on day 3 by small interdisciplinary teams drawing on their own expertise, local knowledge and the experiences of the previous day’s field trip. Teams were responsible for developing frameworks for analysis of their chosen theme and presenting their findings to the whole group. At this point, teams worked together to develop links between the different themes so that an integrated approach could be developed and presented on day 4. This paper describes the approaches taken by each team and the way in which these were integrated to form an holistic picture of the whole system. The findings highlighted the importance of risk-related information and the need for strong governance structures to enforce planning regulations and development. The structured facilitation approach proved to be very effective and it is recommended that the process be repeated with a broader group of stakeholders from across the region.Keywords: El Niño, integrated flood risk management, Perú, structured facilitation, systems approach, resilience
Procedia PDF Downloads 1473386 Flood Risk Management in Low Income Countries: Balancing Risk and Development
Authors: Gavin Quibell, Martin Kleynhans, Margot Soler
Abstract:
The Sendai Framework notes that disaster risk reduction is essential for sustainable development, and Disaster Risk Reduction is included in 3 of the Sustainable Development Goals (SDGs), and 4 of the SDG targets. However, apart from promoting better governance and resourcing of disaster management agencies, little guidance is given how low-income nations can balance investments across the SDGs to achieve sustainable development in an increasingly climate vulnerable world with increasing prevalence of flood and drought disasters. As one of the world’s poorest nations, Malawi must balance investments across all the SDGs. This paper explores how Malawi’s National Guidelines for Community-based Flood Risk Management integrate sustainable development and flood management objectives at different administrative levels. While Malawi periodically suffers from large, widespread flooding, the greatest impacts are felt through the smaller annual floods and flash floods. The Guidelines address this through principles that recognize that while the protection of human life is the most important priority for flood risk management, addressing the impacts of floods on the rural poor and the economy requires different approaches. The National Guidelines are therefore underpinned by the following; 1. In the short-term investments in flood risk management must focus on breaking the poverty – vulnerability cycle; 2. In the long-term investments in the other SDGs will have the greatest flood risk management benefits; 3. If measures are in place to prevent loss of life and protect strategic infrastructure, it is better to protect more people against small and medium size floods than fewer people against larger floods; 4. Flood prevention measures should focus on small (1:5 return period) floods; 5. Flood protection measures should focus on small and medium floods (1:20 return period) while minimizing the risk of failure in larger floods; 6. The impacts of larger floods ( > 1:50) must be addressed through improved preparedness; 7. The impacts of climate change on flood frequencies are best addressed by focusing on growth not overdesign; and 8. Manage floods and droughts conjunctively. The National Guidelines weave these principles into Malawi’s approach to flood risk management through recommendations for planning and implementing flood prevention, protection and preparedness measures at district, traditional authority and village levels.Keywords: flood risk management in low-income countries, sustainable development, investments in prevention, protection and preparedness, community-based flood risk management, Malawi
Procedia PDF Downloads 2413385 COVID-19: A Thread to the Security System of Foreign Investment
Authors: Mehdi Ghaemi
Abstract:
In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.Keywords: foreign investment, FPS standard, host country, public health, COVID-19
Procedia PDF Downloads 1053384 Health Ramifications of Workplace Bullying: Gender, Race and Sexual Orientation as Risk Factors
Authors: Kathleen Canul
Abstract:
Bullying is on the rise according to several recent studies. Workplace bullying has garnered less attention than other forms yet incidence rates range from 35-45%. The consequences of being bullied at work are broad, ranging from physiological to psychological to occupational. As the bullying progresses, employees begin to exhibit physical and psychological symptoms. Blood pressure rises, along with other cardiac related concerns. For men, covert coping with job unfairness was associated with a four-fold risk of heart attack and death. Gastrointestinal distress, headaches, muscle tension, sleep disorders and exhaustion are also common. Workplace bullying appears to contribute to the risk of subsequent psychotropic medication, as well. Emotionally, anxiety and depression increase along with lowered self-esteem and problems concentrating on the duties of the job. In an attempt to cope, individuals may succumb to unhealthy practices involving food, alcohol and other drugs. Patterns of bullying vary by gender, race, and ethnicity, as well as sexual orientation, with women, ethnic minorities and LGBTQ employees reporting higher rates of bullying in the workplace. Not only is this an issue of inequity on the job, but also a problem of health disparities as there are few mental health professionals confident and competent in dealing with workplace bullying issues, and the lack of culturally competent clinicians exacerbates this inequality in receiving adequate care. Alone, the topic of workplace bullying is not unique; however, the diverse experiences of underrepresented groups who disproportionately are affected on the job and suffer untreated, health related concerns represent a significant and emerging problem requiring attention. Conference participants who have experienced, witnessed or help those bullied on the job would benefit most from this review of the literature on the consequences of bullying experienced by diverse and underrepresented groups in the workplace.Keywords: bullying, ethnic minorities, health disparities, workplace conflict
Procedia PDF Downloads 2803383 The Role of Societas Europaea in Business Environment of Czech Republic
Authors: Werner Bernatik, Pavel Adamek
Abstract:
The Societas Europaea is the legal form of company which plays its role within European Union since 2004. Since that it has settled in particular EU's member according to conditions. There is several hundreds of Societas Europaea found in EU and the article pays attention to historical background of conditions which formed the European Entrepreneurial Environment. Also, the differences of particular details of Societas Europaea are mentioned. Furthermore, the case of Czech Republic Business Environment is subject of interest where, surprisingly, the total amount of registered Societas Europaea was identified as the highest. The possible reasons of such situation are subject of research and results are to be presented in the article.Keywords: Societas Europaea, business environment, legal form of company, entrepreneurial environment, European Union, competitivness
Procedia PDF Downloads 4233382 Preventing Violent Extremism in Mozambique and Tanzania: A Survey to Measure Community Resilience
Authors: L. Freeman, D. Bax, V. K. Sapong
Abstract:
Community-based, preventative approaches to violent extremism may be effective and yet remain an underutilised method. In a realm where security approaches dominate, with the focus on countering violence extremism and combatting radicalisation, community resilience programming remains sparse. This paper will present a survey tool that aims to measure the risk and protective factors that can lead to violent extremism in Mozambique and Tanzania. Conducted in four districts in the Cabo Delgado region of Mozambique and one district in Pwani, Tanzania, the survey uses a combination of BRAVE-14, Afrocentric and context-specific questions in order to more fully understand community resilience opportunities and challenges in preventing and countering violent extremism. Developed in Australia and Canada to measure radicalisation risks in individuals and communities, BRAVE-14 is a tool not yet applied in the African continent. Given the emerging threat of Islamic extremism in Northern Mozambique and Eastern Tanzania, which both experience a combination of socio-political exclusion, resource marginalisation and religious/ideological motivations, the development of the survey is timely and fills a much-needed information gap in these regions. Not only have these Islamist groups succeeded in tapping into the grievances of communities by radicalising and recruiting individuals, but their presence in these regions has been characterised by extreme forms of violence, leaving isolated communities vulnerable to attack. The expected result of these findings will facilitate the contextualisation and comparison of the protective and risk factors that inhibit or promote the radicalisation of the youth in these communities. In identifying sources of resilience and vulnerability, this study emphasises the implementation of context-specific intervention programming and provides a strong research tool for understanding youth and community resilience to violent extremism.Keywords: community resilience, Mozambique, preventing violent extremism, radicalisation, Tanzania
Procedia PDF Downloads 1323381 Impacts of Ibeju - Lekki New Town on Neighbouring Residents of Ibeju, Lagos Nigeria
Authors: Abolade Olajoke, Adigun Folasade Oyenike, Odunjo Oluronke Omolola Olaleye, Babajide Rotimi
Abstract:
Against the shortfall associated with unprecedented urbanization in most cities of the world, coupled with rapid expansion of outer boundaries, is the resultant birth of the development of new towns. The paper therefore examines the impacts of Ibeju - Lekki New Town on Neighbouring communities of Ibeju Lekki. Random systematic sampling was employed elicit relevant information from a total number of 269 residents at interval of five buildings in four neighbouring communities. Descriptive statistics was employed to test for the socioeconomic characteristics of respondents, problems faced by government officials during the implementation and monitoring process. Likert scale was employed to ascertain respondents view on the impact of the new town on neighbouring communities. Result from the findings shows that male (56.9%) are the most dominant occupant in the study area of which most (68.1%) fall within the most the active age group (18-39 and 40-59 years). Results further shows that 36% of the total respondents are traders and majority (32%) earn below government salary wage cap of ₦18000 thus indicating that majority of the respondents are petty traders. Results of findings from development authority reveals that the major problem encountered during monitoring and implementation is harassment of government officials (35%). Result of likert scale further show that new town has brought increase in intensity of land use within neighbouring communities (RAI 3.65), provision of job opportunity (RAI 3.57). This have consequently improve standard of living of the neighbouring community (RAI 3.27). On the contrary some (RAI 1.97) opined that attention should paid to provision of power supply and provision of recreation facilities (RAI I.63). The study recommends that government should make adequate provisions for basic facilities such power supply, adequate health care system, basic education and provision of healthy portable water. This should be given utmost priority to enhance the living condition of residents. To forestall attack from residents’ adequate security measures should be provided as backup for Government official during implementation and monitoring. Appropriate sanction to illegal occupants and demolition of illegal structures should be fully implemented, This will indubitably prevent haphazard development and also promote a liveable environment. Against the shortfall associated with unprecedented urbanization in most cities of the world, coupled with rapid expansion of outer boundaries, is the resultant birth of the development of new towns. The paper therefore examines the impacts of Ibeju - Lekki New Town on Neighbouring communities of Ibeju Lekki. Random systematic sampling was employed elicit relevant information from a total number of 269 residents at interval of five buildings in four neighbouring communities. Descriptive statistics was employed to test for the socioeconomic characteristics of respondents, problems faced by government officials during the implementation and monitoring process. Likert scale was employed to ascertain respondents view on the impact of the new town on neighbouring communities. Result from the findings shows that male (56.9%) are the most dominant occupant in the study area of which most (68.1%) fall within the most the active age group (18-39 and 40-59 years). Results further shows that 36% of the total respondents are traders and majority (32%) earn below government salary wage cap of ₦18000 thus indicating that majority of the respondents are petty traders. Results of findings from development authority reveals that the major problem encountered during monitoring and implementation is harassment of government officials (35%) Result of likert scale further show that new town has brought increase in intensity of land use within neighbouring communities (RAI 3.65), provision of job opportunity (RAI 3.57). This have consequently improve standard of living of the neighbouring community (RAI 3.27). On the contrary some (RAI 1.97) opined that attention should paid to provision of power supply and provision of recreation facilities (RAI I.63). The study recommends that government should make adequate provisions for basic facilities such power supply, adequate health care system, basic education and provision of healthy portable water. This should be given utmost priority to enhance the living condition of residents. To forestall attack from residents’ adequate security measures should be provided as backup for Government official during implementation and monitoring. Appropriate sanction to illegal occupants and demolition of illegal structures should be fully implemented, This will indubitably prevent haphazard development and also promote a liveable environment.Keywords: new town, urbanization, infrastructure boundary
Procedia PDF Downloads 4103380 Investigation of Suitable Linkage System for Transportation Sustainability: The Instance of Bursa in Turkey
Authors: Elvan Ender, Ozge Celik
Abstract:
Transportation systems play a vital role in access and egress in our lives. Concerns about environmental quality, social equity, economic vitality, and the threat of climate change have converged to produce a growing interest in the concept of sustainability, sustainable development, and sustainable transportation. Cities should respect nature, consider the urban ecological environment as an asset, integrate environmental issues into urban planning and administration, and accelerate the transition to sustainable development. This paper reviews current pedestrian and bike transportation in Bursa and proves the effects of unbalanced distribution to neighbourhoods of this presence. In this way creating proposal map for walking and bicycling to constitute a preliminary base for the physical urban planning of Bursa, has been aimed.Keywords: Bursa, proposal map, sustainability, transportation
Procedia PDF Downloads 3353379 An Analysis of Possible Implications of Patent Term Extension in Pharmaceutical Sector on Indian Consumers
Authors: Anandkumar Rshindhe
Abstract:
Patents are considered as good monopoly in India. It is a mechanism by which the inventor is encouraged to do invention and also to make available to the society at large with a new useful technology. Patent system does not provide any protection to the invention itself but to the claims (rights) which the patentee has identified in relation to his invention. Thus the patentee is granted monopoly to the extent of his recognition of his own rights in the form of utilities and all other utilities of invention are for the public. Thus we find both benefit to the inventor and the public at large that is the ultimate consumer. But developing any such technology is not free of cost. Inventors do a lot of investment in the coming out with a new technologies. One such example if of Pharmaceutical industries. These pharmaceutical Industries do lot of research and invest lot of money, time and labour in coming out with these invention. Once invention is done or process identified, in order to protect it, inventors approach Patent system to protect their rights in the form of claim over invention. The patent system takes its own time in giving recognition to the invention as patent. Even after the grant of patent the pharmaceutical companies need to comply with many other legal formalities to launch it as a drug (medicine) in market. Thus major portion in patent term is unproductive to patentee and whatever limited period the patentee gets would be not sufficient to recover the cost involved in invention and as a result price of patented product is raised very much, just to recover the cost of invent. This is ultimately a burden on consumer who is paying more only because the legislature has failed to provide for the delay and loss caused to patentee. This problem can be effectively remedied if Patent Term extension is done. Due to patent term extension, the inventor gets some more time in recovering the cost of invention. Thus the end product is much more cheaper compared to non patent term extension.The basic question here arises is that when the patent period granted to a patentee is only 20 years and out of which a major portion is spent in complying with necessary legal formalities before making the medicine available in market, does the company with the limited period of monopoly recover its investment made for doing research. Further the Indian patent Act has certain provisions making it mandatory on the part of patentee to make its patented invention at reasonable affordable price in India. In the light of above questions whether extending the term of patent would be a proper solution and a necessary requirement to protect the interest of patentee as well as the ultimate consumer. The basic objective of this paper would be to check the implications of Extending the Patent term on Indian Consumers. Whether it provides the benefits to the patentee, consumer or a hardship to the Generic industry and consumer.Keywords: patent term extention, consumer interest, generic drug industry, pharmaceutical industries
Procedia PDF Downloads 4513378 Comparison of the Material Response Based on Production Technologies of Metal Foams
Authors: Tamas Mankovits
Abstract:
Lightweight cellular-type structures like metal foams have excellent mechanical properties, therefore the interest in these materials is widely spreading as load-bearing structural elements, e.g. as implants. Numerous technologies are available to produce metal foams. In this paper the material response of closed cell foam structures produced by direct foaming and additive technology is compared. The production technology circumstances are also investigated. Geometrical variations are developed for foam structures produced by additive manufacturing and simulated by finite element method to be able to predict the mechanical behavior.Keywords: additive manufacturing, direct foaming, finite element method, metal foam
Procedia PDF Downloads 1973377 An Exploration of Cyberspace Security, Strategy for a New Era
Authors: Laxmi R. Kasaraneni
Abstract:
The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security
Procedia PDF Downloads 2943376 Investigation on Mechanical Properties of a Composite Material of Olive Flour Wood with a Polymer Matrix
Authors: Slim Souissi, Mohamed Ben Amar, Nesrine Bouhamed, Pierre Marechal
Abstract:
The bio-composites development from biodegradable materials and natural fibers has a growing interest in the science of composite materials. The present work was conducted as part of a cooperation project between the Sfax University and the Havre University. This work consists in developing and monitoring the properties of a composite material of olive flour wood with a polymer matrix (urea formaldehyde). For this, ultrasonic non-destructive and destructive methods of characterization were used to optimize the mechanical and acoustic properties of the studied material based on the elaboration parameters.Keywords: bio-composite, olive flour wood, polymer matrix, ultrasonic methods, mechanical properties
Procedia PDF Downloads 4943375 A Genetic Algorithm Approach for Multi Constraint Team Orienteering Problem with Time Windows
Authors: Uyanga Sukhbaatar, Ahmed Lbath, Mendamar Majig
Abstract:
The Orienteering Problem is the most known example to start modeling tourist trip design problem. In order to meet tourist’s interest and constraint the OP is becoming more and more complicate to solve. The Multi Constraint Team Orienteering Problem with Time Windows is the last extension of the OP which differentiates from other extensions by including more extra associated constraints. The goal of the MCTOPTW is maximizing tourist’s satisfaction score in same time not to violate any of these constraints. This paper presents a genetic algorithmic approach to tackle the MCTOPTW. The benchmark data from literature is tested by our algorithm and the performance results are compared.Keywords: multi constraint team orienteering problem with time windows, genetic algorithm, tour planning system
Procedia PDF Downloads 6263374 Microwave Assisted Extraction (MAE) of Castor Oil from Castor Bean
Authors: Ghazi Faisal Najmuldeen, Rosli Mohd Yunus, Nurfarahin Bt Harun, Mardhiana Binti Ismail
Abstract:
The microwave extraction has attracted great interest among the researchers. The main virtue of the microwave technique is cost-effective, time saving and simple handling procedure. Castor beans was chosen because of its high content in fatty acid, especially ricinoleic acid. The purpose of this research is to extract the castor oil by using the microwave assisted extraction (MAE) using ethanol as solvent and to investigate the influence of extraction time on castor oil yield and to characterize the main composition of the produced castor oil by using the GC-MS. It was found that there is a direct dependence between the oil yield and the time of extraction as it increases from 45% to 58% as the time increase from 10 min to 60 min. The major components of castor oil detected by GC-MS were ricinoleic acid, linoleic acid and oleic acid.Keywords: microwave assisted extraction (MAE), castor oil, ricinoleic acid, linoleic acid
Procedia PDF Downloads 5053373 Analyzing Keyword Networks for the Identification of Correlated Research Topics
Authors: Thiago M. R. Dias, Patrícia M. Dias, Gray F. Moita
Abstract:
The production and publication of scientific works have increased significantly in the last years, being the Internet the main factor of access and distribution of these works. Faced with this, there is a growing interest in understanding how scientific research has evolved, in order to explore this knowledge to encourage research groups to become more productive. Therefore, the objective of this work is to explore repositories containing data from scientific publications and to characterize keyword networks of these publications, in order to identify the most relevant keywords, and to highlight those that have the greatest impact on the network. To do this, each article in the study repository has its keywords extracted and in this way the network is characterized, after which several metrics for social network analysis are applied for the identification of the highlighted keywords.Keywords: bibliometrics, data analysis, extraction and data integration, scientometrics
Procedia PDF Downloads 2573372 Multi-Functional Metal Oxides as Gas Sensors, Photo-Catalysts and Bactericides
Authors: Koyar Rane
Abstract:
Nano- to submicron size particles of narrow particle size distribution of semi-conducting TiO₂, ZnO, NiO, CuO, Fe₂O₃ have been synthesized by novel hydrazine method and tested for their gas sensing, photocatalytic and bactericidal activities and the behavior found to be enhanced when the oxides in the thin film forms, that obtained in a specially built spray pyrolysis reactor. Hydrazine method is novel in the sense, say, the UV absorption edge of the white pigment grade wide band gap (~3.2eV) TiO₂ and ZnO shifted to the visible region turning into yellowish particles, indicating modification occurring the band structure. The absorption in the visible region makes these oxides visible light sensitive photocatalysis in degrading pollutants, especially the organic dyes which otherwise increase the chemical oxygen demand of the drinking water, enabling the process feasible not under the harsh energetic UV radiation regime. The electromagnetic radiations on irradiation produce electron-hole pairs Semiconductor + hν → e⁻ + h⁺ The electron-hole pairs thus produced form Reactive Oxygen Species, ROS, on the surface of the semiconductors, O₂(adsorbed)+e⁻ → O₂• - superoxide ion OH-(surface)+h⁺ →•OH - Hydroxyl radical The ROS attack the organic material and micro-organisms. Our antibacterial studies indicate the metal oxides control the Biological Oxygen Demand (BOD) of drinking water which had beyond the safe level normally found in the municipal supply. Metal oxides in the thin film form show overall enhanced properties and the films are reusable. The results of the photodegradation and antibactericidal studies are discussed. Gas sensing studies too have been done to find the versatility of the multifunctional metal oxides.Keywords: hydrazine method, visible light sensitive, photo-degradation of dyes, water/airborne pollutant
Procedia PDF Downloads 1633371 Mutational Analysis of DNase I Gene in Diabetic Patients
Authors: Hateem Zafar Kayani, Nageen Hussain
Abstract:
The main aim is to analyze the mutations of DNASE I gene in diabetic patients. A total of 120 diabetes patients and 120 controls were sampled. The total number of male diabetic patients included in the study was 79 (66%) while female patients were 41 (34%) in number. Exon 8 of the DNASE I gene was amplified by using thermo cycler. The possible band of interest was located at 165 base pairs. Two samples showed similar missense mutations at 127th position of exon 8 which replaced amino acid Arginine (Arg) to Glutamine (Gln). All controls showed no mutations. The association of diabetes with different levels of blood pressure and body mass index (BMI) were found to be significant.Keywords: deoxyribonuclease I, polymerase chain reaction, insulin-dependent diabetes mellitus, non-insulin dependent diabetes mellitus
Procedia PDF Downloads 3253370 Lobbying Regulation in the EU: Transparency’s Achilles’ Heel
Authors: Krambia-Kapardis Maria, Neophytidou Christina
Abstract:
Lobbying is an inherent aspect within the democratic regimes across the globe. Although it can provide decision-makers with valuable knowledge and grant access to stakeholders in the decision-making process, it can also lead to undue influence and unfair competition at the expense of the public interest if it not transparent. Given the multi-level governance structure of the EU, it is no surprise that the EU policy-making arena has become a place-to-be for lobbyists. However, in order to ensure that influence is legitimate and not biased of any business interests, lobbying must be effectively regulated. A comparison with the US and Canadian lobbying regulatory framework and utilising some good practices from EU countries it is apparent that lobbying is the Achilles’ heel to transparency in the EU. It is evident that EU institutions suffer from ineffective regulations and could in fact benefit from a more robust, mandatory and better implemented system of lobbying regulation.Keywords: EU, lobbying regulation, transparency, democratic regimes
Procedia PDF Downloads 4223369 Stable Isotope Analysis of Faunal Remains of Ancient Kythnos Island for Paleoenvironmental Reconstruction
Authors: M. Tassi, E. Dotsika, P. Karalis, A. Trantalidou, A. Mazarakis Ainian
Abstract:
The Kythnos Island in Greece is of particular archaeological interest, as it has been inhabited from the 12th BC until the 7th AD. From island excavations, numerous faunal and human skeletal remains have been recovered. This work is the first attempt at the paleoenvironmental reconstruction of the island via stable isotope analysis. Specifically, we perform 13C and 18O isotope analysis in faunal bone apatite in order to investigate the climate conditions that prevailed in the area. Additionally, we conduct 13C and 15N isotope analysis in faunal bone collagen, which will constitute the baseline for the subsequent diet reconstruction of the ancient Kythnos population.Keywords: stable isotopes analysis, bone collagen stable isotope analysis, bone apatite stable isotope analysis, paleodiet, palaeoclimate
Procedia PDF Downloads 1443368 A Privacy Protection Scheme Supporting Fuzzy Search for NDN Routing Cache Data Name
Authors: Feng Tao, Ma Jing, Guo Xian, Wang Jing
Abstract:
Named Data Networking (NDN) replaces IP address of traditional network with data name, and adopts dynamic cache mechanism. In the existing mechanism, however, only one-to-one search can be achieved because every data has a unique name corresponding to it. There is a certain mapping relationship between data content and data name, so if the data name is intercepted by an adversary, the privacy of the data content and user’s interest can hardly be guaranteed. In order to solve this problem, this paper proposes a one-to-many fuzzy search scheme based on order-preserving encryption to reduce the query overhead by optimizing the caching strategy. In this scheme, we use hash value to ensure the user’s query safe from each node in the process of search, so does the privacy of the requiring data content.Keywords: NDN, order-preserving encryption, fuzzy search, privacy
Procedia PDF Downloads 4843367 Quality and Qualitative Education for All, Panacea for Insecurity and Political Unrest in Nigeria
Authors: Babatunde Joel Todowede
Abstract:
It is a public knowledge that lack of quality and qualitative education breeds problems besetting Nigeria as a nation today. This paper entitled “Quality and Qualitative Education for all, panacea for insecurity and political unrest in Nigeria” seeks to explore how quality and qualitative education for all will tends to put an end to insecurity and political unrest in Nigeria as a Nation. It may be pertinent to note at this juncture that the development of any modern society or nation is primarily hinged on the functionality of its educational system. There is no developed nation in the world today, which does not owe its advancement to quality and qualitative education. In other words, Education is a vital instrument in the nation’s economic competitiveness, in its people, and in its communities. Hence, Education is not luxury to be cut in difficult economic times – it is an essential element of growth. In fact, education is the bedrock of any society that hopes to be numbered among the developed economies in the world. Nigeria, as a nation, has made continual efforts to assume its rightful place in education on the African continent, but has not been quite lucky. Interestingly however, Quality and Qualitative Education for all will come about if all stakeholders in the Education Sector perform their roles with skill and efficiency. Education is a very sensitive area, hence, needs to be passionate about education, and focused on building a future for the sector.” Quality and qualitative education instill significant core values in every student, which shape them into mature, caring and independent individuals. These values include commitment, collaboration, integrity, responsibility and respect. By imbibing these values in every aspect of their life, they are able to contribute their skills and talents while supporting each other in attaining their lifelong goals. This paper identified lack of proper education as the bane of insecurity and political unrest in the Country and urged the government to review the policy in a way that there will be quality and standard to check insurgency in the Country. More so, until the fallen standard of education in Nigeria is fixed to engage out of school children, the incessant attack on innocent Nigerians, particularly in the North East may get worse.Keywords: quality and qualitative education, panacea, insecurity, political unrest
Procedia PDF Downloads 4633366 Biological Applications of CNT Inherited Polyaniline Nano-Composites
Authors: Yashfeen Khan, Anees Ahmad
Abstract:
In the last few decades, nano-composites have been the topic of interest. Presently, the modern era enlightens the synthesis of hybrid nano-composites over their individual counterparts because of higher application potentials and synergism. Recently, CNT hybrids have demonstrated their pronounced capability as effective sorbents for the removal of heavy metal ions (the root trouble) and organic contaminants due to their high specific surface area, enhanced reactivity, and sequestration characteristics. The present abstract discusses removal efficiencies of organic, inorganic pollutants through CNT/PANI/ composites. It also represents the widespread applications of CNT like monitoring biological systems, biosensors, as heat resources for treating cancer, fire retardant applications of polymer/CNT composites etc. And considering the same, this article aims to brief the scenario of CNT-PANI nano-composites.Keywords: biosensors, CNT, hybrids, polyaniline, synergism
Procedia PDF Downloads 3773365 The Efficiency of the Use of Medical Bilingual Dictionary in English Language Teaching in Vocational College
Authors: Zorana Jurinjak, Christos Alexopoulos
Abstract:
The aim of this paper is to examine the effectiveness of using a medical bilingual dictionary in teaching English in a vocational college. More precisely, to what extent the use of bilingual medical dictionary in relation to the use of Standard English bilingual dictionaries influences the results on tests, and thus the acquisition of better competence of students mastering the subject terminology. Secondary interest in this paper would be to raise awareness among students and teachers about the advantages of dictionary use. The experiment was conducted at College of Applied Health Sciences in Ćuprija on a sample of 90 students. The respondents translated three medical texts with 42 target terms. Statistical analyses of the data obtained show that the differences in average time and correct answers favor the students who used medical dictionary.Keywords: bilingual medical dictionary, standard english bilingual dictionary, medical terminology, EOS, ESP
Procedia PDF Downloads 1103364 Wash Fastness of Textile Fibers Dyed with Natural Dye from Eucalyptus Wood Steaming Waste
Authors: Ticiane Rossi, Maurício C. Araújo, José O. Brito, Harold S. Freeman
Abstract:
Natural dyes are gaining interest due their expected low risk to human health and to the environment. In this study, the wash fastness of a natural coloring matter from the liquid waste produced in the steam treatment of eucalyptus wood in textile fabrics was investigated. Specifically, eucalyptus wood extract was used to dye cotton, nylon and wool in an exhaust dyeing process without the addition of the traditional mordanting agents and then submitted to wash fastness analysis. The resulting dyed fabrics were evaluated for color fastness. It was found that wash fastness of dyed fabrics was very good to cotton and excellent to nylon and wool.Keywords: eucalyptus, natural dye, textile fibers, wash fastness
Procedia PDF Downloads 6143363 Automatic Threshold Search for Heat Map Based Feature Selection: A Cancer Dataset Analysis
Authors: Carlos Huertas, Reyes Juarez-Ramirez
Abstract:
Public health is one of the most critical issues today; therefore, there is great interest to improve technologies in the area of diseases detection. With machine learning and feature selection, it has been possible to aid the diagnosis of several diseases such as cancer. In this work, we present an extension to the Heat Map Based Feature Selection algorithm, this modification allows automatic threshold parameter selection that helps to improve the generalization performance of high dimensional data such as mass spectrometry. We have performed a comparison analysis using multiple cancer datasets and compare against the well known Recursive Feature Elimination algorithm and our original proposal, the results show improved classification performance that is very competitive against current techniques.Keywords: biomarker discovery, cancer, feature selection, mass spectrometry
Procedia PDF Downloads 3383362 Using the Structural Equation Model to Explain the Effect of Supervisory Practices on Regulatory Density
Authors: Jill Round
Abstract:
In the economic system, the financial sector plays a crucial role as an intermediary between market participants, other financial institutions, and customers. Financial institutions such as banks have to make decisions to satisfy the demands of all the participants by keeping abreast of regulatory change. In recent years, progress has been made regarding frameworks, development of rules, standards, and processes to manage risks in the banking sector. The increasing focus of regulators and policymakers placed on risk management, corporate governance, and the organization’s culture is of special interest as it requires a well-resourced risk controlling function, compliance function, and internal audit function. In the past years, the relevance of these functions that make up the so-called Three Lines of Defense has moved from the backroom to the boardroom. The approach of the model can vary based on the various organizational characteristics. Due to the intense regulatory requirements, organizations operating in the financial sector have more mature models. In less regulated industries there is more cloudiness about what tasks are allocated where. All parties strive to achieve their objectives through the effective management of risks and serve the identical stakeholders. Today, the Three Lines of Defense model is used throughout the world. The research looks at trends and emerging issues in the professions of the Three Lines of Defense within the banking sector. The answers are believed to helping to explain the increasing regulatory requirements for the banking sector. While the number of supervisory practices increases the risk management requirements intensify and demand more regulatory compliance at the same time. The Structural Equation Modeling (SEM) is applied by making use of conducted surveys in the research field. It aims to describe (i) the theoretical model regarding the applicable linearity relationships, (ii) the causal relationship between multiple predictors (exogenous) and multiple dependent variables (endogenous), (iii) taking into consideration the unobservable variables and (iv) the measurement errors. The surveys conducted on the research field suggest that the observable variables are caused by various latent variables. The SEM consists of the 1) measurement model and the 2) structural model. There is a detectable correlation regarding the cause-effect relationship among the performed supervisory practices and the increasing scope of regulation. Supervisory practices reinforce the regulatory density. In the past, controls were placed after supervisory practices were conducted or incidents occurred. In further research, it is of interest to examine, whether risk management is proactive, reactive to incidents and supervisory practices or can be both at the same time.Keywords: risk management, structural equation model, supervisory practice, three lines of defense
Procedia PDF Downloads 2243361 Coordinated Voltage Control in a Radial Distribution System
Authors: Shivarudraswamy, Anubhav Shrivastava, Lakshya Bhat
Abstract:
Distributed generation has indeed become a major area of interest in recent years. Distributed Generation can address large number of loads in a power line and hence has better efficiency over the conventional methods. However there are certain drawbacks associated with it, increase in voltage being the major one. This paper addresses the voltage control at the buses for an IEEE 30 bus system by regulating reactive power. For carrying out the analysis, the suitable location for placing distributed generators (DG) is identified through load flow analysis and seeing where the voltage profile is dipping. MATLAB programming is used to regulate the voltage at all buses within +/-5% of the base value even after the introduction of DG’s. Three methods for regulation of voltage are discussed. A sensitivity based analysis is later carried out to determine the priority among the various methods listed in the paper.Keywords: distributed generators, distributed system, reactive power, voltage control
Procedia PDF Downloads 5003360 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network
Authors: Abdulaziz Alsadhan, Naveed Khan
Abstract:
In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)
Procedia PDF Downloads 3673359 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems
Authors: Borhan Marzougui
Abstract:
Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.Keywords: IoT, DDoS, attacks, botnet, security, agents
Procedia PDF Downloads 1433358 Online Teaching Methods and Student Satisfaction during a Pandemic
Authors: Anita Kéri
Abstract:
With the outbreak of the global pandemic of COVID-19, online education characterizes today’s higher education. For some higher education institutions (HEIs), the shift from classroom education to online solutions was swift and smooth, and students are continuously asked about their experience regarding online education. Therefore, there is a growing emphasis on student satisfaction with online education, a field that had emerged previously, but has become the center of higher education and research interest today. The aim of the current paper is to give a brief overview of the tools used in the online education of marketing-related classes at the examined university and to investigate student satisfaction with the applied teaching methodologies with the tool of a questionnaire. Results show that students are most satisfied with their teachers’ competences and preparedness, while they are least satisfied with online class quality, where it seems that further steps are needed to be taken.Keywords: netnography, online teaching, pandemic, satisfaction
Procedia PDF Downloads 163