Search results for: safety and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5896

Search results for: safety and security

4516 The Food Security and Nutritional Diversity Impacts of Coupling Rural Infrastructure and Value Chain Development: Evidence from a Generalized Propensity Score Analysis

Authors: Latif Apaassongo Ibrahim, Owusu-Addo Ebenezer, Isaac Bonuedo

Abstract:

Structural barriers - including inadequate infrastructure, poor market linkages, and limited access to financial and extension services - have been the major constraints to improved welfare in the semi-arid regions of Ghana; food insecurity and malnutrition are persistent. The effects of infrastructural improvements as countermeasures are often misdirected by confounding effects of other economic, social, and environmental variables. This study applies Directed Acyclic Graphs (DAGs) to map the causal pathways between infrastructure development and household welfare, identifying key mediators and confounders for one such initiative in Ghana. Then, using Generalized Propensity Score (GPS) and Doubly Robust Estimation (IPWRA), this study evaluates the differential roles of government-supported infrastructure improvements in access and intensity of commercial relative to public infrastructure, on household food security and women’s nutritional diversity given three major value-chain improvements. The main findings suggest that these infrastructure improvements positively impact food security and nutrition, with women’s empowerment and nutritional education acting as key mediators. Market access emerged as a stronger causal mechanism relative to productivity gains in linking infrastructure to improved welfare. Membership in Farmer-Based Organizations (FBOs) and participation in agribusiness linkages further amplified these impacts. However, the effects of infrastructure improvements were less clear when combined with the adoption of climate resilience practices, suggesting potential trade-offs.

Keywords: food security, nutrition, infrastructure, market access, women's empowerment, farmer-based organizations, climate resilience, Ghana

Procedia PDF Downloads 20
4515 A Comprehensive Analysis of Factors Leading to Fatal Road Accidents in France and Its Overseas Territories

Authors: Bouthayna Hayou, Mohamed Mouloud Haddak

Abstract:

In road accidents in French overseas territories have been understudied, with relevant data often collected late and incompletely. Although these territories account for only 3% to 4% of road traffic injuries in France, their unique characteristics merit closer attention. Despite lower mobility and, consequently, lower exposure to road risks, the actual road risk in Overseas France is as high or even higher than in Metropolitan France. Significant disparities exist not only between Metropolitan France and Overseas territories but also among the overseas territories themselves. The varying population densities in these regions do not fully explain these differences, as each territory has its own distinct vulnerabilities and road safety challenges. This analysis, based on BAAC data files from 2005 to 2018 for both Metropolitan France and the overseas departments and regions, examines key variables such as gender, age, type of road user, type of obstacle hit, type of trip, road category, traffic conditions, weather, and location of accidents. Logistic regression models were built for each region to investigate the risk factors associated with fatal road accidents, focusing on the probability of being killed versus injured. Due to insufficient data, Mayotte and the Overseas Communities (French Polynesia and New Caledonia) were not included in the models. The findings reveal that road safety is worse in the overseas territories compared to Metropolitan France, particularly for vulnerable road users such as pedestrians and motorized two-wheelers. These territories present an accident profile that sits between that of Metropolitan France and middle-income countries. A pressing need exists to standardize accident data collection between Metropolitan and Overseas France to allow for more detailed comparative analyses. Further epidemiological studies could help identify the specific road safety issues unique to each territory, particularly with regard to socio-economic factors such as social cohesion, which may influence road safety outcomes. Moreover, the lack of data on new modes of travel, such as electric scooters, and the absence of socio-economic details of accident victims complicate the evaluation of emerging risk factors. Additional research, including sociological and psychosocial studies, is essential for understanding road users' behavior and perceptions of road risk, which could also provide valuable insights into accident trends in peri-urban areas in France.

Keywords: multivariate logistic regression, overseas France, road safety, road traffic accident, territorial inequalities

Procedia PDF Downloads 17
4514 Predictors of Recent Work-Related Injury in a Rapidly Developing Country: Results from a Worker Survey in Qatar

Authors: Ruben Peralta, Sam Thomas, Nazia Hirani, Ayman El-Menyar, Hassan Al-Thani, Mohammed Al-Thani, Mohammed Al-Hajjaj, Rafael Consunji

Abstract:

Moderate to severe work-related injuries [WRI's] are a leading cause of trauma admission in Qatar but information on risk factors for their incidence are lacking. This study aims to document and analyze the predictive characteristics for WRI to inform the creation of targeted interventions to improve worker safety in Qatar. This study was conducted as part of the NPRP grant # 7 - 1120 - 3 - 288, titled "A Unified Registry for Occupational Injury Prevention in Qatar”. 266 workers were interviewed using a standard questionnaire, during ‘World Day for Safety and Health at Work’, a Ministry of Public Health event, none refused interview. Nurses and doctors from the Hamad Trauma Center conducted the interviews. Questions were translated into the worker’s native language when it was deemed necessary. Standard information on epidemiologic characteristics and incidence of work-related injury were collected and compared between nationalities and those injured versus those not injured. 262 males and 4 females were interviewed. 17 [6.4%] reported a WRI in the last 24 months. More than half of the injured worked in construction [59%] followed by water supply [11.8%]. Factors significantly associated with recent injury were: Working for a company with > 500 employees and speaking Hindi. Protective characteristics included: Being from the Philippines or Sri Lanka, speaking Arabic, working in healthcare, an office or trading and company size between 100-500 employees. Years of schooling and working in Qatar were not predictive factor for WRI. The findings from this survey should guide future research that will better define worker populations at an increased risk for WRI and inform recruiters and sending countries. A focus on worker language skills, interventions in the construction industry and occupational safety in large companies is needed.

Keywords: occupational injury, prevention, safety, trauma, work related injury

Procedia PDF Downloads 326
4513 Analysis of Road Accidents in India 2016 to 2021

Authors: Ajin Frank J., Shridevi Jeevan Kamble

Abstract:

The primary objective of this research paper is to identify significant patterns and insights in road accident data in India spanning from 2016 to 2021. The study reveals that the frequency of accidents, injuries, and fatalities varies depending on numerous factors such as the type of vehicle, time of accidents, age of the vehicle, age and gender of the driver, among others. Notably, the COVID-19 pandemic and subsequent lockdown measures have significantly impacted these figures. One of the key findings of the analysis is the rise in the number of accidents and deaths involving two-wheeler vehicles, particularly among younger individuals, in major states across India. This trend is of concern, and there is a need for increased awareness and precautions to prevent these types of accidents. Additionally, with the imminent rise of electric vehicles in the coming years, ensuring their safety on the road is a critical matter. Another significant factor contributing to road accidents is the age of vehicles. As vehicles age, their handling becomes more challenging compared to new ones, increasing the risk of accidents. Thus, it is imperative for the government to impose stringent regulations and laws to reduce these accident-causing factors and raise awareness among individuals about taking necessary precautions to avoid accidents. This study highlights the importance of understanding the underlying patterns and factors contributing to road accidents in India. Through this knowledge, policymakers and stakeholders can develop effective strategies to address these challenges and promote road safety, ultimately reducing the number of accidents, injuries, and fatalities on Indian roads.

Keywords: road accidents, India, road safety, accident deaths

Procedia PDF Downloads 88
4512 Evaluation of Manual and Automatic Calibration Methods for Digital Tachographs

Authors: Sarp Erturk, Levent Eyigel, Cihat Celik, Muhammet Sahinoglu, Serdar Ay, Yasin Kaya, Hasan Kaya

Abstract:

This paper presents a quantitative analysis on the need for automotive calibration methods for digital tachographs. Digital tachographs are mandatory for vehicles used in people and goods transport and they are an important aspect for road safety and inspection. Digital tachographs need to be calibrated for workshops in order for the digital tachograph to display and record speed and odometer values correctly. Calibration of digital tachographs can be performed either manual or automatic. It is shown in this paper that manual calibration of digital tachographs is prone to errors and there can be differences between manual and automatic calibration parameters. Therefore automatic calibration methods are imperative for digital tachograph calibration. The presented experimental results and error analysis clearly support the claims of the paper by evaluating and statistically comparing manual and automatic calibration methods.

Keywords: digital tachograph, road safety, tachograph calibration, tachograph workshops

Procedia PDF Downloads 337
4511 The Effect of Artificial Intelligence on Finance, Banking and Insurance

Authors: Sherine Shahat Abdelnour Bastourous

Abstract:

Banking and monetary offerings are rapidly transitioning from being monolithic structures focusing simply on their personal economic services to becoming integrated gamers in a couple of customer journeys and delivery chains. Banks themselves are refocusing on being liquidity carriers and underwriters in those networks, whilst the overall idea of ‘embeddedness’ builds on the market conveniently available API (software Programming Interface) architectures to flexibly supply services to numerous requestors, i.e., online shops who want finance and insurance products to better serve their clients, respectively. With this flexibility come new necessities for more advantageous cybersecurity. API structures are greater decentralized and inherently vulnerable to trade. lamentably, this has now not been comprehensively addressed inside the literature. This paper attempts to fill this hole through looking at security tactics and technology relevant to API architectures found in embedded finance. After offering the research method implemented and introducing the essential bodies of understanding worried, the paper will speak six dominating era developments shaping excessive-degree monetary services architectures. Ultimately, embedded finance and the respective usage of API techniques might be described. building in this, safety concerns for APIs in monetary and insurance offerings will be elaborated on earlier than concluding with a few ideas for viable similar studies.

Keywords: finance, non-interest, sustainability, enlightenment health, out of pocket expenditure, universal healthcare

Procedia PDF Downloads 12
4510 The Impact of Improved Grain Storage Technology on Marketing Behaviour and Livelihoods of Maize Farmers: A Randomized Controlled Trial in Ethiopia

Authors: Betelhem M. Negede, Maarten Voors, Hugo De Groote, Bart Minten

Abstract:

Farmers in Ethiopia produce most of their own food during one agricultural season per year. Therefore, they need to use on-farm storage technologies to bridge the lean season and benefit from price arbitrage. Maize stored using traditional storage bags offer no protection from insects and molds, leading to high storage losses. In Ethiopia access to and use of modern storage technologies are still limited, restraining farmers to benefit from local maize price fluctuations. We used a randomized controlled trial among 871 maize farmers to evaluate the impacts of Purdue Improved Crop Storage (PICS) bags, also known as hermetic bags, on storage losses, and especially on behavioral changes with respect to consumption, marketing, and income among maize farmers in Ethiopia. This study builds upon the limited previous experimental research that has tried to understand farmers’ grain storage and post-harvest losses and identify mechanisms behind the persistence of these challenges. Our main hypothesis is that access to PICS bags allows farmers to increase production, storage and maize income. Also delay the length of maize storage, reduce maize post-harvest losses and improve their food security. Our results show that even though farmers received only three PICS bags that represent 10percent of their total maize stored, they delay their length of maize storage for sales by two weeks. However, we find no treatment effect on maize income, suggesting that the arbitrage of two weeks is too small. Also, we do not find any reduction in storage losses due to farmers’ reaction by selling early and by using cheap and readily available but potentially harmful storage chemicals. Looking at the heterogeneity treatment effects between the treatment variable and highland and lowland villages, we find a decrease in the percentage of maize stored by 4 percent in the highland villages. This confirms that location specific factors, such as agro-ecology and proximity to markets are important factors that influence whether and how much of the harvest a farmer stores. These findings highlight the benefits of hermetic storage bags, by allowing farmers to make inter-temporal arbitrage and by reducing potential health risks from storage chemicals. The main policy recommendation that emanates from our study is that postharvest losses reduction throughout the whole value chain is an important pathway to food and income security in Sub-Saharan Africa (SSA). However, future storage loss interventions with hermetic storage technologies should take into account the agro-ecology of the study area and quantify storage losses beyond farmers self-reported losses, such as the count and weigh method. Finally, studies on hermetic storage technologies indicate positive impacts on post-harvest losses and in improving food security, but the adoption and use of these technologies is currently still low in SSA. Therefore, future works on the scaling up of hermetic bags, should consider reasons why farmers only use PICS bags to store grains for consumption, which is usually related to a safety-first approach or due to lack of incentives (higher price from maize not treated with chemicals), and no grain quality check.

Keywords: arbitrage, PICS hermetic bags, post-harvest storage loss, RCT

Procedia PDF Downloads 142
4509 Fracking the UK's Shale Gas Regulatory Regime

Authors: Yanal Abul Failat

Abstract:

The production of oil and natural gas from shale formations is becoming a trend, and many countries with technically and economically recoverable unconventional resources are endeavoring to explore how shale formations may benefit the economy and achieve energy security. The trajectory of shale gas development in the UK is highly supported by the government; in the Gas Generation Strategy Paper published by the UK government on 5 December 2013, it is recognized that the shale gas production would decrease reliance on imports and thus enhance the UK’s energy security. Moreover, the UK Institute of Directors report on UK Shale Gas Potential explains that in the UK there is a potential of production peaking at around 1.13 trillion cubic feet (“tcf”) and a sector that could support around 70,000 jobs and secure net benefit to the Treasury in tax revenues. On this basis, there has been a growing interest in the benefits of exploring the UK’s shale gas but a combination of technical challenges faced in shale gas operations, a stern opposition by environmentalists and concerns on the adequacy of the legal framework have slowed the progress of the emerging UK shale industry.

Keywords: shale gas, UK, legal, oil and gas, energy

Procedia PDF Downloads 714
4508 Simulation of Cybersecurity Attacks and Detection Using Machine Learning Techniques with Virtual Local Area Networks Integration

Authors: Sankenth Jalwad, Satyam, Suteerth Kalkeri, Vidula L. S., Geetha Dayalan

Abstract:

In today’s cyber landscape, threats are emerging every single day; they are much more advanced and dynamic than in the past within this cyber landscape. This project focuses on Virtual Local Area Networks or VLANs. VLANs provide the compartmentalization of sensitive information and optimal management of traffic but introduce specific vulnerabilities. Attackers also target VLAN configurations for exploitation of some security holes, such as VLAN hopping. The aim is to deal with such security requirements by developing a machine learning-based IDS for the VLAN environment that identifies in real time the patterns and anomalies signifying possible attacks. Apart from the IDS, it also looks at the generation of cyberattack datasets specific to VLANs with the help of Wireshark that will help train the ML model.

Keywords: cybersecurity, machine learning, VLAN networks, DTP, STP

Procedia PDF Downloads 10
4507 Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations

Authors: Sadiq Nasir

Abstract:

The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture.

Keywords: cybersecurity, cybersecurity awareness, human factor in security, human security

Procedia PDF Downloads 91
4506 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 122
4505 Comparative Analysis between Wired and Wireless Technologies in Communications: A Review

Authors: Jafaru Ibrahim, Tonga Agadi Danladi, Haruna Sani

Abstract:

Many telecommunications industry are looking for new ways to maximize their investment in communication networks while ensuring reliable and secure information transmission. There is a variety of communications medium solutions, the two must popularly in used are wireless technology and wired options, such as copper and fiber-optic cable. Wired network has proven its potential in the olden days but nowadays wireless communication has emerged as a robust and most intellect and preferred communication technique. Each of these types of communication medium has their advantages and disadvantages according to its technological characteristics. Wired and wireless networking has different hardware requirements, ranges, mobility, reliability and benefits. The aim of the paper is to compare both the Wired and Wireless medium on the basis of various parameters such as usability, cost, efficiency, flexibility, coverage, reliability, mobility, speed, security etc.

Keywords: cost, mobility, reliability, speed, security, wired, wireless

Procedia PDF Downloads 475
4504 The Analysis of Increment of Road Traffic Accidents in Libya: Case Study City of Tripoli

Authors: Fares Elturki, Shaban Ismael Albrka Ali Zangena, H. A. M. Yahia

Abstract:

Safety is an important consideration in the design and operation of streets and highways. Traffic and highway engineers working with law enforcement officials are constantly seeking for better methods to ensure safety for motorists and pedestrians. Also, a highway safety improvement process involves planning, implementation, and evaluation. The planning process requires that engineers collect and maintain traffic safety data, identify the hazards location, conduct studies and establish project priorities. Unfortunately, in Libya, the increase in demand for private transportation in recent years, due to poor or lack of public transportation led to some traffic problems especially in the capital (Tripoli). Also, the growth of private transportation has significant influences on the society regarding road traffic accidents (RTAs). This study investigates the most critical factors affect RTAs in Tripoli the capital city of Libya. Four main classifications were chosen to build the questionnaire, namely; human factors, road factors, vehicle factors and environmental factors. Moreover, a quantitative method was used to collect the data from the field, the targeted sample size 400 respondents include; drivers, pedestrian and passengers and relative importance index (RII) were used to rank the factors of one group and between all groups. The results show that the human factors have the most significant impacts compared with other factors. Also, 84% of respondents considered the over speeding as the most significant factor cusses of RTAs while 81% considered the disobedience to driving regulations as the second most influential factor in human factors. Also, the results showed that poor brakes or brake failure factor a great impact on the RTAs among the vehicle factors with nearly 74%, while 79% categorized poor or no street lighting factor as one of the most effective factors on RTAs in road factors and third effecting factor concerning all factors. The environmental factors have the slights influences compared with other factors.

Keywords: road traffic accidents, Libya, vehicle factors, human factors, relative importance index

Procedia PDF Downloads 282
4503 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 130
4502 Privacy for the Internet of Things and its Different Dimensions

Authors: Maryam M Esfahani

Abstract:

The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.

Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies

Procedia PDF Downloads 104
4501 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict

Authors: Christopher Holroyd

Abstract:

With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.

Keywords: human trafficking, reconstruction, security, terrorism

Procedia PDF Downloads 136
4500 Safety Profile of Anti-Retroviral Medicine in South Africa Based on Reported Adverse Drug Reactions

Authors: Sarah Gounden, Mukesh Dheda, Boikhutso Tlou, Elizabeth Ojewole, Frasia Oosthuizen

Abstract:

Background: Antiretroviral therapy (ART) has been effective in the reduction of mortality and resulted in an improvement in the prognosis of HIV-infected patients. However, treatment with antiretrovirals (ARVs) has led to the development of many adverse drug reactions (ADRs). It is, therefore, necessary to determine the safety profile of these medicines in a South African population in order to ensure safe and optimal medicine use. Objectives: The aim of this study was to quantify ADRs experienced with the different ARVs currently used in South Africa, to determine the safety profile of ARV medicine in South Africa based on reported ADRs, and to determine the ARVs with the lowest risk profile based on specific patient populations. Methodology: This was a quantitative study. Individual case safety reports for the period January 2010 – December 2013 were obtained from the National Pharmacovigilance Center; these reports contained information on ADRs, ARV medicine, and patient demographics. Data was analysed to find associations that may exist between ADRs experienced, ARV medicines used and patient demographics. Results: A total of 1916 patient reports were received of which 1534 met the inclusion criteria for the study. The ARV with the lowest risk of ADRs were found to be lamivudine (0.51%, n=12), followed by lopinavir/ritonavir combination (0.8%, n=19) and abacavir (0.64%, n=15). A higher incidence of ADRs was observed in females compared to males. The age group 31–50 years and the weight group 61–80 kg had the highest incidence of ADRs reported. Conclusion: This study found that the safest ARVs to be used in a South African population are lamivudine, abacavir, and the lopinavir/ritonavir combination. Gender differences play a significant role in the occurrence of ADRs and both anatomical and physiological differences account for this. An increased BMI (body mass index) in both men and women showed an increase in the incidence of ADRs associated with ARV therapy.

Keywords: adverse drug reaction, antiretrovirals, HIV/AIDS, pharmacovigilance, South Africa

Procedia PDF Downloads 356
4499 The Pivotal Impact of Optimizing Target Margins and Reducing Setup Errors on Enhancing Clinical Outcomes and Precision in Cervical Cancer Radiotherapy Using Electronical Portal Imagine Device

Authors: Ahlam Azalmad, Younes Elmaadaoui, Mohamed Hilal

Abstract:

Background: This study highlights the impact of optimizing target margins by minimizing setup errors in cervical cancer radiotherapy through electronic portal imaging device, aiming to improve treatment accuracy and patient outcomes. These findings are crucial for refining treatment protocols and enhancing the safety and effectiveness of radiation oncology practices. As a groundbreaking initiative within our department, this work marks a major advancement in treatment optimization and will be disseminated to other radiotherapy centers, encouraging the adoption of consistent and improved radiotherapy practices. Materials and Methods: The study involved 20 cervical cancer patients treated between January 30 and September 30, 2024, using knee and foot fixed supports for immobilization. Treatment setups were verified with electronic portal imaging and delivered via an Elekta linear accelerator to enhance radiotherapy precision. Displacement analysis used bony landmarks to assess setup errors, guiding the calculation of safety margins based on ICRU-62 guidelines and Stroom's and Van Herk's formulas. Results: The study revealed systematic errors of up to 0.22 cm and random errors of 0.74 cm along the X-axis, 0.2 cm and 0.08 cm along the Y-axis, and 0.18 cm and 0.08 cm along the Z-axis. Based on these findings, the calculated CTV-PTV margins for the X, Y, and Z axes were 0.61 cm, 0.57 cm, and 0.51 cm, respectively, using Van Herk’s formula; 0.5 cm, 0.46 cm, and 0.42 cm with Stroom’s formula; and 0.23 cm, 0.22 cm, and 0.2 cm according to ICRU-62 guidelines. Considering these calculations, a 6 mm safety margin is recommended as optimal. Discussion: While electronic portal imaging device improves radiotherapy precision, it has limitations, including limited field of view, difficulty with soft tissue visualization, and insufficient resolution for small errors. Patient variations and setup errors occurring after imaging further complicate safety margin calculations. Time, image quality, and radiation dose concerns also pose challenges. Integrating electronic portal imaging device with advanced imaging techniques like 3D imaging can enhance treatment accuracy. Conclusion: this study highlights the significance of a 6 mm safety margin, showing that image guided verification with electronic portal imaging enhances accuracy, reduces errors, and improves the precision of pelvic radiotherapy.

Keywords: cervical cancer, precision, PTV margins, radiotherapy, setup errors

Procedia PDF Downloads 8
4498 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 373
4497 Statistical Analysis of Failure Cases in Aerospace

Authors: J. H. Lv, W. Z. Wang, S.W. Liu

Abstract:

The major concern in the aviation industry is the flight safety. Although great effort has been put onto the development of material and system reliability, the failure cases of fatal accidents still occur nowadays. Due to the complexity of the aviation system, and the interaction among the failure components, the failure analysis of the related equipment is a little difficult. This study focuses on surveying the failure cases in aviation, which are extracted from failure analysis journals, including Engineering Failure Analysis and Case studies in Engineering Failure Analysis, in order to obtain the failure sensitive factors or failure sensitive parts. The analytical results show that, among the failure cases, fatigue failure is the largest in number of occurrence. The most failed components are the disk, blade, landing gear, bearing, and fastener. The frequently failed materials consist of steel, aluminum alloy, superalloy, and titanium alloy. Therefore, in order to assure the safety in aviation, more attention should be paid to the fatigue failures.

Keywords: aerospace, disk, failure analysis, fatigue

Procedia PDF Downloads 336
4496 Advancing Power Network Maintenance: The Development and Implementation of a Robotic Cable Splicing Machine

Authors: Ali Asmari, Alex Symington, Htaik Than, Austin Caradonna, John Senft

Abstract:

This paper presents the collaborative effort between ULC Technologies and Con Edison in developing a groundbreaking robotic cable splicing machine. The focus is on the machine's design, which integrates advanced robotics and automation to enhance safety and efficiency in power network maintenance. The paper details the operational steps of the machine, including cable grounding, cutting, and removal of different insulation layers, and discusses its novel technological approach. The significant benefits over traditional methods, such as improved worker safety and reduced outage times, are highlighted based on the field data collected during the validation phase of the project. The paper also explores the future potential and scalability of this technology, emphasizing its role in transforming the landscape of power network maintenance.

Keywords: cable splicing machine, power network maintenance, electric distribution, electric transmission, medium voltage cable

Procedia PDF Downloads 68
4495 Building Collapse: Factors and Resisting Mechanisms: A Review of Case Studies

Authors: Genevieve D. Fernandes, Nisha P. Naik

Abstract:

All through the ages in all human civilizations, men have been engaged in construction activity, not only to build their dwellings and house their activities, but also roads, bridges to facilitate means of transport, and communication etc. The main concern in this activity was to ensure safety and reduce the collapse of the buildings and other structures. But even after taking all precautions, it is impossible to guarantee safety and collapse because of several unforeseen reasons like faulty constructions, design errors, overloading, soil liquefaction, gas explosion, material degradation, terrorist attacks and economic factors also contributing to the collapse. It is also uneconomical to design the structure for unforeseen events unless they have a reasonable chance of occurrence. In order to ensure safety and prevent collapse, many guidelines have been framed by local bodies and government authorities in many countries like the United States Department of Defence (DOD), United States General Service Administration (GSA) and Euro-Codes in European Nations. Some other practices are followed to incorporate redundancies in the structure like detailing, ductile designs, tying of elements at particular locations, and provision of hinges and interconnections. It is also to be admitted that a full-proof safe design structure for accidental events cannot be prepared and implemented as it is uneconomical and the chances of such occurrences are less. This paper reviews past case studies of the collapse of structures with the aim of developing an understanding of the collapse mechanism. This study will definitely help to bring about a detailed improvement in the design to maximise the quality of the construction at a minimal cost.

Keywords: unforeseen factors, progressive collapse, collapse resisting mechanisms, column removal scenario

Procedia PDF Downloads 142
4494 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation

Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin

Abstract:

The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.

Keywords: ISMS success factors, IT project management, IS success, information security

Procedia PDF Downloads 318
4493 Risk Assessment of Reinforcement System on Fractured Rock Mass, Gate Shaft Project, Jatigede Dam, Sumedang, West Java, Indonesia

Authors: A. Ardianto, M. A. Putera Agung, S. Pramusandi

Abstract:

Power waterway is one of dam structures and as an intake vertical tunnel or well function for hydroelectric power plants in Jatigede area, Sumedang, West Java. Gate shaft is also one of parts the power waterway system. The paper concerns some consideration in determining a critical state parameter on the back stability analysis of gate shaft or excavation wall stability during excavation. Study analysis was carried out using without and with reinforcement system. Results study showed that reinforcement shaft could reduce the total displacement and safety factor could increases significantly. Based on the back calculation results, it was recommended to install some reinforcement materials and drainage system to reduce pore water pressure.

Keywords: power waterway, reinforcement, displacement, safety

Procedia PDF Downloads 412
4492 Multi-Objective Optimization for Aircraft Fleet Management: A Parametric Approach

Authors: Xin-Yu Li, Dung-Ying Lin

Abstract:

Fleet availability is a crucial indicator for an aircraft fleet. However, in practice, fleet planning involves many resource and safety constraints, such as annual and monthly flight training targets and maximum engine usage limits. Due to safety considerations, engines must be removed for mandatory maintenance and replacement of key components. This situation is known as the "threshold." The annual number of thresholds is a key factor in maintaining fleet availability. However, the traditional method heavily relies on experience and manual planning, which may result in ineffective engine usage and affect the flight missions. This study aims to address the challenges of fleet planning and availability maintenance in aircraft fleets with resource and safety constraints. The goal is to effectively optimize engine usage and maintenance tasks. This study has four objectives: minimizing the number of engine thresholds, minimizing the monthly lack of flight hours, minimizing the monthly excess of flight hours, and minimizing engine disassembly frequency. To solve the resulting formulation, this study uses parametric programming techniques and ϵ-constraint method to reformulate multi-objective problems into single-objective problems, efficiently generating Pareto fronts. This method is advantageous when handling multiple conflicting objectives. It allows for an effective trade-off between these competing objectives. Empirical results and managerial insights will be provided.

Keywords: aircraft fleet, engine utilization planning, multi-objective optimization, parametric method, Pareto optimality

Procedia PDF Downloads 34
4491 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 162
4490 Characterisation of the Physical Properties of Debris and Residual Soils Implications for the Possible Landslides Occurrence on Cililin West Java

Authors: Ikah Ning Prasetiowati Permanasari, Gunawan Handayani, Lilik Hendrajaya

Abstract:

Landslide occurence at Mukapayung, Cililin West Java with material movement downward slope as far as 500m and hit residential areas of the village Nagrog cause eighteen people died and ten homes were destroyed and twenty-three heads of families evacuated. In order to test the hypothesis that soil at the landslides area is prone to landslides, we do drilling and the following tests were taken: particle size distribution, atterberg limits, shear strength, density, shringkage limits and triaxial unconsolidated and consolidated undrained test. Factor of safety was calculated to find out the possibility of subsequent landslides. The value of FOS of three layers is 1,05 which means that the soil in a critical condition and would be imminent to slide if there is disruption from the outside.

Keywords: atterberg limits, particle size distribution, shear strength parameters, slope geometry, factor of safety

Procedia PDF Downloads 155
4489 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer

Abstract:

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Keywords: East Himalaya, local community, wild edible plants, nutrition, food security

Procedia PDF Downloads 266
4488 Localization Mobile Beacon Using RSSI

Authors: Sallama Resen, Celal Öztürk

Abstract:

Distance estimation between tow nodes has wide scope of surveillance and tracking applications. This paper suggests a Bluetooth Low Energy (BLE) technology as a media for transceiver and receiver signal in small indoor areas. As an example, BLE communication technologies used in child safety domains. Local network is designed to detect child position in indoor school area consisting Mobile Beacons (MB), Access Points (AP) and Smart Phones (SP) where MBs stuck in children’s shoes as wearable sensors. This paper presents a technique that can detect mobile beacons’ position and help finding children’s location within dynamic environment. By means of bluetooth beacons that are attached to child’s shoes, the distance between the MB and teachers SP is estimated with an accuracy of less than one meter. From the simulation results, it is shown that high accuracy of position coordinates are achieved for multi-mobile beacons in different environments.

Keywords: bluetooth low energy, child safety, mobile beacons, received signal strength

Procedia PDF Downloads 354
4487 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners

Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi

Abstract:

Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.

Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression

Procedia PDF Downloads 223