Search results for: protecting variant
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 722

Search results for: protecting variant

602 Classification Rule Discovery by Using Parallel Ant Colony Optimization

Authors: Waseem Shahzad, Ayesha Tahir Khan, Hamid Hussain Awan

Abstract:

Ant-Miner algorithm that lies under ACO algorithms is used to extract knowledge from data in the form of rules. A variant of Ant-Miner algorithm named as cAnt-MinerPB is used to generate list of rules using pittsburgh approach in order to maintain the rule interaction among the rules that are generated. In this paper, we propose a parallel Ant MinerPB in which Ant colony optimization algorithm runs parallel. In this technique, a data set is divided vertically (i-e attributes) into different subsets. These subsets are created based on the correlation among attributes using Mutual Information (MI). It generates rules in a parallel manner and then merged to form a final list of rules. The results have shown that the proposed technique achieved higher accuracy when compared with original cAnt-MinerPB and also the execution time has also reduced.

Keywords: ant colony optimization, parallel Ant-MinerPB, vertical partitioning, classification rule discovery

Procedia PDF Downloads 272
601 A New Approach for Improving Accuracy of Multi Label Stream Data

Authors: Kunal Shah, Swati Patel

Abstract:

Many real world problems involve data which can be considered as multi-label data streams. Efficient methods exist for multi-label classification in non streaming scenarios. However, learning in evolving streaming scenarios is more challenging, as the learners must be able to adapt to change using limited time and memory. Classification is used to predict class of unseen instance as accurate as possible. Multi label classification is a variant of single label classification where set of labels associated with single instance. Multi label classification is used by modern applications, such as text classification, functional genomics, image classification, music categorization etc. This paper introduces the task of multi-label classification, methods for multi-label classification and evolution measure for multi-label classification. Also, comparative analysis of multi label classification methods on the basis of theoretical study, and then on the basis of simulation was done on various data sets.

Keywords: binary relevance, concept drift, data stream mining, MLSC, multiple window with buffer

Procedia PDF Downloads 563
600 Ecorium: The Ecological Project in Montevideo Uruguay

Authors: Chettou Souhaila, Soufi Omar, Roumia Mohammed Ammar

Abstract:

Protecting the environment is to preserve the survival and future of humanity. Indeed, the environment is our source of food and drinking water, the air is our source of oxygen, the climate allows our survival and biodiversity are a potential drug reservoir. Preserving the environment is, therefore, a matter of survival. The objective of this project is to familiarize the general public with environmental problems not only with the theme of environmental protection, but also with the concept of biodiversity in different ecosystems. For it, the aim of our project was to create the Ecorium which is a place that preserves many species of plants of different ecosystems, schools, malls, buildings, offices, ecological transports, gardens, and many familial activities that participated in the ecosystems development, strategic biodiversity and sustainable development.

Keywords: ecological system, ecorium, environment, sustainable development

Procedia PDF Downloads 309
599 Feasiblity of Replacing Inductive Instrument Transformers with Non-Conventional Intrument Transformers to replace

Authors: David A. Wallace, Salakjit J. Nilboworn

Abstract:

Secure and reliable transmission and distribution of electrical power is crucial in today’s ever-increasing demand for electricity. Traditional methods of protecting the electrical grid have relied on relaying systems receiving voltage and current inputs from inductive instruments transformers (IT). This method has provided robust and stable performance throughout the years. Today with the advent of new non-conventional transformers (NCIT) and sensors, the electrical landscape is changing. These new systems have to ability to provide the same electrical performance as traditional instrument transformers with the added features of data acquisition, communication, smaller footprint, lower cost and resistance to GMD/GIC events.

Keywords: non-conventional instrument transformers, digital substations, smart grids, micro-grids

Procedia PDF Downloads 61
598 Probiotics’ Antibacterial Activity on Beef and Camel Minced Meat at Altered Ranges of Temperature

Authors: Rania Samir Zaki

Abstract:

Because of their inhibitory effects, selected probiotic Lactobacilli may be used as antimicrobial against some hazardous microorganisms responsible for spoilage of fresh minced beef (cattle) minced meat and camel minced meat. Lactic acid bacteria were isolated from camel meat. These included 10 isolates; 1 Lactobacillus fermenti, 4 Lactobacillus plantarum, 4 Lactobacillus pulgaricus, 3 Lactobacillus acidophilus and 1 Lactobacillus brevis. The most efficient inhibitory organism was Lactobacillus plantarum which can be used as a propiotic with antibacterial activity. All microbiological analyses were made at the time 0, first day and the second day at altered ranges of temperature [4±2 ⁰C (chilling temperature), 25±2 ⁰C, and 38±2 ⁰C]. Results showed a significant decrease of pH 6.2 to 5.1 within variant types of meat, in addition to reduction of Total Bacterial Count, Enterococci, Bacillus cereus and Escherichia coli together with the stability of Coliforms and absence of Staphylococcus aureus.

Keywords: antibacterial, camel meat, inhibition, probiotics

Procedia PDF Downloads 272
597 A Correlational Study: Dark Triad and Self-Restraint among Criminology Students

Authors: Mary Heather Lee T. Walker, Audilon Benjamin Madamba, Mizheal Vstrechnny Vidal, Rogelio Angeles, John Rhey Banag, Lorraine Martin

Abstract:

Criminology students are the future police officers of the country that plays a major role in protecting the citizens. Their behavior must be thoroughly assessed before given a badge of responsibility. Therefore, it is important to highlight their Dark Triad that is composed of Machiavellianism, Narcissism, and Psychopathy which are considered to be controversial variables in the present while self-restraint is considered to be their way of controlling themselves especially in their line of work. The researchers used convenience and random sampling and found the respondents from a private school. Thus, the study’s aim is to determine whether there is a relationship among these variables. Machiavellianism and Psychopathy is linked to Self-Restraint except Narcissism. There are lots of factors that resulted into this.

Keywords: criminology, dark triad, self-restraint, students

Procedia PDF Downloads 259
596 Scientific Forecasting in International Relations

Authors: Djehich Mohamed Yousri

Abstract:

In this research paper, the future of international relations is believed to have an important place on the theoretical and applied levels because policy makers in the world are in dire need of such analyzes that are useful in drawing up the foreign policies of their countries, and protecting their national security from potential future threats, and in this context, The topic raised a lot of scientific controversy and intellectual debate, especially in terms of the extent of the effectiveness, accuracy, and ability of foresight methods to identify potential futures, and this is what attributed the controversy to the scientific foundations for foreseeing international relations. An arena for intellectual discussion between different thinkers in international relations belonging to different theoretical schools, which confirms to us the conceptual and implied development of prediction in order to reach the scientific level.

Keywords: foresight, forecasting, international relations, international relations theory, concept of international relations

Procedia PDF Downloads 190
595 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 451
594 Protecting the Cloud Computing Data Through the Data Backups

Authors: Abdullah Alsaeed

Abstract:

Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.

Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.

Procedia PDF Downloads 59
593 Phytoremediation; Pb, Cr and Cd Accumulation in Fruits and Leaves of Vitis Vinifera L. From Air Pollutions and Intraction between Their Uptake Based on the Distance from the Main Road

Authors: Fatemeh Mohsennezhad

Abstract:

Air pollution is one of major problems for environment. Providing healthy food and protecting water sources from pollution has been one of the concerns of human societies and decision-making centers so that protecting food from pollution, detecting sources of pollution and measuring them become important. Nutritive and political significance of grape in this area, extensive use of leaf and fruit of this plant and development of urban areas around grape gardens and construction of Tabriz – Miandoab road, which is the most important link between East and West Azarbaijan, led us to examine the impact of this road construction and urban environment pollutants such as lead chromium and cadmium on the quality of this valuable crop. First, the samples were taken from different adjacent places and medium distances from the road, each place being located exactly by Google earth and GPS. Digestion was done through burning dry material and hydrochloric acid and their ashes were analyzed by atomic absorption to determine (Pb, Cr, Cd) accumulations. In this experiments effects of 2 following factors were examined as a variable: Garden distance from the main road with levels 1: For 50 meters, 2: For 120-200 meters, 3: For above 800 meters, and plant organ with levels 1: For fruit, 2: For leaves. At the end, the results were processed by SPSS software. 3.54 ppm, the most lead quantity, was at sample No. 54 in fruits with 800 meters distance from the road and 1.00 ppm was the least lead quantity at sample No. 50 in fruits with 1000 meters from the road. In leaves, the most lead quantity was 19.16 ppm at sample No. 15 with 50 meters distance from the road and the least quantity was 1.41 ppm at sample No. 31 with 50 meters from the road. Pb uptake is significantly different at 50 meters and 200 meters distance. It means that Pb uptake near the main road is the highest. But this result is not true for others elements. Distance has not a meaningful effect on Cr uptake. The result of analysis of variation in distance and plant organ for Cd showed that between fruit and leaf, Cd uptake is significantly different. But distance and interaction between distance and plant organ is not meaningful. There is neither meaningful interaction between these elements uptakes in fruits nor in leaves. If leaves and fruits, assumed all together, showed a very meaningful integration between heavy metal accumulations. It means that each of these elements causes uptake others without considering special organs. In the tested area, it became clear that, from the accumulation of heavy metals perspective, there is no meaningful difference in existing distance between road and garden. There is a meaningful difference among heavy metals accumulation. In other words, increase ratio of one metal to another was different from the resulted differences shown in corresponding graphs. Interaction among elements and distance between garden and road was not meaningful.

Keywords: Vitis vinifera L., phytoremediation, heavy metals accumulation, lead, chromium, cadmium

Procedia PDF Downloads 329
592 Critical Analysis of International Protections for Children from Sexual Abuse and Examination of Indian Legal Approach

Authors: Ankita Singh

Abstract:

Sex trafficking and child pornography are those kinds of borderless crimes which can not be effectively prevented only through the laws and efforts of one country because it requires a proper and smooth collaboration among countries. Eradication of international human trafficking syndicates, criminalisation of international cyber offenders, and effective ban on child pornography is not possible without applying effective universal laws; hence, continuous collaboration of all countries is much needed to adopt and routinely update these universal laws. Congregation of countries on an international platform is very necessary from time to time, where they can simultaneously adopt international agendas and create powerful universal laws to prevent sex trafficking and child pornography in this modern digital era. In the past, some international steps have been taken through The Convention on the Rights of the Child (CRC) and through The Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution, and Child Pornography, but in reality, these measures are quite weak and are not capable in effectively protecting children from sexual abuse in this modern & highly advanced digital era. The uncontrolled growth of artificial intelligence (AI) and its misuse, lack of proper legal jurisdiction over foreign child abusers and difficulties in their extradition, improper control over international trade of digital child pornographic content, etc., are some prominent issues which can only be controlled through some new, effective and powerful universal laws. Due to a lack of effective international standards and a lack of improper collaboration among countries, Indian laws are also not capable of taking effective actions against child abusers. This research will be conducted through both doctrinal as well as empirical methods. Various literary sources will be examined, and a questionnaire survey will be conducted to analyse the effectiveness of international standards and Indian laws against child pornography. Participants in this survey will be Indian University students. In this work, the existing international norms made for protecting children from sexual abuse will be critically analysed. It will explore why effective and strong collaboration between countries is required in modern times. It will be analysed whether existing international steps are enough to protect children from getting trafficked or being subjected to pornography, and if these steps are not found to be sufficient enough, then suggestions will be given on how international standards and protections can be made more effective and powerful in this digital era. The approach of India towards the existing international standards, the Indian laws to protect children from being subjected to pornography, and the contributions & capabilities of India in strengthening the international standards will also be analysed.

Keywords: child pornography, prevention of children from sexual offences act, the optional protocol to the convention on the rights of the child on the sale of children, child prostitution and child pornography, the convention on the rights of the child

Procedia PDF Downloads 13
591 Genomic Analysis of Whole Genome Sequencing of Leishmania Major

Authors: Fatimazahrae Elbakri, Azeddine Ibrahimi, Meryem Lemrani, Dris Belghyti

Abstract:

Leishmaniasis represents a major public health problem because of the number of cases recorded each year and the wide distribution of the disease. It is a parasitic disease of flagellated protozoa transmitted by the bite of certain species of sandfly, causing a spectrum of clinical pathology in humans ranging from disfiguring skin lesions to fatal visceral leishmaniasis. Cutaneous leishmaniasis due to Leishmania major is a polymorphic disease; in fact, the infection can be asymptomatic, localized, or disseminated. The objective of this work is to determine the genomic diversity that contributes to clinical variability by trying to identify the variation in chromosome number and to extract SNPs and SNPs and InDels; it is based on four sequences (WGS) of Leishmania major available on NCBI in Fastq form, from three countries: Tunisia, Algeria, and Israel, the analysis is set up from a pipeline to facilitate the discovery of genetic diversity, in particular SNP and chromosomal somy.

Keywords: Leshmania major, cutaneous Leishmania, NGS, genomic, somy, variant calling

Procedia PDF Downloads 53
590 Morphological Properties in Ndre Mjeda's Works

Authors: Shyhrete Morina

Abstract:

This paper deals with morphological features in Mjeda's works. To make such a distinction, these features will be compared to standard Albanian language, considering the linguistic structure in the morphological field, which represent an all-important segment of Albanian language. Therefore, the study will focus mainly on the description and construction of these paradigms, which will give a linguistic insight into the entire work of Mjeda as the author who wrote in the dialect of northwestern Geg. Therefore, we have tried to distinguish different parts of the author's language, as well as the distinctive features or even the similarities of these paradigms that arise in the literary work of Mjeda. By constructing the corpus of this phonetic and grammar segment from the whole of Mjeda's work, we have seen that in these fields has built a variety of grammar structures, which for the history of Albanian are of special importance, that in the full variant of the work, as far as we can investigate, we will point out in all the distinctive features. Therefore, our study aims to highlight the linguistic features, namely the author's deep knowledge toward the language, the authenticity of its use, and its mutual relationship with it.

Keywords: distinctive morpholgy, nouns, adjetives, pronouns, Albanian standard language

Procedia PDF Downloads 136
589 Ensemble-Based SVM Classification Approach for miRNA Prediction

Authors: Sondos M. Hammad, Sherin M. ElGokhy, Mahmoud M. Fahmy, Elsayed A. Sallam

Abstract:

In this paper, an ensemble-based Support Vector Machine (SVM) classification approach is proposed. It is used for miRNA prediction. Three problems, commonly associated with previous approaches, are alleviated. These problems arise due to impose assumptions on the secondary structural of premiRNA, imbalance between the numbers of the laboratory checked miRNAs and the pseudo-hairpins, and finally using a training data set that does not consider all the varieties of samples in different species. We aggregate the predicted outputs of three well-known SVM classifiers; namely, Triplet-SVM, Virgo and Mirident, weighted by their variant features without any structural assumptions. An additional SVM layer is used in aggregating the final output. The proposed approach is trained and then tested with balanced data sets. The results of the proposed approach outperform the three base classifiers. Improved values for the metrics of 88.88% f-score, 92.73% accuracy, 90.64% precision, 96.64% specificity, 87.2% sensitivity, and the area under the ROC curve is 0.91 are achieved.

Keywords: MiRNAs, SVM classification, ensemble algorithm, assumption problem, imbalance data

Procedia PDF Downloads 316
588 Two and Three Layer Lamination of Nanofiber

Authors: Roman Knizek, Denisa Karhankova, Ludmila Fridrichova

Abstract:

For their exceptional properties nanofibers, respectively, nanofiber layers are achieving an increasingly wider range of uses. Nowadays nanofibers are used mainly in the field of air filtration where they are removing submicron particles, bacteria, and viruses. Their efficiency is not changed in time, and the power consumption is much lower than that of electrically charged filters. Nanofibers are primarily used for converting and storage of energy in both air and liquid filtration, in food and packaging, protecting the environment, but also in health care which is made possible by their newly discovered properties. However, a major problem of the nanofiber layer is practically zero abrasion resistance; it is, therefore, necessary to laminate the nanofiber layer with another suitable material. Unfortunately, lamination of nanofiber layers is a major problem since the nanofiber layer contains small pores through which it is very difficult for adhesion to pass through. Therefore, there is still only a small percentage of products with these unique fibers 5.

Keywords: nanofiber layer, nanomembrane, lamination, electrospinning

Procedia PDF Downloads 704
587 The Potential of Dinar (Gold) Currency as the Main Object Transaction in Indonesia

Authors: Muhammad Ilham Agus Salim, Mohammad Ali

Abstract:

In this article, we have elaborated a study over the nature of Islamic financial transaction by comparing between Dinar and IDR currency in Indonesia. We have found the interesting issue among scholars and practitioners in which Dinar would be a single currency ASEAN Economic Community (AEC), then becoming motivation and added value research. The assessment among dinar volatility analysis for three years ago and IDR fluctuation as well as outlook qualitative test regarding dinar are components of analysis that weak Indonesian currency should be altered to be better coinage. The value of dinar more stable than IDR and also eligible as a currency e.g. limited quantities, easy to carry, durable, easy to saved, and has the same quality. On the other hand, the existing of IDR has defeated by inflation. The EViews program explained that Dinar at current level still fluctuate, but in the first different have fixed variant. The result of analysis describing that dinar has potential as the medium exchange, because the material of dinar is relevant and feasible since 14 century until present. Therefore, dinar should be considered to solve Indonesia crisis today.

Keywords: medium of exchange, dinar & IDR currency, volatility analysis, EViews program

Procedia PDF Downloads 333
586 Electrospun TiO2/Nylon-6 Nanofiber Mat: Improved Hydrophilicity Properties

Authors: Roshank Haghighat, Laleh Maleknia

Abstract:

In this study, electrospun TiO2/nylon-6 nanofiber mats were successfully prepared. The nanofiber mats were characterized by SEM, FE-SEM, TEM, XRD, WCA, and EDX analyses. The results revealed that fibers in different distinct sizes (nano and subnano scale) were obtained with the electrospinning parameters. The presence of a small amount of TiO2 in nylon-6 solution was found to improve the hydrophilicity (antifouling effect), mechanical strength, antimicrobial and UV protecting ability of electrospun mats. The resultant nylon-6/TiO2 antimicrobial spider-net like composite mat with antifouling effect may be a potential candidate for future water filter applications, and its improved UV blocking ability will also make it a potential candidate for protective clothing.

Keywords: electrospinning, hydrophilicity, antimicrobial, nanocomposite, nylon-6/TiO2

Procedia PDF Downloads 327
585 Cloud-Based Dynamic Routing with Feedback in Formal Methods

Authors: Jawid Ahmad Baktash, Mursal Dawodi, Tomokazu Nagata

Abstract:

With the rapid growth of Cloud Computing, Formal Methods became a good choice for the refinement of message specification and verification for Dynamic Routing in Cloud Computing. Cloud-based Dynamic Routing is becoming increasingly popular. We propose feedback in Formal Methods for Dynamic Routing and Cloud Computing; the model and topologies show how to send messages from index zero to all others formally. The responsibility of proper verification becomes crucial with Dynamic Routing in the cloud. Formal Methods can play an essential role in the routing and development of Networks, and the testing of distributed systems. Event-B is a formal technique that consists of describing the problem rigorously and introduces solutions or details in the refinement steps. Event-B is a variant of B, designed for developing distributed systems and message passing of the dynamic routing. In Event-B and formal methods, the events consist of guarded actions occurring spontaneously rather than being invoked.

Keywords: cloud, dynamic routing, formal method, Pro-B, event-B

Procedia PDF Downloads 390
584 International Law and Its Role in Protecting Human Rights

Authors: Yrfet Shkreli

Abstract:

To determine the content of human rights norms in national constitutions, international law - in the form of treaties, declarations and case law from international monitoring bodies, and comparative case law from other countries - is often discussed in the judgments of domestic courts. This paper explores the extent to which international law has influenced domestic human rights case law in Africa. The paper first explores how the human rights provisions of African constitutions came into being before turning to the role played by international law in the constitutional order of various African states and how treaties, declarations and findings of international monitoring bodies have been used in African countries to interpret and expand on constitutional human rights provisions.

Keywords: European Union, global governance, globalization, normative power

Procedia PDF Downloads 345
583 Challenges of Strategies for Improving Sustainability in Urban Historical Context in Developing Countries: The Case of Shiraz Bein Al-Haramein

Authors: Amir Hossein Ashari, Sedighe Erfan Manesh

Abstract:

One of the problems in developing countries is renovating the historical context and inducing behaviors appropriate to modern life to such a context. This study was conducted using field and library methods in 2012. Similar cases carried out in Iran and developing countries were compared to unveil the strengths and weaknesses of these projects. At present, in the historical context of Shiraz, the distance between two religious shrines of Shahcheragh (Ahmad ibn Musa) and Astaneh (Sayed Alaa al-Din Hossein), which are significant places in religious, cultural, social, and economic terms, is an area full of historic places called Bein Al-Haramein. Unfortunately, some of these places have been worn out and are not appropriate for common uses. The basic strategy of Bein Al-Haramein was to improve social development of Shiraz, to enhance the vitality and dynamism of the historical context of Bein Al-Haramein and to create tourist attractions in order to boost the city's economic and social stability. To this end, the project includes the huge Bein Al-Haramein Commercial Complex which is under construction now. To construct the complex, officials have decided to demolish places of historical value which can lead to irreparable consequences. Iranian urban design has always been based on three elements of bazaars, mosques and government facilities with bazaars being the organic connector of the other elements. Therefore, the best strategy in the above case is to provide for a commercial connection between the two poles. Although this strategy is included in the project, lack of attention to renovation principles in this area and complete destruction of the context will lead to its irreversible damage and will destroy its cultural and historical identity. In urban planning of this project, some important issues have been neglected including: preserving valuable buildings and special old features of the city, rebuilding worn buildings and context to attract trust and confidence of the people, developing new models according to changes, improving the structural position of old context with minimal degradation, attracting partnerships of residents and protecting their rights and finally using potential facilities of the old context. The best strategy for achieving sustainability in Bein Al-Haramein can be the one used in the distance between Santa Maria Novella and Santa Maria Del Fiore churches in historical context where while protecting the historic context and constructions, old buildings were renovated and given different commercial and service uses making them sustainable and dynamic places. Similarly, in Bein Al-Haramein, renovating old constructions and monuments and giving different commercial and other uses to them can help improve the economic and social sustainability of the area.

Keywords: Bein Al-Haramein, sustainability, historical context, historical context

Procedia PDF Downloads 419
582 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 391
581 The Need for a More Robust Legal Framework to Curb the Rise in Violence against Game Officials

Authors: A. Roomy

Abstract:

The dramatic rise in violence against game officials has affected all levels of sports including recreational, amateur, and professional sports. One way to combat this rise in violence is through the creation of laws specifically aimed at preventing and punishing this kind of violence. This paper will use related legal cases as a starting point to explore possible ways of better protecting the safety of game officials. It will do this by looking at relevant cases, related legal issues, and two specific ways of reducing violence against game officials. In closing, it will be argued that there needs to be a more robust legal approach with emphasis on criminal and civil penalties for assault and battery, and a more comprehensive social approach with emphasis on raising social awareness on the need to protect game officials from violence.

Keywords: game officials, legal issues, safety, violence

Procedia PDF Downloads 355
580 UNHCR and the International Refugee Protection: An Analysis of Its Actions in Protecting Mozambican Refugees in Malawi

Authors: Marcia Teresa Gildo

Abstract:

The United Nations High Commissioner for Refugees (UNHCR) is responsible to provide international protection and humanitarian assistance to refugees and to seek permanent solutions to their situation. To fulfil this mandate, the agency works in collaboration with its partners and governments. This paper aims to analyse the agency's actions to protect and provide assistance to Mozambican refugees in Malawi. Since July 2015, approximately 12.000 people have fled Mozambique to neighbouring Malawi due to the political-military conflict between the government of Mozambique and RENAMO (the country’s largest opposition party). This led to a series of military clashes between the two parties and the consequent flight of some Mozambicans to Malawi, in search of asylum. Most arrived from the province of Tete, in the central region of Mozambique, and, to a lesser extent, from the province of Zambezia. The asylum seekers arrived in small groups and settled in the village of Kapise in the Mwanza district of Thambani, as well as in Chikwawa and Nsanje districts in Malawi. UNHCR led an interinstitutional response action to manage the flow of Mozambican asylum seekers to Malawi. In view of these aspects and the ongoing challenge of protecting refugees and finding permanent solutions to their situation, UNHCR remains an indispensable international organization. However, there are significant gaps in the international refugee protection regime, and there have been many occasions when UNHCR has failed to fulfill its mandate. The analysis was carried out through qualitative research methods and techniques based essentially on consultation of books, newspapers and scientific articles, television and journalistic reports and interviews with the people who were involved in the process. From the data obtained, it was concluded that UNHCR worked in coordination with its partners and the government of Malawi to provide protection and emergency assistance to the refugees. However, existing funds covered only the immediate needs of refugees, more funds had to be allocated. That was made through an interinstitutional appeal. Although the funds allocated were not sufficient, they allowed the agency to protect and assist the refugees until a permanent solution was found. UNHCR also worked in coordination with the governments of Malawi and Mozambique so that a tripartite agreement was signed between the parties for the voluntary repatriation of Mozambican refugees, since security conditions were guaranteed and the refugees had expressed their willingness to return to their country of origin. UNHCR's actions to protect Mozambican refugees in Malawi have enabled humanitarian conditions to be respected and the rights of refugees to be guaranteed. Cooperation with the different actors involved in the response has allowed UNHCR to fulfil its mandate.

Keywords: assistance , cooperation, international protection, refugees

Procedia PDF Downloads 86
579 Navigating the Complexity of Guillain-Barré Syndrome and Miller Fisher Syndrome Overlap Syndrome: A Pediatric Case Report

Authors: Kamal Chafiq, Youssef Hadzine, Adel Elmekkaoui, Othmane Benlenda, Houssam Rajad, Soukaina Wakrim, Hicham Nassik

Abstract:

Guillain-Barré syndrome/Miller Fishe syndrome (GBS/MFS) overlap syndrome is an extremely rare variant of Guillain-Barré syndrome (GBS) in which Miller Fisher syndrome (MFS) coexists with other characteristics of GBS, such as limb weakness, paresthesia, and facial paralysis. We report the clinical case of a 12-year-old patient, with no pathological history, who acutely presents with ophthalmoplegia, areflexia, facial diplegia, and swallowing and phonation disorders, followed by progressive, descending, and symmetrical paresis affecting first the upper limbs and then the lower limbs. An albuminocytological dissociation was found in the cerebrospinal fluid study. Magnetic resonance imaging of the spinal cord showed enhancement and thickening of the cauda equina roots. The patient was treated with immunoglobulins with a favorable clinical outcome.

Keywords: Guillain-Barré syndrome, Miller Fisher syndrome, overlap syndrome, anti-GQ1b antibodies

Procedia PDF Downloads 40
578 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 63
577 Managerial Risk-Taking: Evidences from the Tourism Industry

Authors: Min-Ming Wen

Abstract:

Applying the U.S. lodging and tourism industry as a research sample, we examine the relation between the corporate governance structure and managerial risk-taking behavior. In light of the global financial crisis, the importance of effective governance structures is essential in protecting claimholder interests. We propose a governance structure consisting of shareholder governance measured by anti-takeover provisions to examine whether the governance structure has a significant impact on managerial risk-taking behaviors in terms of the investment policy. We will use capital expenditure and R&D investment to measure managerial risk-taking and the firm’s investment policy. In addition, we will examine whether the effects of governance on investment policy differ significantly between speculative and investment-grade firms.

Keywords: corporate governance, risk-taking, firm value, lodging industry

Procedia PDF Downloads 592
576 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 91
575 Modelling of Cavity Growth in Underground Coal Gasification

Authors: Preeti Aghalayam, Jay Shah

Abstract:

Underground coal gasification (UCG) is the in-situ gasification of unmineable coals to produce syngas. In UCG, gasifying agents are injected into the coal seam, and a reactive cavity is formed due to coal consumption. The cavity formed is typically hemispherical, and this report consists of the MATLAB model of the UCG cavity to predict the composition of the output gases. There are seven radial and two time-variant ODEs. A MATLAB solver (ode15s) is used to solve the radial ODEs from the above equations. Two for-loops are implemented in the model, i.e., one for time variations and another for radial variation. In the time loop, the radial odes are solved using the MATLAB solver. The radial loop is nested inside the time loop, and the density odes are numerically solved using the Euler method. The model is validated by comparing it with the literature results of laboratory-scale experiments. The model predicts the radial and time variation of the product gases inside the cavity.

Keywords: gasification agent, MATLAB model, syngas, underground coal gasification (UCG)

Procedia PDF Downloads 173
574 Assesment of SNP Variation and Distribution in Pakistani Cattle Breeds using High Density SNP Genotyping

Authors: Hamid Mustafa, Heather J. Huson, Adeela Ajmal, Kim Euisoo, Tad S. Sonstegard

Abstract:

In this study, 67 animals, representing six different cattle breeds of Pakistan, were genotyped with the Bovine high density (777K) SNP Beadchip. These include 13 Sahiwal, 09 Red Sindhi, 13 Tharparkar, 08 Achi, 13 Cholistani and 10 Dhanni cattle breeds. Analysis of 500, 939 SNP markers revealed that the mean minor allele frequency (MAF) was 0.21, 0.22, 0.18, 0.23, 0.22 and 0.22 for Sahiwal, Red Sindhi, Tharparkar, Achi, Cholistani and Dhanni respectively. Significant differences of minor allele frequency (MAF) were observed between the indigenous Pakistani cattle population (P<0.001). Across these Pakistani cattle breeds, a common variant MAF (≥0.10 and ≤0.5) accounted for an overall estimated 75.71 % of the 500,939 SNPs and on the average 19.58 % of the markers were monomorphic. Mean observed (HO) and expected (HE) heterozygosities were 0.656 and 0.638, respectively. This primarily study of Pakistani indigenous cattle breeds indicate that this level of SNPs variation can potentially be used for genomic studies for future breeding plans and for farm animal conservation strategies.

Keywords: Pakistan, cattle, minor allele frequency, SNP, variation

Procedia PDF Downloads 620
573 Insights into the Perception of Sustainable Technology Adoption among Malaysian Small and Medium-Sized Enterprises

Authors: Majharul Talukder, Ali Quazi

Abstract:

The use of sustainable technology is being increasingly driven by the demand for saving resources, long-term cost savings, and protecting the environment. A transitional economy such as Malaysia is an example where traditional technologies are being replaced by sustainable ones. The antecedents that are driving Malaysian SMEs to integrate sustainable technology into their business operations have not been well researched. This paper addresses this gap in our knowledge through an examination of attitudes and ethics as antecedents of acceptance of sustainable technology among Malaysian SMEs. The database comprised 322 responses that were analysed using the PLS-SEM path algorithm. Results indicated that effective and altruism attitudes have high predictive ability for the usage of sustainable technology in Malaysian SMEs. This paper identifies the implications of the findings, along with the major limitations of the research and explores future areas of research in this field.

Keywords: sustainable technology, innovation management, Malaysian SMEs, organizational attitudes and ethical belief

Procedia PDF Downloads 303