Search results for: civil protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3201

Search results for: civil protection

1731 Recognition of Sanitation as a Human Right: An Overview of Unresolutions and Reports That Recognizes the Human Right to Sanitation in South-Asian Countries

Authors: Anju Vaidya

Abstract:

Sanitation is concerned with proper disposal of human excreta, waste water and promotion of hygiene. Lack of sanitation impacts our environment affecting our finance, schooling, health, and thus exacerbating poverty, discrimination and exclusion of the marginalized group. Sanitation can be a route and one of the most important factor to reach the goals of all Millennium Development goals. This study aims at exploring what are the rights to sanitation of the people, how it is enacted and what challenges are being faced while implementing the right to sanitation in South-Asian countries (India, Nepal, Pakistan, Bangladesh, Srilanka) at government, non-government and international level. This study also aims at finding how right sanitation is interlinked with children rights. The available reports submitted by government and civil society organizations working in South-Asian countries from the website of the Office of High Commissioner for Human Rights that were submitted under International covenant on economic, social and cultural rights and Convention on rights of the child have been selected and analyzed. The study uses Literature review to analyze these UN documents submitted from 2000 to 2015 in the context of South-Asian countries. Preliminary insight reveals that sanitation is recognized as one of the important factor to attain adequate standard of living. It has been found that inadequate sanitation has been a major factor that affects all aspects of life and one of its devastating impacts is increased child mortality. Many efforts have been made at national and international level in South-Asian countries to improve the state of sanitation and sanitation services. Various approaches such as Community led Total Sanitation, School led Total Sanitation, establishing Open Defecation free zone, water supply services and other sanitation and hygiene awareness programs are being launched. Despite different efforts and programs being implemented, sanitation and hygiene practices and behavior change remains to be a big challenge. Disparity in access and imbalance between urban and rural services and geographical regions, inadequate financing, clear policy framework and fragile functionality are some of the significant challenges faced while implementing these programs. Children are one of the most vulnerable group that are affected to a large extent. The study brings into light varied approaches that are being made and challenges that are being faced by government, non-government and civil society organizations while implementing the programs and strategies related to sanitation. It also highlights the relation of sanitation as a human right with child rights. This can help the stakeholders and policymakers better understand that improving sanitation situation is a process that requires learning, planning and behavior change and achieving sanitation coverage targets and motivating behavior change requires additional tools based on participation, non-discrimination and process approaches for planning and feedback.

Keywords: challenges, child rights, open defecation, sanitation as a human right

Procedia PDF Downloads 281
1730 The Challenges of Security Sector Governance in West African Democracies-The Ecowas Response Mechanism

Authors: Adamu Buba

Abstract:

As West Africa gradually recovers from the cost of more than a decade of civil conflicts in Liberia, Sierra Leone and Côte d’Ivoire, ECOWAS has continued to place prominence on peace consolidation and the prevention of conflict in the West African Sub-Region. Of particular interest is the recent political uprising in Mali and in this regard, ECOWAS has been repositioning their existing machineries to manage this dispensation more effectively by improving their early warning and mediation capabilities. This paper firstly seeks among other things to provide a conceptual understanding of what security sector governance is, and also highlight the overview of ECOWAS and to closely examine the benchmark for assessing progress in the promotion of democracy and political governance within the sub-region as well as conflict prevention techniques. The views and analysis expressed in this paper is based on secondary method of data collection alone and do not in any way represent the views of the institutions or their representatives involved in this assignment in one way or the other.

Keywords: challenges, security, governance, ecowas, response

Procedia PDF Downloads 255
1729 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 482
1728 Investigation on the Performance of Biodiesel and Natural Gas-Fuelled Diesel Engines for Shipboard Application

Authors: Kelvin Datonye Bob-Manuel

Abstract:

The shipping industry has begun to seriously look at ways of reducing fossil fuel consumption so that current reserves can last longer and operate their ships in a more environmentally friendly way. The concept of Green Shipping or Sustainable Shipping with the use of alternative fuels is now becoming an important issue for ship owners, shipping lines and ship builders globally. This paper provides a critical review of the performance of biodiesel and natural gas-fuelled diesel engines for shipboard application. The emission reduction technique included the use of either neat or emulsified rapeseed methyl ester (RME) for pilot ignition and the emission of NOx, CO2 and SOx were measured at engine speed range of 500 - 1500 r/min. The NOx concentrations were compared with the regulated IMO MARPOL73/78, Annex VI, Tiers I, II, III and United States Environmental Protection Agency (US-EPA) standard. All NOx emissions met Tier I and II levels and the EPA standard for the minimum specification of category 1 engines at higher speed but none met the MARPOL Tier III limit which is for designated Emission Control Areas (ECAs). No trace of soot and SOx emission were observed.

Keywords: dual-fuel, biodiesel, natural gas, NOx, SOx, MARPOL 73/78 Annex VI. USEPA Tier 3, EURO V &VI

Procedia PDF Downloads 417
1727 Physico-Chemical and Heavy Metals Analysis of Contaminated Ndawuse River in North Central of Nigeria

Authors: Abimbola Motunrayo Enitan, Ibironke Titilayo Enitan, John Odiyo

Abstract:

The study assessed quality of surface water across Ndawuse River Phase 1, District of the Federal Capital Territory (FCT), Abuja, Nigeria based on physico-chemical variables that are linked to agrochemical and eutrophication, as well as heavy metals concentrations. In total, sixteen surface water samples were obtained from five locations along the river. The results were compared with the standard limits set by both World Health Organization and Federal Environmental Protection Agency for drinking water. The results obtained indicated that BOD5, turbidity, 0.014-3.511 mg Fe/L and 0.078-0.14 mg Cr/L were all above the standard limits. The results further showed that the quality of surface water is being significantly affected by human activities around the Ndawuse River which could pose an adverse health risk to several communities that rely on these receiving water bodies primarily as their source of water. Therefore, there is a need for strict enforcement of environmental laws considering the physico-chemical analysis.

Keywords: Abuja, heavy metals, human exposure risk, Ndawuse River, Nigeria, surface water

Procedia PDF Downloads 265
1726 Corrosion Control of Carbon Steel Surface by Phosphonic Acid Nano-Layers

Authors: T. Abohalkuma, J. Telegdi

Abstract:

Preparation, characterization, and application of self-assembled monolayers (SAM) formed by fluorophosphonic and undecenyl phosphonic acids on carbon steel surfaces as anticorrosive nanocoatings were demonstrated. The anticorrosive efficacy of these SAM layers was followed by atomic force microscopy, as the change in the surface morphology caused by layer deposition and corrosion processes was monitored. The corrosion process was determined by electrochemical potentiodynamic polarization, whereas the surface wettability of the carbon steel samples was tested with the use of static and dynamic contact angle measurements. Results showed that both chemicals produced good protection against corrosion as they performed as anodic inhibitors, especially with increasing the time of layer formation, which results in a more compact molecular film. According to the atomic force microscope (AFM) images, the fluoro-phosphonic acid self-assembled molecular layer can control the general as well as the pitting corrosion, but the SAM layers of the undecenyl-phosphonic acid cannot inhibit the pitting corrosion. The AFM and the contact angle measurements confirmed the results achieved by electrochemical measurements.

Keywords: nanolayers, corrosion, phosphonic acids, coatings

Procedia PDF Downloads 171
1725 Phenolic Compounds, Antiradical Activity, and Antioxidant Efficacy of Satureja hortensisl - Extracts in Vegetable Oil Protection

Authors: Abolfazl Kamkar

Abstract:

Vegetable oils and fats are recognized as important components of our diet. They provide essential fatty acids, which are precursors of important hormones and control many physiological factors such as blood pressure, cholesterol level, and the reproductive system.Vegetable oils with higher contents of unsaturated fatty acids, especially polyunsaturated fatty acids (PUFAs) are more susceptible to oxidation.Protective effects of Sature jahortensis(SE) extracts in stabilizing soybean oil at different concentrations (200 and 400 ppm) were tested. Results showed that plant extracts could significantly (P< 0.05) lower the peroxide value and thiobarbituric acid value of oil during storage at 60 oC. The IC50 values for methanol and ethanol extracts were 31.5 ± 0.7 and 37.00 ± 0 µg/ml, respectively. In the β- carotene/linoleic acid system, methanol and ethanol extracts exhibited 87.5 ± 1.41% and 74.0 ±2.25 % inhibition against linoleic acid oxidation. The total phenolic and flavonoid contents of methanol and ethanol extracts were (101.58 ± 0. 26m g/ g) and (96.00 ± 0.027 mg/ g), (44.91 ± 0.14 m g/ g) and (14.30 ± 0.12 mg/ g) expressed in Gallic acid and Quercetin equivalents, respectively.These findings suggest that Satureja extracts may have potential application as natural antioxidants in the edible oil and food industry.

Keywords: satureja hortensis, antioxidant activity, oxidative stability, vegetable oil, extract

Procedia PDF Downloads 371
1724 Cultural Heritage, War and Heritage Legislations: An Empirical Review

Authors: Gebrekiros Welegebriel Asfaw

Abstract:

The conservation of cultural heritage during times of war is a topic of significant importance and concern in the field of heritage studies. The destruction, looting, and illicit acts against cultural heritages have devastating consequences. International and national legislations have been put in place to address these issues and provide a legal framework for protecting cultural heritage during armed conflicts. Thus, the aim of this review is to examine the existing heritage legislations and evaluate their effectiveness in protecting cultural heritage during times of war with a special insight of the Tigray war. The review is based on a comprehensive empirical analysis of existing heritage legislations related to the protection of cultural heritage during war, with a special focus on the Tigray war. The review reveals that there are several international and national legislations in place to protect cultural heritage during times of war. However, the implementation of these legislations has been insufficient and ineffective in the case of the Tigray war. The priceless cultural heritages in Tigray, which were once the centers of investment and world pride were, have been subjected to destruction, looting, and other illicit acts, in violation of both international conventions such as the UNESCO Convention and national legislations. Therefore, there is a need for consistent intervention and enforcement of different legislations from the international community and organizations to rehabilitate, repatriate, and reinstitute the irreplaceable heritages of Tigray.

Keywords: cultural heritage, heritage legislations, tigray, war

Procedia PDF Downloads 155
1723 The Concept of Anchor Hazard Potential Map

Authors: Sao-Jeng Chao, Chia-Yun Wei, Si-Han Lai, Cheng-Yu Huang, Yu-Han Teng

Abstract:

In Taiwan, the landforms are mainly dominated by mountains and hills. Many road sections of the National Highway are impossible to avoid problems such as slope excavation or slope filling. In order to increase the safety of the slope, various slope protection methods are used to stabilize the slope, especially the soil anchor technique is the most common. This study is inspired by the soil liquefaction potential map. The concept of the potential map is widely used. The typhoon, earth-rock flow, tsunami, flooded area, and the recent discussion of soil liquefaction have safety potential concepts. This paper brings the concept of safety potential to the anchored slope. Because the soil anchor inspection is only the concept of points, this study extends the concept of the point to the surface, using the Quantum GIS program to present the slope damage area, and depicts the slope appearance and soil anchor point with the slope as-built drawing. The soil anchor scores are obtained by anchor inspection data, and the low, medium and high potential areas are remitted by interpolation. Thus, the area where the anchored slope may be harmful is judged and relevant maintenance is provided. The maintenance units can thus prevent judgment and deal with the anchored slope as soon as possible.

Keywords: anchor, slope, potential map, lift-off test, existing load

Procedia PDF Downloads 140
1722 Healthcare Seeking Behaviors of Parents Who Have Children with Disabilities: A Case Study at the Effutu Municipality, Winneba-Central Region, Ghana-West Africa

Authors: Priscilla Deede Hammond

Abstract:

Healthcare seeking behaviour has emerged as a tool to tackle perceived ill-health by taking remedial actions. And currently, efforts are being directed towards encouraging people (especially parents) to learn and use health-promoting behaviours in seeking their children’s healthcare. Regardless of these efforts, most parents encounter challenges with raising a child with a disability. The purpose of the study was to explore the healthcare-seeking behaviours of parents of children with disabilities. In order to achieve the purpose of the study, a case study design was employed where the researcher used a qualitative approach such as semi-structured interview to gather the required data. Data from participants were analysed using a thematic analysis approach. It was revealed from the findings of the study that, some of the parents after the first diagnosis by health professionals consulted a spiritualist or a herbalist for help. Also, some parents stated that their response to their children’s healthcare depended on the severity of the sickness. The study recommends the Ministry of Gender, Children and Social Protection and other social agencies such as the Social Welfare Department to provide health assessment and financial support to families of children with disabilities.

Keywords: healthcare, health, parents, disabilities

Procedia PDF Downloads 224
1721 Compilation of Tall Building with Green Architecture Case Study: Babolsar City (North of Iran) at 2014-2015

Authors: Seyyed Hossein Alavi, Soudabeh Mehri Talarposhti

Abstract:

Quick development of urban population need for housing on the one hand and prevention of irregular urban extension for optimum usage of urban land, resolving problems of urban physiognomy, land using, and environmental issues and urban transport, on the other hand, proposed tall building as urban area extension requirement in developing and advanced countries. Beside the tall building, protection, and creation of green architecture is one the most important issues of today's architecture world. This research is about attending tall building with green architecture in Babolsar city 2015. For this, the issues that can make favorite conditions for green architecture has been discussed. The purpose of this discussion is skeleton extension and accessing interactions between architecture and related technologies. This discussion with using of qualitative research methods (Analytical Description) tried to studying designed performance models and also studying and analyzing the inside and foreign articles and books. Hope this research is useful in solving the existing problems in this issue.

Keywords: tall building, green architecture, skeleton extension, Babolsar city

Procedia PDF Downloads 430
1720 Training Engineering Students in Sustainable Development

Authors: Hoong C. Chin, Soon H. Chew, Zhaoxia Wang

Abstract:

Work on sustainable developments and the call for action in education for sustainable development have been ongoing for a number of years. Training engineering students with the relevant competencies, particularly in sustainable development literacy, has been identified as an urgent task in universities. This requires not only a holistic, multi-disciplinary approach to education but also a suitable training environment to develop the needed skills and to inculcate the appropriate attitudes in students towards sustainable development. To demonstrate how this can be done, a module involving an overseas field trip was introduced in 2013 at the National University of Singapore. This paper provides details of the module and describes its training philosophy and methods. Measured against the student learning outcomes, stipulated by the Engineering Accreditation Board, the module scored well on all of them, particularly those related to complex problem solving, environmental and sustainability awareness, multi-disciplinary team work and varied-level communications.

Keywords: civil engineering education, socio-economically sustainable infrastructure, student learning outcome, sustainable development

Procedia PDF Downloads 349
1719 Numerical Analysis of Heat and Mass Transfer in an Adsorbent Bed for Different Working Pairs

Authors: N. Allouache, O. Rahli

Abstract:

Solar radiation is by far the largest and the most world’s abundant, clean, and permanent energy source. In recent years, many promising technologies have been developed to harness the sun's energy. These technologies help in environmental protection, economizing energy, and sustainable development, which are the major issues of the world. One of these important technologies is the solar refrigerating machines that make use of either absorption or adsorption technologies. In this present work, the adsorbent bed is modelized and optimized using different working pairs, such as zeolite-water, silica gel-water, activated carbon-ammonia, calcium chlorid-ammonia, activated carbon fiber- methanol and activated carbon AC35-methanol. The results show that the enhancement of the heat and mass transfer depends on the properties of the working pair; the performances of the adsorption cycle are essentially influenced by the choice of the adsorbent-adsorbate pair. The system can operate successfully for optimal parameters such as the evaporator, condenser, and generating temperatures. The activated carbon is the best adsorbent due to its high surface area and micropore volume.

Keywords: adsorbent bed, heat and mass transfer, numerical analysis, working pairs

Procedia PDF Downloads 148
1718 An Interoperability Concept for Detect and Avoid and Collision Avoidance Systems: Results from a Human-In-The-Loop Simulation

Authors: Robert Rorie, Lisa Fern

Abstract:

The integration of Unmanned Aircraft Systems (UAS) into the National Airspace System (NAS) poses a variety of technical challenges to UAS developers and aviation regulators. In response to growing demand for access to civil airspace in the United States, the Federal Aviation Administration (FAA) has produced a roadmap identifying key areas requiring further research and development. One such technical challenge is the development of a ‘detect and avoid’ system (DAA; previously referred to as ‘sense and avoid’) to replace the ‘see and avoid’ requirement in manned aviation. The purpose of the DAA system is to support the pilot, situated at a ground control station (GCS) rather than in the cockpit of the aircraft, in maintaining ‘well clear’ of nearby aircraft through the use of GCS displays and alerts. In addition to its primary function of aiding the pilot in maintaining well clear, the DAA system must also safely interoperate with existing NAS systems and operations, such as the airspace management procedures of air traffic controllers (ATC) and collision avoidance (CA) systems currently in use by manned aircraft, namely the Traffic alert and Collision Avoidance System (TCAS) II. It is anticipated that many UAS architectures will integrate both a DAA system and a TCAS II. It is therefore necessary to explicitly study the integration of DAA and TCAS II alerting structures and maneuver guidance formats to ensure that pilots understand the appropriate type and urgency of their response to the various alerts. This paper presents a concept of interoperability for the two systems. The concept was developed with the goal of avoiding any negative impact on the performance level of TCAS II (understanding that TCAS II must largely be left as-is) while retaining a DAA system that still effectively enables pilots to maintain well clear, and, as a result, successfully reduces the frequency of collision hazards. The interoperability concept described in the paper focuses primarily on facilitating the transition from a late-stage DAA encounter (where a loss of well clear is imminent) to a TCAS II corrective Resolution Advisory (RA), which requires pilot compliance with the directive RA guidance (e.g., climb, descend) within five seconds of its issuance. The interoperability concept was presented to 10 participants (6 active UAS pilots and 4 active commercial pilots) in a medium-fidelity, human-in-the-loop simulation designed to stress different aspects of the DAA and TCAS II systems. Pilot response times, compliance rates and subjective assessments were recorded. Results indicated that pilots exhibited comprehension of, and appropriate prioritization within, the DAA-TCAS II combined alert structure. Pilots demonstrated a high rate of compliance with TCAS II RAs and were also seen to respond to corrective RAs within the five second requirement established for manned aircraft. The DAA system presented under test was also shown to be effective in supporting pilots’ ability to maintain well clear in the overwhelming majority of cases in which pilots had sufficient time to respond. The paper ends with a discussion of next steps for research on integrating UAS into civil airspace.

Keywords: detect and avoid, interoperability, traffic alert and collision avoidance system (TCAS II), unmanned aircraft systems

Procedia PDF Downloads 272
1717 ‘The Guilt Complex’: Assessing the Guilt of Youth Returning From Terrorist Groups in the Narratives of Justice Presentation on the Methodological Opportunities and Concerns in Operational Research

Authors: Arpita Mitra

Abstract:

The research explores the concept of ‘guilt’ as understood in relation to children and young individuals associated with terrorist groups who are exiting these groups and returning to civilian lives (‘young returnees’). The study explores young returnees’ guilt – in its psychological, legal, and sociological manifestations and how it contributes to experiences of reintegration and justice administration. Streamlining it further, the research question on assessing guilt engages with young adults – between 18 and 30 years – who were part of a terrorist organization during their formative years and have returned to civilian life. Overall, the findings of the said research are intended to contribute first-hand operational research to criminological literature as well as transitional justice mechanisms with regard to narratives on truth, justice, reparations and institutional reform/guarantees of non-recurrence. Particularly for this paper, the focus of the paper shall be on one aspect of this research, that is, on the added value of conducting operational research and the methodological challenges encountered during this process with regard to informed consent, data protection, mental health and security considerations for the respondents and researcher.

Keywords: terrorism, reintegration, young returnees, criminology

Procedia PDF Downloads 59
1716 Law as a Means to Address Conflict

Authors: Tim Bakken

Abstract:

The paper will discuss to what extent political polarization contributes to censorship, lack of civil discourse, and even violence. Most researchers have been unable to identify precisely what factors or processes contribute significantly to conflict. Absent such recognition, we have been unable to select effective remedies to address conflict. Through this paper, it will consider whether legal remedies can help to reduce conflict and polarization. My sense is that many current conflicts cannot be remedied primarily by law. But, there is little research on this hypothesis. Absent research and findings, nations may be looking to law for relief when, in fact, they should be looking at conditions underlying the formation of law or the absence of a more precise and effective legal remedy. It is hypothesized that the underlying reasons for conflict include sub-groups’ separation from the larger democratic society; misplaced loyalty to members of sub-groups; a culture of silence when recognizing wrongdoing; and retaliation against people who speak up. In sum, the greater distance citizens or institutions place between themselves and democratic norms, the more likely the members of a sub-group or institution will be to adopt conflict, even violence, as a method to obtain personal goals.

Keywords: constitutional law, conflict, criminal law, polarization

Procedia PDF Downloads 76
1715 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 271
1714 Shocks and Flows - Employing a Difference-In-Difference Setup to Assess How Conflicts and Other Grievances Affect the Gender and Age Composition of Refugee Flows towards Europe

Authors: Christian Bruss, Simona Gamba, Davide Azzolini, Federico Podestà

Abstract:

In this paper, the authors assess the impact of different political and environmental shocks on the size and on the age and gender composition of asylum-related migration flows to Europe. With this paper, the authors contribute to the literature by looking at the impact of different political and environmental shocks on the gender and age composition of migration flows in addition to the size of these flows. Conflicting theories predict different outcomes concerning the relationship between political and environmental shocks and the migration flows composition. Analyzing the relationship between the causes of migration and the composition of migration flows could yield more insights into the mechanisms behind migration decisions. In addition, this research may contribute to better informing national authorities in charge of receiving these migrant, as women and children/the elderly require different assistance than young men. To be prepared to offer the correct services, the relevant institutions have to be aware of changes in composition based on the shock in question. The authors analyze the effect of different types of shocks on the number, the gender and age composition of first time asylum seekers originating from 154 sending countries. Among the political shocks, the authors consider: violence between combatants, violence against civilians, infringement of political rights and civil liberties, and state terror. Concerning environmental shocks, natural disasters (such as droughts, floods, epidemics, etc.) have been included. The data on asylum seekers applying to any of the 32 Schengen Area countries between 2008 and 2015 is on a monthly basis. Data on asylum applications come from Eurostat, data on shocks are retrieved from various sources: georeferenced conflict data come from the Uppsala Conflict Data Program (UCDP), data on natural disasters from the Centre for Research on the Epidemiology of Disasters (CRED), data on civil liberties and political rights from Freedom House, data on state terror from the Political Terror Scale (PTS), GDP and population data from the World Bank, and georeferenced population data from the Socioeconomic Data and Applications Center (SEDAC). The authors adopt a Difference-in-Differences identification strategy, exploiting the different timing of several kinds of shocks across countries. The highly skewed distribution of the dependent variable is taken into account by using count data models. In particular, a Zero Inflated Negative Binomial model is adopted. Preliminary results show that different shocks - such as armed conflict and epidemics - exert weak immediate effects on asylum-related migration flows and almost non-existent effects on the gender and age composition. However, this result is certainly affected by the fact that no time lags have been introduced so far. Finding the correct time lags depends on a great many variables not limited to distance alone. Therefore, finding the appropriate time lags is still a work in progress. Considering the ongoing refugee crisis, this topic is more important than ever. The authors hope that this research contributes to a less emotionally led debate.

Keywords: age, asylum, Europe, forced migration, gender

Procedia PDF Downloads 261
1713 Legal Regulation and Critical Analysis for an Effectively Treatment of Pharmaceutical Waste

Authors: Merita Dauti, Edita Alili-Idrizi, Sihana Ahmeti –Lika, Ledjan Malaj

Abstract:

The extermination and proper disposal of pharmaceutical wastes from expired and unused medications remains a disputable issue due to their specific nature and characteristics. Even though the hazards from these wastes are already well known in terms of environment and human health, people still treat them as usual wastes. At a national level, in many countries the management of pharmaceutical and medical wastes has been one of the main objectives in order to protect people’s health and the environment. Even though many legal regulations exist in this respect, there has not been a single law that would clearly explain the procedures of returning medicines, ways of selection, treatment and extermination of pharmaceutical wastes. This paper aims at analyzing the practices of pharmaceutical waste management and treatment in some European countries as well as a review of the legislation and official guidelines in managing these kinds of wastes and protecting the environment and human health. A suitable treatment and management of expired medications and other similar wastes would be in the interest of public health in the first place, as well as in the interest of healthcare institutions and other bodies engaged in environment protection.

Keywords: pharmaceutical waste, legal regulation, proper disposal, environment pollution

Procedia PDF Downloads 333
1712 Study of Bored Pile Retaining Wall Using Physical Modeling

Authors: Amin Eslami, Jafar Bolouri Bazaz

Abstract:

Excavation and retaining walls are of challenging issues in civil engineering. In this study, the behavior of one the important type of supporting systems called Contiguous Bored Pile (CBP) retaining wall is investigated using a physical model. Besides, a comparison is made between two modes of free end piles(soft bed) and fixed end piles (stiff bed). Also a back calculation of effective length (the real free length of pile) is done by measuring lateral deflection of piles in different stages of excavation in both a forementioned cases. Based on observed results, for the fixed end mode, the effective length to free length ratio (Leff/L0) is equal to unity in initial stages of excavation and less than 1 in its final stages in a decreasing manner. While this ratio for free end mode, remains constant during all stages of excavation and is always less than unity.

Keywords: contiguous bored pile wall, effective length, fixed end, free end, free length

Procedia PDF Downloads 399
1711 Chemicals to Remove and Prevent Biofilm

Authors: Cynthia K. Burzell

Abstract:

Aequor's Founder, a Marine and Medical Microbiologist, discovered novel, non-toxic chemicals in the ocean that uniquely remove biofilm in minutes and prevent its formation for days. These chemicals and over 70 synthesized analogs that Aequor developed can replace thousands of toxic biocides used in consumer and industrial products and, as new drug candidates, kill biofilm-forming bacteria and fungi Superbugs -the antimicrobial-resistant (AMR) pathogens for which there is no cure. Cynthia Burzell, PhD., is a Marine and Medical Microbiologist studying natural mechanisms that inhibit biofilm formation on surfaces in contact with water. In 2002, she discovered a new genus and several new species of marine microbes that produce small molecules that remove biofilm in minutes and prevent its formation for days. The molecules include new antimicrobials that can replace thousands of toxic biocides used in consumer and industrial products and can be developed into new drug candidates to kill the biofilm-forming bacteria and fungi -- including the antimicrobial-resistant (AMR) Superbugs for which there is no cure. Today, Aequor has over 70 chemicals that are divided into categories: (1) Novel natural chemicals. Lonza validated that the primary natural chemical removed biofilm in minutes and stated: "Nothing else known can do this at non-toxic doses." (2) Specialty chemicals. 25 of these structural analogs are already approved under the U.S. Environmental Protection Agency (EPA)'s Toxic Substances Control Act, certified as "green" and available for immediate sale. These have been validated for the following agro-industrial verticals: (a) Surface cleaners: The U.S. Department of Agriculture validated that low concentrations of Aequor's formulations provide deep cleaning of inert, nano and organic surfaces and materials; (b) Water treatments: NASA validated that one dose of Aequor's treatment in the International Space Station's water reuse/recycling system lasted 15 months without replenishment. DOE validated that our treatments lower energy consumption by over 10% in buildings and industrial processes. Future validations include pilot projects with the EPA to test efficacy in hospital plumbing systems. (c) Algae cultivation and yeast fermentation: The U.S. Department of Energy (DOE) validated that Aequor's treatment boosted biomass of renewable feedstocks by 40% in half the time -- increasing the profitability of biofuels and biobased co-products. DOE also validated increased yields and crop protection of algae under cultivation in open ponds. A private oil and gas company validated decontamination of oilfield water. (3) New structural analogs. These kill Gram-negative and Gram-positive bacteria and fungi alone, in combinations with each other, and in combination with low doses of existing, ineffective antibiotics (including Penicillin), "potentiating" them to kill AMR pathogens at doses too low to trigger resistance. Both the U.S. National Institutes for Health (NIH) and Department of Defense (DOD) has executed contracts with Aequor to provide the pre-clinical trials needed for these new drug candidates to enter the regulatory approval pipelines. Aequor seeks partners/licensees to commercialize its specialty chemicals and support to evaluate the optimal methods to scale-up of several new structural analogs via activity-guided fractionation and/or biosynthesis in order to initiate the NIH and DOD pre-clinical trials.

Keywords: biofilm, potentiation, prevention, removal

Procedia PDF Downloads 99
1710 Ranking of Performance Measures of GSCM towards Sustainability: Using Analytic Hierarchy Process

Authors: Dixit Garg, S. Luthra, A. Haleem

Abstract:

During recent years, the natural environment has become a challenging topic that business organizations must consider due to the economic and ecological impacts and increasing awareness of environment protection among society. Organizations are trying to achieve the goals of improvement in environment, low cost, high quality, flexibility and more customer satisfaction. Performance measurement frameworks are very useful to monitor the performance of any organization. The basic goal of this paper is to identify performance measures and ranking of these performance measures of GSCM performance measurement towards sustainability framework. Five perspectives (Environment, Economic, Social, Operational and Cost performances) and nineteen performance measures of GSCM performance towards sustainability have been have been identified from extensive literature review. Analytical Hierarchy Process (AHP) technique has been utilized for ranking of these performance perspectives and measures. All pair comparisons in AHP have been made on the basis on the experts’ opinions (selected from academia and industry). Ranking of these performance perspectives and measures will help to understand the importance of environmental, economic, social, operational performances, and cost performances in the supply chain.

Keywords: analytical hierarchy process, green supply chain management, performance measures, sustainability

Procedia PDF Downloads 519
1709 Corporate Cautionary Statement: A Genre of Professional Communication

Authors: Chie Urawa

Abstract:

Cautionary statements or disclaimers in corporate annual reports need to be carefully designed because clear cautionary statements may protect a company in the case of legal disputes and may undermine positive impressions. This study compares the language of cautionary statements using two corpora, Sony’s cautionary statement corpus (S-corpus) and Panasonic’s cautionary statement corpus (P-corpus), illustrating the differences and similarities in relation to the use of meaningful cautionary statements and critically analyzing why practitioners use the way. The findings describe the distinct differences between the two companies in the presentation of the risk factors and the way how they make the statements. The word ability is used more for legal protection in S-corpus whereas the word possibility is used more to convey a better impression in P-corpus. The main similarities are identified in the use of lexical words and pronouns, and almost the same wordings for eight years. The findings show how they make the statements unique to the company in the presentation of risk factors, and the characteristics of specific genre of professional communication. Important implications of this study are that more comprehensive approach can be applied in other contexts, and be used by companies to reflect upon their cautionary statements.

Keywords: cautionary statements, corporate annual reports, corpus, risk factors

Procedia PDF Downloads 171
1708 Public Interest Law for Gender Equality: An Exploratory Study of the 'Single Woman Reproductive Rights' Movement in China

Authors: Xiaofei Zhu

Abstract:

As a 'weapon of the weak', the Public Interest Law can provide a better perspective for the cause of gender justice. In recent years, the legal practice of single female reproductive rights in China has already possessed the elements of public interest law activities and the possibility of public interest law operation. Through the general operating procedures of public interest law practice, that is, from the choice of subject, the planning of the case, the operation of the strategy and the later development, the paper analyzes the gains and losses of the legal practice of single female reproductive rights in China, and puts forward some ideas on its possible operation path. On this basis, it is believed that the cause of women's rights should be carried out under the broad human rights perspective; it is necessary to realize the particularity of different types of women's rights protection practice; the practice of public interest law needs to accurately grasp the constituent elements of all aspects of the case, and strive to find the opportunities of institutional and social change; the practice of public welfare law of gender justice should be carried out from a long-term perspective.

Keywords: single women’s reproductive rights, public interest law, gender justice, legal strategies, legal change

Procedia PDF Downloads 139
1707 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 305
1706 Characterization of Vegetable Wastes and Its Potential Use for Hydrogen and Methane Production via Dark Anaerobic Fermentation

Authors: Ajay Dwivedi, M. Suresh Kumar, A. N. Vaidya

Abstract:

The problem of fruit and vegetable waste management is a grave one and with ever increasing need to feed the exponentially growing population, more and more solid waste in the form of fruit and vegetables waste are generated and its management has become one of the key issues in protection of environment. Energy generation from fruit and vegetables waste by dark anaerobic fermentation is a recent an interesting avenue effective management of solid waste as well as for generating free and cheap energy. In the present study 17 vegetables were characterized for their physical as well as chemical properties, these characteristics were used to determine the hydrogen and methane potentials of vegetable from various models, and also lab scale batch experiments were performed to determine their actual hydrogen and methane production capacity. Lab scale batch experiments proved that vegetable waste can be used as effective substrate for bio hydrogen and methane production, however the expected yield of bio hydrogen and methane was much lower than predicted by models, this was due to the fact that other vital experimental parameters such as pH, total solids content, food to microorganism ratio was not optimized.

Keywords: vegetable waste, physico-chemical characteristics, hydrogen, methane

Procedia PDF Downloads 428
1705 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 172
1704 Simulation Study of Multiple-Thick Gas Electron Multiplier-Based Microdosimeters for Fast Neutron Measurements

Authors: Amir Moslehi, Gholamreza Raisali

Abstract:

Microdosimetric detectors based on multiple-thick gas electron multiplier (multiple-THGEM) configurations are being used in various fields of radiation protection and dosimetry. In the present work, microdosimetric response of these detectors to fast neutrons has been investigated by Monte Carlo method. Three similar microdosimeters made of A-150 and rexolite as the wall materials are designed; the first based on single-THGEM, the second based on double-THGEM and the third is based on triple-THGEM. Sensitive volume of the three microdosimeters is a right cylinder of 5 mm height and diameter which is filled with the propane-based tissue-equivalent (TE) gas. The TE gas with 0.11 atm pressure at the room temperature simulates 1 µm of tissue. Lineal energy distributions for several neutron energies from 10 keV to 14 MeV including 241Am-Be neutrons are calculated by the Geant4 simulation toolkit. Also, mean quality factor and dose-equivalent value for any neutron energy has been determined by these distributions. Obtained data derived from the three microdosimeters are in agreement. Therefore, we conclude that the multiple-THGEM structures present similar microdosimetric responses to fast neutrons.

Keywords: fast neutrons, geant4, multiple-thick gas electron multiplier, microdosimeter

Procedia PDF Downloads 350
1703 Hyperspectral Mapping Methods for Differentiating Mangrove Species along Karachi Coast

Authors: Sher Muhammad, Mirza Muhammad Waqar

Abstract:

It is necessary to monitor and identify mangroves types and spatial extent near coastal areas because it plays an important role in coastal ecosystem and environmental protection. This research aims at identifying and mapping mangroves types along Karachi coast ranging from 24.79 to 24.85 degree in latitude and 66.91 to 66.97 degree in longitude using hyperspectral remote sensing data and techniques. Image acquired during February, 2012 through Hyperion sensor have been used for this research. Image preprocessing includes geometric and radiometric correction followed by Minimum Noise Fraction (MNF) and Pixel Purity Index (PPI). The output of MNF and PPI has been analyzed by visualizing it in n-dimensions for end-member extraction. Well-distributed clusters on the n-dimensional scatter plot have been selected with the region of interest (ROI) tool as end members. These end members have been used as an input for classification techniques applied to identify and map mangroves species including Spectral Angle Mapper (SAM), Spectral Feature Fitting (SFF), and Spectral Information Diversion (SID). Only two types of mangroves namely Avicennia Marina (white mangroves) and Avicennia Germinans (black mangroves) have been observed throughout the study area.

Keywords: mangrove, hyperspectral, hyperion, SAM, SFF, SID

Procedia PDF Downloads 362
1702 Wind Fragility for Honeycomb Roof Cladding Panels Using Screw Pull-Out Capacity

Authors: Viriyavudh Sim, Woo Young Jung

Abstract:

The failure of roof cladding mostly occurs due to the failing of the connection between claddings and purlins, which is the pull-out of the screw connecting the two parts when the pull-out load, i.e. typhoon, is higher than the resistance of the connection screw. As typhoon disasters in Korea are constantly on the rise, probability risk assessment (PRA) has become a vital tool to evaluate the performance of civil structures. In this study, we attempted to determine the fragility of roof cladding with the screw connection. Experimental study was performed to evaluate the pull-out resistance of screw joints between honeycomb panels and back frames. Subsequently, by means of Monte Carlo Simulation method, probability of failure for these types of roof cladding was determined. The results that the failure of roof cladding was depends on their location on the roof, for example, the edge most panel has the highest probability of failure.

Keywords: Monte Carlo Simulation, roof cladding, screw pull-out strength, wind fragility

Procedia PDF Downloads 253