Search results for: security safe
2976 Climate Adaptations to Traditional Milpa Farming Practices in Mayan Communities of Southern Belize: A Socio-Ecological Systems Approach
Authors: Kristin Drexler
Abstract:
Climate change has exacerbated food and livelihood insecurity for Mayan milpa farmers in Central America. For centuries, milpa farming has been sustainable for subsistence; however, in the last 50 years, milpas have become less reliable due to accelerating climate change, resource degradation, declining markets, poverty, and other factors. Using interviews with extension leaders and milpa farmers in Belize, this qualitative study examines the capacity for increasing climate-smart agriculture (CSA) aspects of existing traditional milpa practices, specifically no-burn mulching, soil enrichment, and the use of cover plants. Applying community capitals and socio-ecological systems frameworks, this study finds four key capitals were perceived by farmers and agriculture extension leaders as barriers for increasing CSA practices: (1) human-capacity, (2) financial, (3) infrastructure, and (4) governance-justice capitals. The key barriers include a lack of CSA technology and pest management knowledge-sharing (human-capacity), unreliable roads and utility services (infrastructure), the closure of small markets and crop-buying programs in Belize (financial), and constraints on extension services and exacerbating a sense of marginalization in Maya communities (governance-justice). Recommendations are presented for government action to reduce barriers and facilitate an increase in milpa crop productivity, promote food and livelihood security, and enable climate resilience of Mayan milpa communities in Belize.Keywords: socio-ecological systems, community capitals, climate-smart agriculture, food security, milpa, Belize
Procedia PDF Downloads 932975 Factors Influencing the Decision of International Tourists to Revisit Bangkok,Thailand
Authors: Taksina Bunbut, Kevin Wongleedee
Abstract:
The purposes of this research were to study factors influencing the decision of international tourists to revisit Bangkok, Thailand. A random 200 samples was collected. Half the sample group was male and the other half was female. A questionnaire was used to collect data and small in-depth interviews were also used to get their opinions about importance of tourist decision making factors. The findings revealed that the majority of respondents rated these factors at medium level of importance. The ranking showed that the first three important factors were a safe place to stay, friendly people, and clean food. The three least important factors were a convenience transportation, clean country, and child friendly. In addition there was no significance difference between male and female in their ratings of the factors of influencing the decision of international tourists to revisit Bangkok, Thailand.Keywords: factors, international tourists, revisit, Thailand
Procedia PDF Downloads 3312974 Catalytic Depolymerisation of Waste Plastic Material into Hydrocarbon Liquid
Authors: Y. C. Bhattacharyulu, Amit J. Agrawal, Vikram S. Chatake, Ketan S. Desai
Abstract:
In recent years, the improper disposal of waste polymeric materials like plastics, rubber, liquid containers, daily household materials, etc. is posing a grave problem by polluting the environment. On the other hand fluctuations in the oil market and limited stocks of fossil fuels have diverted the interest of researchers to study the production of fuels and hydrocarbons from alternative sources. Hence, to study the production of fuels from waste plastic is the need of hour at present. Effect of alkali solutions of different concentrations with copper comprising catalyst on depolymerisation reactions was studied here. The present study may become a preliminary method for obtaining valuable hydrocarbons from waste plastics and an effective way for depolymerising or degrading waste plastics for their safe disposal without causing any environmental problems.Keywords: catalyst, depolymerisation, disposal, hydrocarbon liquids, waste plastic
Procedia PDF Downloads 2702973 Modelling the Dynamics and Optimal Control Strategies of Terrorism within the Southern Borno State Nigeria
Authors: Lubem Matthew Kwaghkor
Abstract:
Terrorism, which remains one of the largest threats faced by various nations and communities around the world, including Nigeria, is the calculated use of violence to create a general climate of fear in a population to attain particular goals that might be political, religious, or economical. Several terrorist groups are currently active in Nigeria, leading to attacks on both civil and military targets. Among these groups, Boko Haram is the deadliest terrorist group operating majorly in Borno State. The southern part of Borno State in North-Eastern Nigeria has been plagued by terrorism, insurgency, and conflict for several years. Understanding the dynamics of terrorism is crucial for developing effective strategies to mitigate its impact on communities and to facilitate peace-building efforts. This research aims to develop a mathematical model that captures the dynamics of terrorism within the southern part of Borno State, Nigeria, capturing both government and local community intervention strategies as control measures in combating terrorism. A compartmental model of five nonlinear differential equations is formulated. The model analyses show that a feasible solution set of the model exists and is bounded. Stability analyses show that both the terrorism free equilibrium and the terrorism endermic equilibrium are asymptotically stable, making the model to have biological meaning. Optimal control theory will be employed to identify the most effective strategy to prevent or minimize acts of terrorism. The research outcomes are expected to contribute towards enhancing security and stability in Southern Borno State while providing valuable insights for policymakers, security agencies, and researchers. This is an ongoing research.Keywords: modelling, terrorism, optimal control, susceptible, non-susceptible, community intervention
Procedia PDF Downloads 292972 Foreseen the Future: Human Factors Integration in European Horizon Projects
Authors: José Manuel Palma, Paula Pereira, Margarida Tomás
Abstract:
Foreseen the future: Human factors integration in European Horizon Projects The development of new technology as artificial intelligence, smart sensing, robotics, cobotics or intelligent machinery must integrate human factors to address the need to optimize systems and processes, thereby contributing to the creation of a safe and accident-free work environment. Human Factors Integration (HFI) consistently pose a challenge for organizations when applied to daily operations. AGILEHAND and FORTIS projects are grounded in the development of cutting-edge technology - industry 4.0 and 5.0. AGILEHAND aims to create advanced technologies for autonomously sort, handle, and package soft and deformable products, whereas FORTIS focuses on developing a comprehensive Human-Robot Interaction (HRI) solution. Both projects employ different approaches to explore HFI. AGILEHAND is mainly empirical, involving a comparison between the current and future work conditions reality, coupled with an understanding of best practices and the enhancement of safety aspects, primarily through management. FORTIS applies HFI throughout the project, developing a human-centric approach that includes understanding human behavior, perceiving activities, and facilitating contextual human-robot information exchange. it intervention is holistic, merging technology with the physical and social contexts, based on a total safety culture model. In AGILEHAND we will identify safety emergent risks, challenges, their causes and how to overcome them by resorting to interviews, questionnaires, literature review and case studies. Findings and results will be presented in “Strategies for Workers’ Skills Development, Health and Safety, Communication and Engagement” Handbook. The FORTIS project will implement continuous monitoring and guidance of activities, with a critical focus on early detection and elimination (or mitigation) of risks associated with the new technology, as well as guidance to adhere correctly with European Union safety and privacy regulations, ensuring HFI, thereby contributing to an optimized safe work environment. To achieve this, we will embed safety by design, and apply questionnaires, perform site visits, provide risk assessments, and closely track progress while suggesting and recommending best practices. The outcomes of these measures will be compiled in the project deliverable titled “Human Safety and Privacy Measures”. These projects received funding from European Union’s Horizon 2020/Horizon Europe research and innovation program under grant agreement No101092043 (AGILEHAND) and No 101135707 (FORTIS).Keywords: human factors integration, automation, digitalization, human robot interaction, industry 4.0 and 5.0
Procedia PDF Downloads 762971 The Crossroads of Corruption and Terrorism in the Global South
Authors: Stephen M. Magu
Abstract:
The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.Keywords: corruption, global south, identification, passports, terrorism
Procedia PDF Downloads 4242970 Combination between Intrusion Systems and Honeypots
Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal
Abstract:
Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor
Procedia PDF Downloads 3882969 Incorporating Moving Authority Limits Into Driving Advice
Authors: Peng Zhou, Peter Pudney
Abstract:
Driver advice systems are used by many rail operators to help train drivers to improve timekeeping while minimising energy use. These systems typically operate independently of the safeworking system, because information on how far the train is allowed to travel -the “limit of authority"- is usually not available as real-time data that can be used when generating driving advice. This is not an issue when there is sufficient separation between trains. But on systems with low headways, driving advice could conflict with safeworking requirements. We describe a method for generating driving advice that takes into account a moving limit of authority that is communicated to the train in real-time. We illustrate the method with four simulated examples using data from the Zhengzhou Metro. The method will allow driver advice systems to be used more effectively on railways with low headways.Keywords: railway transportation, energy efficient train operation, optimal train control, safe separation
Procedia PDF Downloads 162968 Integral Abutment Bridge: A Study on Types, Importance, Limitations and Design Guidelines
Authors: Babitha Elizabeth Philip
Abstract:
This paper aims to study in general about bridges without expansion joints. Integral Abutment Bridges (IAB) fall into this category of bridges. They are having a continuous deck and also the girders are integrated into the abutments. They are most cost effective system in terms of construction, maintenance, and longevity. The main advantage of IAB is that it is corrosion resistant since water is not allowed to pass through the structure. The other attractions of integral bridges are its simple and rapid construction, smooth and uninterrupted deck which provides a safe ride. Also damages to the abutments can be avoided to a great extent due to better load distribution at the bridge ends. Damages due to improper drainage are not seen in IAB because of its properly drained approach slabs thus eliminating the possibility of erosion of the abutment backfill and freeze and thaw damage resulting from saturated backfill.Keywords: continuous bridge, integral abutment bridge, joint bridge, life cycle cost, soil interaction
Procedia PDF Downloads 4572967 The Development and Provision of a Knowledge Management Ecosystem, Optimized for Genomics
Authors: Matthew I. Bellgard
Abstract:
The field of bioinformatics has made, and continues to make, substantial progress and contributions to life science research and development. However, this paper contends that a systems approach integrates bioinformatics activities for any project in a defined manner. The application of critical control points in this bioinformatics systems approach may be useful to identify and evaluate points in a pathway where specified activity risk can be reduced, monitored and quality enhanced.Keywords: bioinformatics, food security, personalized medicine, systems approach
Procedia PDF Downloads 4282966 Cloud Computing Impact on e-Government Adoption
Authors: Ali Elshabrawy
Abstract:
Cloud computing is expected to be important for e Government in near future. Governments need it for solving some of its e Government, financial, infrastructure, legacy systems and integration problems. It reduces information technology (IT) infrastructure needs and support costs, and offers on-demand infrastructure and computational power, improved collaboration capabilities, which are important for e Government projects start up and sustainability. Budget pressures will continue to drive more and more government IT to hybrid and even public clouds, and more cooperation between cloud service providers and governmental agencies are expected, Or developing governmental private, community clouds. Motivation to convince governments to use cloud computing services, will create a pressure on cloud service providers to cope with government's requirements for interoperability, security standards, open data and integration between their cloud systems There will be significant legal action arising out of governmental uses of cloud computing, and legislation addressing both IT and business needs and consumer fears and protections. Cloud computing is a considered a revolution for IT and E business in general and e commerce, e Government in particular. As governments faces increasing challenges regarding IT infrastructure required for e Government projects implementation. As a result of Lack of required financial resources allocated for e Government projects in developed and developing countries. Cloud computing can play a major role to solve some of e Government projects challenges such as, lack of financial resources, IT infrastructure, Human resources trained to manage e Government applications, interoperability, cost efficiency challenges. If we could solve some security issues related to cloud computing usage which considered critical for e Government projects. Pretty sure it’s Just a matter of time before cloud service providers will find out solutions to attract governments as major customers for their business.Keywords: cloud computing, e-government, adoption, supply side barriers, e-government requirements, challenges
Procedia PDF Downloads 3512965 Formal Models of Sanitary Inspections Teams Activities
Authors: Tadeusz Nowicki, Radosław Pytlak, Robert Waszkowski, Jerzy Bertrandt, Anna Kłos
Abstract:
This paper presents methods for formal modeling of activities in the area of sanitary inspectors outbreak of food-borne diseases. The models allow you to measure the characteristics of the activities of sanitary inspection and as a result allow improving the performance of sanitary services and thus food security.Keywords: food-borne disease, epidemic, sanitary inspection, mathematical models
Procedia PDF Downloads 3072964 A Machine Learning Approach for Detecting and Locating Hardware Trojans
Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He
Abstract:
The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.Keywords: hardware trojans, physical properties, machine learning, hardware security
Procedia PDF Downloads 1532963 Factors Affecting M-Government Deployment and Adoption
Authors: Saif Obaid Alkaabi, Nabil Ayad
Abstract:
Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.Keywords: e-government, m-government, system dependability, system security, trust
Procedia PDF Downloads 3852962 Geospatial Modeling Framework for Enhancing Urban Roadway Intersection Safety
Authors: Neeti Nayak, Khalid Duri
Abstract:
Despite the many advances made in transportation planning, the number of injuries and fatalities in the United States which involve motorized vehicles near intersections remain largely unchanged year over year. Data from the National Highway Traffic Safety Administration for 2018 indicates accidents involving motorized vehicles at traffic intersections accounted for 8,245 deaths and 914,811 injuries. Furthermore, collisions involving pedal cyclists killed 861 people (38% at intersections) and injured 46,295 (68% at intersections), while accidents involving pedestrians claimed 6,247 lives (25% at intersections) and injured 71,887 (56% at intersections)- the highest tallies registered in nearly 20 years. Some of the causes attributed to the rising number of accidents relate to increasing populations and the associated changes in land and traffic usage patterns, insufficient visibility conditions, and inadequate applications of traffic controls. Intersections that were initially designed with a particular land use pattern in mind may be rendered obsolete by subsequent developments. Many accidents involving pedestrians are accounted for by locations which should have been designed for safe crosswalks. Conventional solutions for evaluating intersection safety often require costly deployment of engineering surveys and analysis, which limit the capacity of resource-constrained administrations to satisfy their community’s needs for safe roadways adequately, effectively relegating mitigation efforts for high-risk areas to post-incident responses. This paper demonstrates how geospatial technology can identify high-risk locations and evaluate the viability of specific intersection management techniques. GIS is used to simulate relevant real-world conditions- the presence of traffic controls, zoning records, locations of interest for human activity, design speed of roadways, topographic details and immovable structures. The proposed methodology provides a low-cost mechanism for empowering urban planners to reduce the risks of accidents using 2-dimensional data representing multi-modal street networks, parcels, crosswalks and demographic information alongside 3-dimensional models of buildings, elevation, slope and aspect surfaces to evaluate visibility and lighting conditions and estimate probabilities for jaywalking and risks posed by blind or uncontrolled intersections. The proposed tools were developed using sample areas of Southern California, but the model will scale to other cities which conform to similar transportation standards given the availability of relevant GIS data.Keywords: crosswalks, cyclist safety, geotechnology, GIS, intersection safety, pedestrian safety, roadway safety, transportation planning, urban design
Procedia PDF Downloads 1122961 Is More Inclusive More Effective? The 'New Style' Public Distribution System in India
Authors: Avinash Kishore, Suman Chakrabarti
Abstract:
In September 2013, the parliament of India enacted the National Food Security Act (NFSA) which entitles two-thirds of India’s population to five kilograms of rice, wheat or coarse cereals per person per month at one to three rupees per kilogram. Five states in India—Andhra Pradesh, Chhattisgarh, Tamil Nadu, Odisha and West Bengal—had already implemented somewhat similar changes in the TPDS a few years earlier using their own budgetary resources. They made rice—coincidentally, all five states are predominantly rice-eating—available in fair price shops to a majority of their population at very low prices (less than Rs.3/kg). This paper tries to account for the changes in household consumption patterns associated with the change in TPDS policy in these states using data from household consumption surveys by the National Sample Survey Organization (NSSO). NSS data show improvement in the coverage of TPDS and average off-take of grains from fair price shops between 2004-05 and 2009-10 across all states of India. However, the increase in coverage and off-take was significantly higher in four out of these five states than in the rest of India. An average household in these states purchased three kilos more rice per month from fair price shops than its counterpart in non-treated states as a result of more generous TPDS policies backed by administrative reforms. The increase in consumption of PDS rice was the highest in Chhattisgarh, the poster state of PDS reforms. Households in Chhattisgarh used money saved on rice to spend more on pulses, edible oil, vegetables and sugar and other non-food items. We also find evidence that making TPDS more inclusive and more generous is not enough unless it is supported by administrative reforms to improve grain delivery and control diversion to open markets.Keywords: public distribution system, social safety-net, national food security act, diet quality, Chhattisgarh
Procedia PDF Downloads 3762960 Water Safety Strategies by Service: A Study of Implementation Studies
Authors: Prince Amartey
Abstract:
Water is critical to public health, quality of life, environmental preservation, economic activity, and long-term growth. In this environment, it is critical to ensure the ongoing improvement of all processes and practices that contribute to the quality and safety of water. Water safety plans (WSPs) developed by water companies are an essential public policy instrument for achieving these objectives. This manuscript examines international evidence of water safety planning adoption and implementation and reports on the current situation in Portugal as part of the necessary adaptation of the national legal framework to the publication of the Directive on water quality for human consumption. The goal is to take lessons from various successful WSP projects throughout the world while writing new legislation in Ghana and elsewhere. According to the findings, four crucial aspects and key factors of success in establishing and implementing WSPs exist commitment from leadership, technical proficiency, administration, and cooperation among agencies.Keywords: safe drinking, risk, policy, implementation
Procedia PDF Downloads 922959 Analysis of Hydraulic Velocity in Fishway Using CCHE2D Model
Authors: Amir Abbas Kamanbedast, Masood Mohammad Shafipor, Amir Ghotboddin
Abstract:
Fish way is a structure that in generally using to migrate to the place where they are spawned and is made near the spillway. Preventing fish spawning or migrating to their original place by fishway structures can affect their lives in the river or even erase one access to intended environment. The main objective of these structures is establishing a safe path for fish migration. In the present study first the hydraulic specifications of Hamidieh diversion dam were assessed and then it is problems were evaluated. In this study the dimensions of the fish way, including velocity of pools, were evaluated by CCHE2D software. Then by change slope in this structure streamlines like velocity in the pools were measured. For calibration can be use measuring local velocities in some pools. The information can be seen the fishway width of 0.3 m has minimum rate of descent in the total number of structures (pools and overflow).Keywords: fishway, velocity, Hamidieh-Diversion Dam, CCHE2D model
Procedia PDF Downloads 4992958 Free Radical Scavenging Activity and Total Phenolic Assessment of Drug Repurposed Medicinal Plant Metabolites: Promising Tools against Post COVID-19 Syndromes and Non-Communicable Diseases in Botswana
Authors: D. Motlhanka, M. Mine, T. Bagaketse, T. Ngakane
Abstract:
There is a plethora of evidence from numerous sources that highlights the triumph of naturally derived medicinal plant metabolites with antioxidant capability for repurposed therapeutics. As post-COVID-19 syndromes and non-communicable diseases are on the rise, there is an urgent need to come up with new therapeutic strategies to address the problem. Non-communicable diseases and Post COVID-19 syndromes are classified as socio-economic diseases and are ranked high among threats to health security due to the economic burden they pose to any government budget commitment. Research has shown a strong link between accumulation of free radicals and oxidative stress critical for pathogenesis of non-communicable diseases and COVID-19 syndromes. Botswana has embarked on a robust programme derived from ethno-pharmacognosy and drug repurposing to address these threats to health security. In the current approach, a number of medicinally active plant-derived polyphenolics are repurposed and combined into new medicinal tools to target diabetes, Hypertension, Prostate Cancer and oxidative stress induced Post COVID 19 syndromes such as “brain fog”. All four formulants demonstrated Free Radical scavenging capacities above 95% at 200µg/ml using the diphenylpicryalhydrazyl free radical scavenging assay and the total phenolic contents between 6899-15000GAE(g/L) using the folin-ciocalteau assay respectively. These repurposed medicinal tools offer new hope and potential in the fight against emerging health threats driven by hyper-inflammation and free radical-induced oxidative stress.Keywords: drug repurposed plant polyphenolics, free radical damage, non-communicable diseases, post COVID 19 syndromes
Procedia PDF Downloads 1352957 Solving LWE by Pregressive Pumps and Its Optimization
Authors: Leizhang Wang, Baocang Wang
Abstract:
General Sieve Kernel (G6K) is considered as currently the fastest algorithm for the shortest vector problem (SVP) and record holder of open SVP challenge. We study the lattice basis quality improvement effects of the Workout proposed in G6K, which is composed of a series of pumps to solve SVP. Firstly, we use a low-dimensional pump output basis to propose a predictor to predict the quality of high-dimensional Pumps output basis. Both theoretical analysis and experimental tests are performed to illustrate that it is more computationally expensive to solve the LWE problems by using a G6K default SVP solving strategy (Workout) than these lattice reduction algorithms (e.g. BKZ 2.0, Progressive BKZ, Pump, and Jump BKZ) with sieving as their SVP oracle. Secondly, the default Workout in G6K is optimized to achieve a stronger reduction and lower computational cost. Thirdly, we combine the optimized Workout and the Pump output basis quality predictor to further reduce the computational cost by optimizing LWE instances selection strategy. In fact, we can solve the TU LWE challenge (n = 65, q = 4225, = 0:005) 13.6 times faster than the G6K default Workout. Fourthly, we consider a combined two-stage (Preprocessing by BKZ- and a big Pump) LWE solving strategy. Both stages use dimension for free technology to give new theoretical security estimations of several LWE-based cryptographic schemes. The security estimations show that the securities of these schemes with the conservative Newhope’s core-SVP model are somewhat overestimated. In addition, in the case of LAC scheme, LWE instances selection strategy can be optimized to further improve the LWE-solving efficiency even by 15% and 57%. Finally, some experiments are implemented to examine the effects of our strategies on the Normal Form LWE problems, and the results demonstrate that the combined strategy is four times faster than that of Newhope.Keywords: LWE, G6K, pump estimator, LWE instances selection strategy, dimension for free
Procedia PDF Downloads 642956 Calculus of Turbojet Performances for Ideal Case
Authors: S. Bennoud, S. Hocine, H. Slme
Abstract:
Developments in turbine cooling technology play an important role in increasing the thermal efficiency and the power output of recent gas turbines, in particular the turbojets. Advanced turbojets operate at high temperatures to improve thermal efficiency and power output. These temperatures are far above the permissible metal temperatures. Therefore, there is a critical need to cool the blades in order to give theirs a maximum life period for safe operation. The focused objective of this work is to calculate the turbojet performances, as well as the calculation of turbine blades cooling. The developed application able the calculation of turbojet performances to different altitudes in order to find a point of optimal use making possible to maintain the turbine blades at an acceptable maximum temperature and to limit the local variations in temperatures in order to guarantee their integrity during all the lifespan of the engine.Keywords: brayton cycle, turbine blades cooling, turbojet cycle, turbojet performances
Procedia PDF Downloads 2252955 The Effect of Cinnamaldehyde on Escherichia coli Survival during Low Temperature Long Time Cooking
Authors: Fuji Astuti, Helen Onyeaka
Abstract:
The aim of the study was to investigate the combine effects of cinnamaldehyde (0.25 and 0.45% v/v) on thermal resistance of pathogenic Escherichia coli during low temperature long time (LT-LT) cooking below 60℃. Three different static temperatures (48, 53 and 50℃) were performed, and the number of viable cells was studied. The starting concentrations of cells were 10⁸ CFU/ml. In this experiment, heat treatment efficiency for safe reduction indicated by decimal logarithm reduction of viable recovered cells, which was monitored for heating over 6 hours. Thermal inactivation was measured by means of establishing the death curves between the mean log surviving cells (log₁₀ CFU/ml) and designated time points (minutes) for each temperature test. The findings depicted that addition of cinnamaldehyde exhibited to elevate the thermal sensitivity of E. coli. However, the injured cells found to be well-adapted to all temperature tests after certain time point of cooking, in which they grew to more than 10⁵ CFU/ml.Keywords: cinnamaldehyde, decimal logarithm reduction, Escherichia coli, LT-LT cooking
Procedia PDF Downloads 3602954 Longitudinal Static and Dynamic Stability of a Typical Reentry Body in Subsonic Conditions Using Computational Fluid Dynamics
Authors: M. Jathaveda, Joben Leons, G. Vidya
Abstract:
Reentry from orbit is a critical phase in the entry trajectory. For a non-propulsive ballistic entry, static and dynamic stability play an important role in the trajectory, especially for the safe deployment of parachutes, typically at subsonic Mach numbers. Static stability of flight vehicles are being estimated through CFD techniques routinely. Advances in CFD software as well as computational facilities have enabled the estimation of the dynamic stability derivatives also through CFD techniques. Longitudinal static and dynamic stability of a typical reentry body for subsonic Mach number of 0.6 is predicted using commercial software CFD++ and presented here. Steady state simulations are carried out for α = 2° on an unstructured grid using SST k-ω model. Transient simulation using forced oscillation method is used to compute pitch damping derivatives.Keywords: stability, typical reentry body, subsonic, static and dynamic
Procedia PDF Downloads 1202953 Soft Infrastructure in Tourism Development
Authors: Seetanah Boopen, Padachi Kesseven, R. Juwaheer , R. V. Sannassee, M. L. Lamport
Abstract:
This study aims primarily at investigating the importance of soft infrastructure in tourism development for the case of an island economy namely Mauritius. The study in the first place assesses the level of perceived and actual satisfaction of the present state of the different types of soft tourism infrastructure and the allied services provided by tourism stakeholders in Mauritius and address the identified gaps. In order to address the study objectives, a rigorous survey analysis among 1741 international tourists at the departure lounge of the Sir Seewoosagur International Airport of Mauritius was carried out. The respondents placed significant emphasis on the different elements of the soft infrastructure dimension, where many of the elements falling under this dimension were rated with a high mean score. In particular the visitors rated communication, both internet and telephone services, and security to be most important. Significant gap has been found in the categories of ‘Health’ and ‘Security’. This indicates that the tourists ascribe high importance to the soft infrastructure dimension. The link between the respondent profile and the key variables which influence the tourist choice of the island as a destination are found to be equally important for most of the international tourists. However, these were deemed to be more critical for tourists travelling with family members. Although the survey instrument attempted to measure any gap between on the one hand, the importance of the infrastructure dimension and on the other hand, the level of satisfaction with the infrastructure dimension, overall the results do not show any statistically significant gap among the different elements of the infrastructural dimension. The study dwells into further analysis by engaging into an econometric framework related to a Probit Model, using the data collected, to gauge the effect of soft infrastructure on tourist intention to repeat or recommend the destination. The results confirm that soft infrastructure is found to be sensible to tourists, although relatively less sensitive as compared to tourism and transport and hotel infrastructure.Keywords: tourism development, soft infrastructure, Mauritius, hotel infrastructure
Procedia PDF Downloads 4902952 The Effectiveness of an Occupational Therapy Metacognitive-Functional Intervention for the Improvement of Human Risk Factors of Bus Drivers
Authors: Navah Z. Ratzon, Rachel Shichrur
Abstract:
Background: Many studies have assessed and identified the risk factors of safe driving, but there is relatively little research-based evidence concerning the ability to improve the driving skills of drivers in general and in particular of bus drivers, who are defined as a population at risk. Accidents involving bus drivers can endanger dozens of passengers and cause high direct and indirect damages. Objective: To examine the effectiveness of a metacognitive-functional intervention program for the reduction of risk factors among professional drivers relative to a control group. Methods: The study examined 77 bus drivers working for a large public company in the center of the country, aged 27-69. Twenty-one drivers continued to the intervention stage; four of them dropped out before the end of the intervention. The intervention program we developed was based on previous driving models and the guiding occupational therapy practice framework model in Israel, while adjusting the model to the professional driving in public transportation and its particular risk factors. Treatment focused on raising awareness to safe driving risk factors identified at prescreening (ergonomic, perceptual-cognitive and on-road driving data), with reference to the difficulties that the driver raises and providing coping strategies. The intervention has been customized for each driver and included three sessions of two hours. The effectiveness of the intervention was tested using objective measures: In-Vehicle Data Recorders (IVDR) for monitoring natural driving data, traffic accident data before and after the intervention, and subjective measures (occupational performance questionnaire for bus drivers). Results: Statistical analysis found a significant difference between the degree of change in the rate of IVDR perilous events (t(17)=2.14, p=0.046), before and after the intervention. There was significant difference in the number of accidents per year before and after the intervention in the intervention group (t(17)=2.11, p=0.05), but no significant change in the control group. Subjective ratings of the level of performance and of satisfaction with performance improved in all areas tested following the intervention. The change in the ‘human factors/person’ field, was significant (performance : t=- 2.30, p=0.04; satisfaction with performance : t=-3.18, p=0.009). The change in the ‘driving occupation/tasks’ field, was not significant but showed a tendency toward significance (t=-1.94, p=0.07,). No significant differences were found in driving environment-related variables. Conclusions: The metacognitive-functional intervention significantly improved the objective and subjective measures of safety of bus drivers’ driving. These novel results highlight the potential contribution of occupational therapists, using metacognitive functional treatment, to preventing car accidents among the healthy drivers population and improving the well-being of these drivers. This study also enables familiarity with advanced technologies of IVDR systems and enriches the knowledge of occupational therapists in regards to using a wide variety of driving assessment tools and making the best practice decisions.Keywords: bus drivers, IVDR, human risk factors, metacognitive-functional intervention
Procedia PDF Downloads 3492951 Adoption of Climate-Smart Agriculture Practices Among Farmers and Its Effect on Crop Revenue in Ethiopia
Authors: Fikiru Temesgen Gelata
Abstract:
Food security, adaptation, and climate change mitigation are all problems that can be resolved simultaneously with Climate-Smart Agriculture (CSA). This study examines determinants of climate-smart agriculture (CSA) practices among smallholder farmers, aiming to understand the factors guiding adoption decisions and evaluate the impact of CSA on smallholder farmer income in the study areas. For this study, three-stage sampling techniques were applied to select 230 smallholders randomly. Mann-Kendal test and multinomial endogenous switching regression model were used to analyze trends of decrease or increase within long-term temporal data and the impact of CSA on the smallholder farmer income, respectively. Findings revealed education level, household size, land ownership, off-farm income, climate information, and contact with extension agents found to be highly adopted CSA practices. On the contrary, erosion exerted a detrimental impact on all the agricultural practices examined within the study region. Various factors such as farming methods, the size of farms, proximity to irrigated farmlands, availability of extension services, distance to market hubs, and access to weather forecasts were recognized as key determinants influencing the adoption of CSA practices. The multinomial endogenous switching regression model (MESR) revealed that joint adoption of crop rotation and soil and water conservation practices significantly increased farm income by 1,107,245 ETB. The study recommends that counties and governments should prioritize addressing climate change in their development agendas to increase the adoption of climate-smart farming techniques.Keywords: climate-smart practices, food security, Oincome, MERM, Ethiopia
Procedia PDF Downloads 482950 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks
Authors: Andrew D. Henshaw, James M. Austin
Abstract:
Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money
Procedia PDF Downloads 952949 Insecticidal Effects of Plant Extracts of Thymus daenensis and Eucalyptus camaldulensis on Callosobruchus maculatus (Coleoptera: Bruchidae)
Authors: Afsoon Danesh Afrooz, Sohrab Imani, Ali Ahadiyat, Aref Maroof, Yahya Ostadi
Abstract:
This study has been investigated for finding alternative and safe botanical pesticides instead of chemical insecticides. The effects of plant extracts of Eucalyptus camaldulensis and Thymus daenensis were tested against adult of Callosobrochus maculatus F. Experiments were carried out at 27±1°C and 60 ± 5% R. H. under dark condition with adopting a complete randomized block design. Three replicates were set up for five concentrations of each plants extract. LC50 values were determined by SPSS 16.0 software. LC50 values indicated that plant extract of Thymus daenensis with 1.708 (µl/l air) against adult was more effective than the plant extract of Eucalyptus camaldulensis with LC50 12.755 (µl/l air). It was found that plant extract of Thymus daenensis in comparison with extract of Eucalyptus camaldulensis could be used as a pesticide for control store pests.Keywords: callosobruchus maculatus, Eucalyptus camaldulensis, insecticidal effects, Thymus daenensis
Procedia PDF Downloads 3292948 Structural Analysis of Hydro-Turbine Head Cover Using Ansys
Authors: Surjit Angra, Manisha Kumari, Vinod Kumar
Abstract:
The objective of the Hydro Turbine Head Cover is to support the guide bearing, guide vane regulating mechanism and even in some design for generator thrust bearing support. Mechanical design of head cover deals with high static as well as fluctuating load acting on the structure. In the present work structural analysis of hydro turbine Head-cover using ANSYS software is carried out. Finite element method is used to calculate stresses on head cover. These calculations were done for the maximum possible loading under operating condition “LCI Quick Shut Down”. The results for equivalent Von-Mises stress, total deformation and directional deformation have been plotted and compared with the existing results whether the design is safe or not.Keywords: ANSYS, head cover, hydro-turbine, structural analysis, total deformation, Von-Mises stress
Procedia PDF Downloads 5382947 Road Safety in the Great Britain: An Exploratory Data Analysis
Authors: Jatin Kumar Choudhary, Naren Rayala, Abbas Eslami Kiasari, Fahimeh Jafari
Abstract:
The Great Britain has one of the safest road networks in the world. However, the consequences of any death or serious injury are devastating for loved ones, as well as for those who help the severely injured. This paper aims to analyse the Great Britain's road safety situation and show the response measures for areas where the total damage caused by accidents can be significantly and quickly reduced. In this paper, we do an exploratory data analysis using STATS19 data. For the past 30 years, the UK has had a good record in reducing fatalities. The UK ranked third based on the number of road deaths per million inhabitants. There were around 165,000 accidents reported in the Great Britain in 2009 and it has been decreasing every year until 2019 which is under 120,000. The government continues to scale back road deaths empowering responsible road users by identifying and prosecuting the parameters that make the roads less safe.Keywords: road safety, data analysis, openstreetmap, feature expanding.
Procedia PDF Downloads 144