Search results for: emotional security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4424

Search results for: emotional security

2894 Advertising Campaigns for a Sustainable Future: The Fight against Plastic Pollution in the Ocean

Authors: Mokhlisur Rahman

Abstract:

Ocean inhibits one of the most complex ecosystems on the planet that regulates the earth's climate and weather by providing us with compatible weather to live. Ocean provides food by extending various ways of lifestyles that are dependent on it, transportation by accommodating the world's biggest carriers, recreation by offering its beauty in many moods, and home to countless species. At the essence of receiving various forms of entertainment, consumers choose to be close to the ocean while performing many fun activities. Which, at some point, upsets the stomach of the ocean by threatening marine life and the environment. Consumers throw the waste into the ocean after using it. Most of them are plastics that float over the ocean and turn into thousands of micro pieces that are hard to observe with the naked eye but easily eaten by the sea species. Eventually, that conflicts with the natural consumption process of any living species, making them sick. This information is not known by most consumers who go to the sea or seashores occasionally to spend time, nor is it widely discussed, which creates an information gap among consumers. However, advertising is a powerful tool to educate people about ocean pollution. This abstract analyzes three major ocean-saving advertisement campaigns that use innovative and advanced technology to get maximum exposure. The study collects data from the selected campaigns' websites and retrieves all available content related to messages, videos, and images. First, the SeaLegacy campaign uses stunning images to create awareness among the people; they use social media content, videos, and other educational content. They create content and strategies to build an emotional connection among the consumers that encourage them to move on an action. All the messages in their campaign empower consumers by using powerful words. Second, Ocean Conservancy Campaign uses social media marketing, events, and educational content to protect the ocean from various pollutants, including plastics, climate change, and overfishing. They use powerful images and videos of marine life. Their mission is to create evidence-based solutions toward a healthy ocean. Their message includes the message regarding the local communities along with the sea species. Third, ocean clean-up is a campaign that applies strategies using innovative technologies to remove plastic waste from the ocean. They use social media, digital, and email marketing to reach people and raise awareness. They also use images and videos to evoke an emotional response to take action. These tree advertisements use realistic images, powerful words, and the presence of living species in the imagery presentation, which are eye-catching and can grow emotional connection among the consumers. Identifying the effectiveness of the messages these advertisements carry and their strategies highlights the knowledge gap of mass people between real pollution and its consequences, making the message more accessible to the mass of people. This study aims to provide insights into the effectiveness of ocean-saving advertisement campaigns and their impact on the public's awareness of ocean conservation. The findings from this study help shape future campaigns.

Keywords: advertising-campaign, content-creation, images ocean-saving technology, videos

Procedia PDF Downloads 78
2893 The Role of Family Support and Work Life Balance of Women Entrepreneurs in Jaffna District

Authors: Thevaranchany Sivaskaran

Abstract:

Women entrepreneurs are the key players in the society and their contributions is highly highlighted to enhance economic stability in the country. In Sri Lanka, especially in North and East provinces people badly affected by war. Most of them are widows and women headed families. Due to this changing environment, Educational opportunities, and the support of NGO’s Most of the women have started their business and become entrepreneurs. Even though existing family setup and social setup entrepreneurial women are overburdened and difficult to balance their business and family roles. The research has been conducted on the experiences of women entrepreneurs with the family role support and work-life balance within the small and micro- enterprise sector in Jaffna, Srilanka. This study aims to identify that what extent the role of family support will be the tool to balancing work and life effectively and, secondly, the main challenges they face in achieving work-life balance. This is done by drawing on literatures including those on work-life balance, small-and micro enterprises, and entrepreneurship theories. To find out this objective, the data were collected from 50 entrepreneurs among the members of Jaffna women chamber in each GS division basis (cluster random sampling). A qualitative methodological technique and semi-structured interviews were used to collect the data for the case study on these entrepreneurs. The results indicate that the majority of entrepreneurs do not enjoy a sense of work-life balance because most of them are women headed family and they need to work hard to generate financial profit for the benefit of family. The motivation for them to work in this way is to provide basic needs. Results confirmed for others that support of husbands is very important. Mostly, emotional support (belief and empowerment) is exposed; however, getting financial contribution seems to be highly appreciated. More responsibilities which spouses were ready to take over regarding the home responsibilities (that is, childcare) should also not be neglected in the system of support to their entrepreneurial wives. Although, more important for all, women with children appreciated other members and spouses help and assistance to a higher extent. Results showed that majority of women who started their own business feel that in the first year of ope-ration the emotional support of family members was more important.

Keywords: family support, work life balance, women entrepreneurs, Jaffna District, Sri Lanka

Procedia PDF Downloads 459
2892 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention

Authors: Yusuf Abubakar Mamud

Abstract:

Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.

Keywords: conflicts, local conflicts, terrorism, sustainable development

Procedia PDF Downloads 276
2891 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 73
2890 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis

Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv

Abstract:

Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.

Keywords: correlation analysis, hierarchical filtering, multisource data, network security

Procedia PDF Downloads 201
2889 The Impact of Illegal Firearms Possession, Limited Security Staff and Porosity of Border on Human Security in Ipokia Local Government Area, Ogun State

Authors: Ogunmefun Folorunsho Muyideen, Aluko Tolulope Evelyn

Abstract:

One of the trending menaces faced in the world today is centered on the porosity of borders and proliferation of illegal weapons among the state members without the state authorizations. The proliferation of weapons along porous borders remains a germane and unsolvable question among developed and developing nations due to crisis degenerated from the menace (loss of lives, properties, traumatization, civil unrest and retrogressive economic development). A mixed method was adopted while the survey method was used for communities’ selection (Oke-Odan, Ajilete, Illaise, Lanlate) at Ipokia Local Government as a sample frame. Multi-stage sampling was employed to break down the site into wards, streets, and different house numbers before randomizing administration of the questionnaires using face to face method, while purposive sampling was used for collecting verbal information through an in-depth interviews method. The population size for the site is 150.398, while 399 was the sample size derived from the use of Yamane sample size formula. After retrieval of structured questionnaires, 346 were found useful, while 10 percent (399) of the quantitative instruments was summed to 30 participants that were interviewed using the in-depth interviews technique. The result of the first hypothesis shows a composite relationship between the variables tested (independents and dependent). The result indicated that the porosity of the border, illegal possession of guns, and limited security staff jointly predispose insecurity among the residents of the selected study site. The result of the second hypothesis deciphers that the illegal gun possession (independent) variable predict business outcome among the residents of the study site because sporadic gun shoot will regress the business activities in the study area. The result of third result indicated that the independent (porosity of borders) variable predict social bonding network because a high level of insecurity will destroy the level of trust in the communication among the residents of the study area. The last questions give comprehensive meaning to one of the recommendations derived using content systematic analysis, which explains that out of 30 participants interviewed, 18 submitted individual involvement in monitoring communities will solve the problem, 7 out of 30 opines that governmental agents are to be trained for effective combat, 3 participants out 30 submits that the fight is for both government and the citizens while 2 participants out of 30 claimed that there must be an agreement between Nigerian and neighbouring countries on border security. International donors must totally control the sales of weapons to unauthorized personalities. Criminal cases must be treated with deterrence measures and target hardened procedures through decoying and blending, stakeout, and sting tactics.

Keywords: human security, illegal weapons, porous borders, development

Procedia PDF Downloads 179
2888 Sustainability through Resilience: How Emergency Responders Cope with Stressors

Authors: Sophie Kroeling, Agnetha Schuchardt

Abstract:

Striving for sustainability brings a lot of challenges for different fields of interest, e. g. security or health concerns. In Germany, civil protection is predominantly carried out by emergency responders who perform essential tasks of civil protection. Based on theoretical concepts of different psychological stress theories this contribution focuses on the question, how the resilience of emergency responders can be improved. The goal is to identify resources and successful coping strategies that help to prevent and reduce negative outcomes during or after stressful events. The paper will present results from a qualitative analysis of semi-structured qualitative interviews with 20 emergency responders. These results provide insights into the complexity of coping processes (e. g. controlling the situation, downplaying perceived personal threats through humor) and show the diversity of stressors (like complexity of the disastrous situation, intrusive press and media, or lack of social support within the organization). Self-efficacy expectation was a very important resource for coping with stressful situations. The results served as a starting point for a quantitative survey (that was conducted in March 2017), the development of education and training tools for emergency responders and the improvement of critical incident stress management processes. First results from the quantitative study with more than 700 participants show that, e. g., the emergency responders use social coping within their private social network and also within their aid organization and that both are correlated to resilience. Moreover, missing information, bureaucratic problems and social conflicts within the organization are events that the majority of the participants considered very onerous. Further results from regression analysis will be presented. The proposed paper will combine findings from the qualitative study with the quantitative results, illustrating figures and correlations with respective statements from the interviews. At the end, suggestions for the improvement of the emergency responder’s resilience are given and it is discussed how this can make a contribution to strive for civil security and furthermore a sustainable development.

Keywords: civil security, emergency responders, stress, resilience, resources

Procedia PDF Downloads 144
2887 An Overall Evaluation of Food Nanotechnology

Authors: Raana Babadi Fathipour

Abstract:

Nourishment nanotechnology is an range of rising intrigued and opens up a entirety universe of modern conceivable outcomes for the nourishment industry. The essential categories of nanotechnology applications and functionalities right now within the improvement of nourishment bundling incorporate: the enhancement of plastic materials obstructions, the consolidation of dynamic components that can convey utilitarian properties past those of customary dynamic bundling, and the detecting and signaling of significant data. Nano nourishment bundling materials may amplify nourishment life, move forward nourishment security, alarm buyers that nourishment is sullied or ruined, repair tears in bundling, and indeed release preservatives to expand the life of the nourishment within the bundle. Nanotechnology applications within the nourishment industry can be utilized to identify microbes in bundling, or produce stronger flavors and color quality, and security by expanding the obstruction properties. Nanotechnology holds extraordinary guarantee to supply benefits not fair inside nourishment items but too around nourishment items. In reality, nanotechnology presents modern chances for advancement within the nourishment industry at monstrous speed, but instability and wellbeing concerns are moreover developing. EU/WE/global enactment for the direction of nanotechnology in nourishment are scanty. Besides, current enactment shows up unacceptable to nanotechnology specificity.

Keywords: nano technology, nano foods, food packaging, nano participle

Procedia PDF Downloads 65
2886 Finding Elves in Play Based Learning

Authors: Chloe L. Southern

Abstract:

If play is deemed to fulfill children’s social, emotional, and physical domains, as well as satisfy their natural curiosity and promote self-reflexivity, it is difficult to understand why play is not prioritized to the same extent for older children. This paper explores and discusses the importance of play-based learning as well as the preliminary implications beyond the realm of kindergarten. To further extend the inquiry, discussions pertaining to play-based learning are looked at through the lens of relevant methodologies and theories. Different education systems are looked at in certain areas of the world that lead to curiosities not only towards their play-based practices and curriculum but what ideologies they have that set them apart.

Keywords: 21ˢᵗ century learning, play-based learning, student-centered learning, transformative learning

Procedia PDF Downloads 79
2885 Determinants of Quality of Life Among Refugees Aging Out of Place

Authors: Jonix Owino

Abstract:

Aging Out of Place refers to the physical and emotional experience of growing older in a foreign or unfamiliar environment. Refugees flee their home countries and migrate to foreign countries such as the United States for safety. The emotional and psychological distress experienced by refugees who are compelled to leave their home countries can compromise their ability to adapt to new countries, thereby affecting their well-being. In particular, implications of immigration may be felt more acutely in later life stages, especially when life-long attachments have been made in the country of origin. However, aging studies in the United States have failed to conceptualize refugee aging experiences, more so for refugees who entered the country as adults. Specifically, little is known about the quality of life among aging refugees. Research studies on whether the quality of life varies among refugees by sociodemographic factors are limited. Research studies examining the role of social connectedness in aging refugees’ quality of life are also sparse. As such, the present study seeks to investigate the sociodemographic (i.e., age, sex, country of origin, and length of residence) and social connection factors associated with quality of life among aging refugees. The study consisted of a total of 108 participants from ages 50 years and above. The refugees represented in the study were from Bhutan, Burundi, and Somalia and were recruited from an upper Midwestern region of the United States. The participants completed an in-depth survey assessing social factors and well-being. Hierarchical regression was used for analysis. The results showed that females, older individuals, and refugees who were from Africa reported lower quality of life. Length of residence was not associated with quality of life. Furthermore, when controlling for sociodemographic factors, greater social integration was significantly associated with a higher quality of life, whereas lower loneliness was significantly associated with a higher quality of life. The results also indicated a significant interaction between loneliness and sex in predicting quality of life. This suggests that greater loneliness was associated with reduced quality of life for female refugees but not males. The present study highlights cultural variations within refugee groups which is important in determining how host communities can best support aging refugees’ well-being and develop social programs that can effectively cater to issues of aging among refugees.

Keywords: aging refugees, quality of life, social integration, migration and integration

Procedia PDF Downloads 100
2884 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 299
2883 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 265
2882 Relationships of Clergy Work-Family Enrichment with Job Attitudes

Authors: John Faucett, Hao Wu, Bruce Moore, Sean Nadji

Abstract:

The demands of the ministry often conflict with responsibilities at home, and clergy often experience domain ambiguity between the domains of work and family. However, the unique level of family involvement in the pastor’s profession might enrich the pastor’s ministry as well as the functioning of the family unit. Life in the church family might offer clergy family members a sense of meaning and purpose, social support, and a feeling of belonging. Church activities can offer enhanced opportunities for family interaction. The purpose of this study was to investigate the relationships of work/family enrichment to clergy job satisfaction, burnout, engagement, and withdrawal. Method: Participants were clergy serving within a state conference of the United Methodist Church. A survey was administered electronically, with e-mails and the United Methodist Church (UMC) Facebook page used as access points to the survey. Usable responses for this portion of the survey were obtained from 132 clergy. Participants completed The Work-Family Enrichment Scales, The Utrecht Work Engagement Scale, The Scale of Emotional Exhaustion in Ministry, The Satisfaction in Ministry Scale, and a scale of withdrawal developed for the present study. They also answered questions relating to how involved their spouses are in their ministry and the degree to which spouse involvement in church ministry strengthens church ministry. Findings: Higher scores for work to family enrichment correlated positively with job satisfaction (r = - .69, p < .01) and engagement (r = .50, p < .01), and negatively with burnout (r = -.48, p < .01) and withdrawal (r = -.46, p < .01). Higher scores for family to work enrichment correlated positively with job satisfaction (r = .29, p = .01) and engagement (.24, p < .05), and negatively with burnout (r = -.48, p < .01), and withdrawal (r = -.46, p < .01). Hierarchical regression analysis suggested that clergy perceptions concerning the degree to which spouse involvement in church ministry strengthens church ministry moderates the relationship between degree of spouse involvement in church activities and clergy withdrawal. To the degree that spouse involvement is believed to strengthen ministry, high spouse involvement is related to less clergy withdrawal (Multiple R-Squared = .068, Adj. R-Squared = .043, F = 2.69 on 3 & 110 DF, p = .05). Concluding Statement: Clergy job attitudes are related to work/family enrichment. Spouse involvement in parish ministry is associated with less clergy withdrawal, as long as clergy believe spouse involvement strengthens their ministry.

Keywords: clergy, emotional exhaustion, job engagement, job satisfaction, work/family enrichment

Procedia PDF Downloads 206
2881 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 95
2880 As a Secure Bridge Country about Oil and Gas Sources Transfer after Arab Spring: Turkey

Authors: Fatih Ercin Guney, Hami Karagol

Abstract:

Day by day, humanity's energy needs increase, to facilitate access to energy sources by energy importing countries is of great importance in terms of issues both in terms of economic security and political security. The geographical location of the oil exporting countries in the Middle East (Iran, Iraq, Kuwait, Libya, Saudi Arabia, United Arab Emirates, Qatar) today, it is observed that evaluated by emerging Arab Spring(from Tunisia to Egypt) and freedom battles(in Syria) with security issues arise sourced from terrorist activities(ISIS). Progresses related with limited natural resources, energy and it's transportation issues which worries the developing countries, the energy in the region is considered to how to transfer safely. North Region of the Black Sea , the beginning of the conflict in the regional nature formed between Russia and Ukraine (2010), followed by the relevant regions of the power transmission line (From Russia to Europe) the discovery is considered to be the east's hand began to strengthen in terms of both the economical and political sides. With the growing need for safe access to the west of the new energy transmission lines are followed by Turkey, re-interest is considered to be shifted to the Mediterranean and the Middle East by West. Also, Russia, Iran and China (three axis of east) are generally performing as carry out parallel policies about energy , economical side and security in both United Nations Security Council (Two of Five Permanent Members are Russia and China) and Shanghai Cooperation Organization. In addition, Eastern Mediterranean Region Tension are rapidly increasing about research new oil and natural gas sources by Israel, Egypt, Cyprus, Lebanon. This paper provides, new energy corridor(s) are needed to transfer sources (Oil&Natural Gas) by Europe from East to West. So The West needs either safe bridge country to transfer natural sources to Europe in region or is needed to discovery new natural sources in extraterritorial waters of Eastern Mediterranean Region. But in two opportunities are evaluated with secure transfer corridors form region to Europe in safely. Even if the natural sources can be discovered, they are considered to transfer in safe manner. This paper involved, Turkey’s importance as a leader country in region over both of political and safe energy transfer sides as bridge country between south and north of Turkey why natural sources shall be transferred over Turkey, Even if diplomatic issues-For Example; Cyprus membership in European Union, Turkey membership candidate duration, Israel-Cyprus- Egypt-Lebanon researches about new natural sources in Mediterranean - occurred. But politic balance in Middle-East is changing quickly because of lack of democratic governments in region. So it is evaluated that the alliance of natural sources researches may not be long-time relations due to share sources after discoveries. After evaluating over causes and reasons, aim to reach finding foresight about future of region for energy transfer periods in secure manner.

Keywords: Middle East, natural gas, oil, Turkey

Procedia PDF Downloads 297
2879 Social Networking Sites and Narcissism among Generation Z

Authors: Christine Mappala

Abstract:

Social Networking Sites has an undeniable contribution but also a downgrading effect in our society when used inappropriately. It has effects on an individual’s physical, academic, social, emotional, and behavioral aspects in life, a reason to take account to the possible risks it can have with the future generations, specifically the Generation Z. Determining if SNS Usage has an effect on an individual’s Narcissistic Tendencies, how common narcissism is among these individuals and to provide additional information about the Generation Z in the Philippines is the purpose of this study. A total of 342 participants were gathered. Results indicated that there is a low significance of SNS as a predictor to Narcissism. Also, results showed that there is a low level of narcissism among Generation Z.

Keywords: narcissism, social networking sites, Generation Z, normal narcissism

Procedia PDF Downloads 501
2878 Social Perception of the Benefits of Using a Solar Dryer to Conserve Fruits and Vegetables in Rural Communities in Manica - Mozambique

Authors: Constâncio Augusto Machanguana, Luís Miguel Estevão Cristóvão

Abstract:

In Mozambique, over 80% of the rural population relies on agriculture, livestock, and silviculture for their livelihoods. Unfortunately, these communities face persistent food shortages, which are exacerbated by natural disasters and post-harvest losses due to inadequate storage facilities. Addressing post-harvest loss is critical not only for ensuring food security but also for preventing financial hardships faced by farmers. The study delves into the perceptions of beneficiary communities regarding the construction of three food dryer models made from metal, wood, and clay brick. These solar dryers are part of the project titled ‘Solar Dryer Integrated with Natural Rocks as Energy Storage for Drying Fruits and Vegetables in Mozambique.’ The overarching goal is to enhance food availability beyond the typical growing season, particularly for fruits and vegetables, while simultaneously combating hunger. Given the context of climate change impacts on agriculture, this project becomes even more relevant. Structured interviews conducted with 45 members of beneficiary associations in Manica Province—primarily female heads of households—revealed that rural communities are aware of various food drying alternatives. However, reliance on traditional methods often comes at a cost: compromised product quality and reduced shelf life. To address these challenges, the project implemented energy storage solutions like rock-based thermal energy storage for food drying. This result underscores the urgent need to foster innovation and extend these sustainable practices —such as solar dryers integrated with thermal energy-storage systems made of locally abundant and affordable materials— to more local communities, especially those with significant agricultural potential within the country. By taking these actions, we can improve food security and alleviate hunger.

Keywords: solar dryer, food security, rural community, small technology

Procedia PDF Downloads 30
2877 Violence against Children Surveys: Analysis of the Peer-Reviewed Literature from 2009-2019

Authors: Kathleen Cravero, Amanda Nace, Samantha Ski

Abstract:

The Violence Against Children Surveys (VACS) is nationally representative surveys of male and female youth ages 13-24, designed to measure the burden of sexual, physical, and emotional violence experienced in childhood and adolescence. As of 2019, 24 countries implemented or are in the process of implementing a VACS, covering over ten percent of the world’s child population. Since the first article using VACS data from Swaziland was published in 2009, several peer-reviewed articles have been published on the VACS. However, no publications to date have analyzed the breadth of the work and analyzed how the data are represented in the peer-reviewed literature. In this study, we conducted a literature review of all peer-reviewed research that used VACS data or discussed the implementation and methodology of the VACS. The literature review revealed several important findings. Between 2009 and July 2019, thirty-five peer-reviewed articles using VACS data from 12 countries have been published. Twenty of the studies focus on one country, while 15 of the studies focus on two or more countries. Some countries are featured in the literature more than others, for example Kenya (N=14), Malawi (N=12), and Tanzania (N=12). A review of the research by gender demonstrates that research on violence against boys is under-represented. Only two studies specifically focused on boys/young men, while 11 studies focused only on violence against girls. This is despite research which suggests boys and girls experience similar rates of violence. A review of the publications by type of violence revealed significant differences in the types of violence being featured in the literature. Thirteen publications specifically focused on sexual violence, while three studies focused on physical violence, and only one study focused on emotional violence. Almost 70% of the peer-reviewed articles (24 of the 35) were first-authored by someone at the U.S. Centers for Disease Control and Prevention. There were very few first authors from VACS countries, which raises questions about who is leveraging the data and the extent to which capacities for data liberation are being developed within VACS countries. The VACS provide an unprecedented amount of information on the prevalence and past-year incidence of violence against children. Through a review of the peer-reviewed literature on the VACS we can begin to identify trends and gaps in how the data is being used as well as identify areas for further research.

Keywords: data to action, global health, implementation science, violence against children surveys

Procedia PDF Downloads 133
2876 Affective Robots: Evaluation of Automatic Emotion Recognition Approaches on a Humanoid Robot towards Emotionally Intelligent Machines

Authors: Silvia Santano Guillén, Luigi Lo Iacono, Christian Meder

Abstract:

One of the main aims of current social robotic research is to improve the robots’ abilities to interact with humans. In order to achieve an interaction similar to that among humans, robots should be able to communicate in an intuitive and natural way and appropriately interpret human affects during social interactions. Similarly to how humans are able to recognize emotions in other humans, machines are capable of extracting information from the various ways humans convey emotions—including facial expression, speech, gesture or text—and using this information for improved human computer interaction. This can be described as Affective Computing, an interdisciplinary field that expands into otherwise unrelated fields like psychology and cognitive science and involves the research and development of systems that can recognize and interpret human affects. To leverage these emotional capabilities by embedding them in humanoid robots is the foundation of the concept Affective Robots, which has the objective of making robots capable of sensing the user’s current mood and personality traits and adapt their behavior in the most appropriate manner based on that. In this paper, the emotion recognition capabilities of the humanoid robot Pepper are experimentally explored, based on the facial expressions for the so-called basic emotions, as well as how it performs in contrast to other state-of-the-art approaches with both expression databases compiled in academic environments and real subjects showing posed expressions as well as spontaneous emotional reactions. The experiments’ results show that the detection accuracy amongst the evaluated approaches differs substantially. The introduced experiments offer a general structure and approach for conducting such experimental evaluations. The paper further suggests that the most meaningful results are obtained by conducting experiments with real subjects expressing the emotions as spontaneous reactions.

Keywords: affective computing, emotion recognition, humanoid robot, human-robot-interaction (HRI), social robots

Procedia PDF Downloads 235
2875 A Case Report: The Role of Gut Directed Hypnotherapy in Resolution of Irritable Bowel Syndrome in a Medication Refractory Pediatric Male Patient

Authors: Alok Bapatla, Pamela Lutting, Mariastella Serrano

Abstract:

Background: Irritable Bowel Syndrome (IBS) is a functional gastrointestinal disorder characterized by abdominal pain associated with altered bowel habits in the absence of an underlying organic cause. Although the exact etiology of IBS is not fully understood, one of the leading theories postulates a pathology within the Brain-Gut Axis that leads to an overall increase in gastrointestinal sensitivity and pejorative changes in gastrointestinal motility. Research and clinical practice have shown that Gut Directed Hypnotherapy (GDH) has a beneficial clinical role in improving Mind-Gut control and thereby comorbid conditions such as anxiety, abdominal pain, constipation, and diarrhea. Aims: This study presents a 17-year old male with underlying anxiety and a one-year history of IBS-Constipation Predominant Subtype (IBS-C), who has demonstrated impressive improvement of symptoms following GDH treatment following refractory trials with medications including bisacodyl, senna, docusate, magnesium citrate, lubiprostone, linaclotide. Method: The patient was referred to a licensed clinical psychologist specializing in clinical hypnosis and cognitive-behavioral therapy (CBT), who implemented “The Standardized Hypnosis Protocol for IBS” developed by Dr. Olafur S. Palsson, Psy.D at the University of North Carolina at Chapel Hill. The hypnotherapy protocol consisted of a total of seven weekly 45-minute sessions supplemented with a 20-minute audio recording to be listened to once daily. Outcome variables included the GAD-7, PHQ-9 and DCI-2, as well as self-ratings (ranging 0-10) for pain (intensity and frequency), emotional distress about IBS symptoms, and overall emotional distress. All variables were measured at intake prior to administration of the hypnosis protocol and at the conclusion of the hypnosis treatment. A retrospective IBS Questionnaire (IBS Severity Scoring System) was also completed at the conclusion of the GDH treatment for pre-and post-test ratings of clinical symptoms. Results: The patient showed improvement in all outcome variables and self-ratings, including abdominal pain intensity, frequency of abdominal pain episodes, emotional distress relating to gut issues, depression, and anxiety. The IBS Questionnaire showed a significant improvement from a severity score of 400 (defined as severe) prior to GDH intervention compared to 55 (defined as complete resolution) at four months after the last session. IBS Questionnaire subset questions that showed a significant score improvement included abdominal pain intensity, days of pain experienced per 10 days, satisfaction with bowel habits, and overall interference of life affected by IBS symptoms. Conclusion: This case supports the existing research literature that GDH has a significantly beneficial role in improving symptoms in patients with IBS. Emphasis is placed on the numerical results of the IBS Questionnaire scoring, which reflects a patient who initially suffered from severe IBS with failed response to multiple medications, who subsequently showed full and sustained resolution

Keywords: pediatrics, constipation, irritable bowel syndrome, hypnotherapy, gut-directed hypnosis

Procedia PDF Downloads 198
2874 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 219
2873 AI as a Tool Hindering Digital Education

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.

Keywords: AI, digital education, education tools, motivation and engagement

Procedia PDF Downloads 28
2872 Rapid and Long-term Alien Language Analysis - Forming Frameworks for the Interpretation of Alien Communication for More Intelligent Life

Authors: Samiksha Raviraja, Junaid Arif

Abstract:

One of the most important abilities in species is the ability to communicate. This paper proposes steps to take when and if aliens came in contact with humans, and how humans would communicate with them. The situation would be a time-sensitive scenario, meaning that communication is at the utmost importance if such an event were to happen. First, humans would need to establish mutual peace by conveying that there is no threat to the alien race. Second, the aliens would need to acknowledge this understanding and reciprocate. This would be extremely difficult to do regardless of their intelligence level unless they are very human-like and have similarities to our way of communicating. The first step towards understanding their mind is to analyze their level of intelligence - Level 1-Low intelligence, Level 2-Human-like intelligence or Level 3-Advanced or High Intelligence. These three levels go hand in hand with the Kardashev scale. Further, the Barrow scale will also be used to categorize alien species in hopes of developing a common universal language to communicate in. This paper will delve into how the level of intelligence can be used toward achieving communication with aliens by predicting various possible scenarios and outcomes by proposing an intensive categorization system. This can be achieved by studying their Emotional and Intelligence Quotient (along with technological and scientific knowledge/intelligence). The limitations and capabilities of their intelligence must also be studied. By observing how they respond and react (expressions and senses) to different kinds of scenarios, items and people, the data will help enable good categorisation. It can be hypothesised that the more human-like aliens are or can relate to humans, the more likely it is that communication is possible. Depending on the situation, either human can teach aliens a human language, or humans can learn an alien language, or both races work together to develop a mutual understanding or mode of communication. There are three possible ways of contact. Aliens visit Earth, or humans discover aliens while on space exploration or through technology in the form of signals. A much rarer case would be humans and aliens running into each other during a space expedition of their own. The first two possibilities allow a more in-depth analysis of the alien life and enhanced results compared. The importance of finding a method of talking with aliens is important in order to not only protect Earth and humans but rather for the advancement of Science through the shared knowledge between the two species.

Keywords: intelligence, Kardashev scale, Barrow scale, alien civilizations, emotional and intelligence quotient

Procedia PDF Downloads 72
2871 Effectiveness of Mobile Health Augmented Cardiac Rehabilitation (MCard) on Health-Related Quality of Life among Post-Acute Coronary Syndrome Patients: A Randomized Controlled Trial

Authors: Aliya Hisam, Zia Ul Haq, Sohail Aziz, Patrick Doherty, Jill Pell

Abstract:

Objective: To determine the effectiveness of Mobile health augmented Cardiac rehabilitation (MCard) on health-related quality of life (HRQoL) among post-acute coronary syndrome(post-ACS) patients. Methodology: In a randomized controlled trial, post-ACS patients were randomly allocated (1:1) to an intervention group (received MCard; counseling, empowering with self-monitoring devices, short text messages, in addition to standard post-ACS care) or control group (standard post-ACS care). HRQoL was assessed by generic Short Form-12 and MacNew quality of life myocardial infarction (QLMI) tools. Participants were followed for 24 weeks with data collection and analysis at three-time points (baseline, 12 weeks and 24 weeks). Result: At baseline, 160 patients (80 in each group; mean age 52.66+8.46 years; 126 males, 78.75%) were recruited, of which 121(75.62%) continued and were analyzed at 12-weeks and 119(74.37%) at 24-weeks. The mean SF-12 physical component score significantly improved in the MCard group at 12 weeks follow-up (48.93 vs. control 43.87, p<.001) and 24 weeks (53.52 vs. 46.82 p<.001). The mean SF-12 mental component scores also improved significantly in the MCard group at 12 weeks follow-up (44.84 vs. control 41.40, p<.001) and 24 weeks follow-up (48.95 vs 40.12, p<.001). At 12-and 24-week follow-up, all domains of MacNew QLMI (social, emotional, physical and global) were also statistically significant (p<.001) improved in the MCard group, unlike the control group. Conclusion: MCard is feasible and effective at improving all domains of HRQoL. There was an improvement in physical, mental, social, emotional and global domains among the MCard group in comparison to the control group. The addition of MCard programs to post-ACS standard care may improve patient outcomes and reduce the burden on the health care setting.

Keywords: acute coronary syndrome, mobile health augmented cardiac rehabilitation (MCard), cardiovascular diseases, cardiac rehabilitation, health-related quality of life, short form 12, MacNew QLMI

Procedia PDF Downloads 167
2870 A Shift in Approach from Cereal Based Diet to Dietary Diversity in India: A Case Study of Aligarh District

Authors: Abha Gupta, Deepak K. Mishra

Abstract:

Food security issue in India has surrounded over availability and accessibility of cereal which is regarded as the only food group to check hunger and improve nutrition. Significance of fruits, vegetables, meat and other food products have totally been neglected given the fact that they provide essential nutrients to the body. There is a need to shift the emphasis from cereal-based approach to a more diverse diet so that aim of achieving food security may change from just reducing hunger to an overall health. This paper attempts to analyse how far dietary diversity level has been achieved across different socio-economic groups in India. For this purpose, present paper sets objectives to determine (a) percentage share of different food groups to total food expenditure and consumption by background characteristics (b) source of and preference for all food items and, (c) diversity of diet across socio-economic groups. A cross sectional survey covering 304 households selected through proportional stratified random sampling was conducted in six villages of Aligarh district of Uttar Pradesh, India. Information on amount of food consumed, source of consumption and expenditure on food (74 food items grouped into 10 major food groups) was collected with a recall period of seven days. Per capita per day food consumption/expenditure was calculated through dividing consumption/expenditure by household size and number seven. Food variety score was estimated by giving 0 values to those food groups/items which had not been eaten and 1 to those which had been taken by households in last seven days. Addition of all food group/item score gave result of food variety score. Diversity of diet was computed using Herfindahl-Hirschman index. Findings of the paper show that cereal, milk, roots and tuber food groups contribute a major share in total consumption/expenditure. Consumption of these food groups vary across socio-economic groups whereas fruit, vegetables, meat and other food consumption remain low and same. Estimation of dietary diversity show higher concentration of diet due to higher consumption of cereals, milk, root and tuber products and dietary diversity slightly varies across background groups. Muslims, Scheduled caste, small farmers, lower income class, food insecure, below poverty line and labour families show higher concentration of diet as compared to their counterpart groups. These groups also evince lower mean intake of number of food item in a week due to poor economic constraints and resultant lower accessibility to number of expensive food items. Results advocate to make a shift from cereal based diet to dietary diversity which not only includes cereal and milk products but also nutrition rich food items such as fruits, vegetables, meat and other products. Integrating a dietary diversity approach in food security programmes of the country would help to achieve nutrition security as hidden hunger is widespread among the Indian population.

Keywords: dietary diversity, food Security, India, socio-economic groups

Procedia PDF Downloads 340
2869 Interoception and Its Role in Connecting Empathy, Bodily Perception and Conceptual Representations: A Cross-Cultural Online Study

Authors: Fabio Marson, Revital Naor-Ziv, Patrizio Paoletti, Joseph Glicksohn, Filippo Carducci, Tal Dotan Ben-Soussan

Abstract:

According to embodied cognition theories, higher-order cognitive functions and complex behaviors seems to be affected by bodily states. For example, the polyvagal theory suggests that the human autonomic nervous system evolved to support social interactions. Accordingly, integration and perception of information related to the physiological state arising from the peripherical nervous system (i.e., interoception) play a role in the regulation of social interaction by modulating emotional responses and prosocial behaviors. Moreover, recent studies showed that interoception is involved in the representations of conceptual knowledge, suggesting that the bodily information carried by the interoceptive system provides a perceptual basis for the embodiment of abstract concepts, especially those related to social and emotional domains. However, to the best of our knowledge, no studies explored the relationship between interoception, prosocial behaviors, and conceptual representations. Considering the privileged position of interoception in mediating higher-order cognition and social interaction, we designed a cross-cultural study to explore the relationship between interoception, the sensitivity of bodily functions, and empathy. We recruited Italian, English, and Hebrew participants, and we asked them to fill in a questionnaire about empathy (Empathy Quotient), a questionnaire about bodily perception (Body Perception Questionnaire), and to rate different concrete and abstract concepts for the extent such concepts can be experienced through vision, hearing, taste, smell, touch, and interoception. We observed that in all languages, interoception ratings for abstract concepts were greater than for concrete concepts. Importantly, interoception ratings for abstract concepts were positively correlated with empathy and sensitivity of bodily functions. Our results suggest that participants with higher empathy and sensitivity of bodily functions show also a greater embodiment of abstract concepts in interoception, providing further evidence for the importance of the interoceptive system in regulating prosocial behaviors and integrating conceptual representations.

Keywords: conceptual representations, embodiment, empathy, empathy quotient, interoception, prosocial behaviors

Procedia PDF Downloads 166
2868 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters

Authors: Vikram Chowdhary, Marek Vins

Abstract:

The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.

Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID

Procedia PDF Downloads 110
2867 Effects of Mindfulness Practice on Clinician Burnout: A Scoping Review

Authors: Hani Malik

Abstract:

Background: Clinician burnout is a growing phenomenon in current health systems worldwide. Increasing emotional exhaustion, depersonalisation, and reduced personal accomplishment threaten the effective delivery of healthcare. This can potentially be mitigated by mindfulness practice, which has shown promising results in reducing burnout, restoring compassion, and preventing moral injury in clinicians. Objectives: To conduct a scoping review and identify high-quality studies on mindfulness practice in clinician burnout, synthesize themes that emerge from these studies, and discuss the implications of the results to healthcare leadership and innovation. Methodology: A focused scoping review was carried out to investigate the effects of mindfulness practice on clinician burnout. High-ranking journals were targeted to analyse high-quality studies and synthesize common themes in the literature. Studies conducted on current, practicing physicians were included. Mindfulness practice of varying forms was the main intervention studied. Grey literature and studies conducted only on allied health personnel were excluded from this review. Analysis:31 studies were included in this scoping review. Mindfulness practice was found to decrease emotional exhaustion and depersonalisation while improving mood, responses to stress, and vigour. Self-awareness, compassion, and empathy were also increased in study participants. From this review, four themes emerged which include: innovations in mindfulness practice, mindfulness and positive psychology, the impact of mindfulness on work and patient care, and barriers and facilitators to clinician mindfulness practice. Conclusion: Mindfulness had widely been reported to benefit mental health and well-being, but the studies reviewed seemed to adopt a mono focus and omitted key considerations to healthcare leadership, systems-level culture, and practices. Mindfulness practice is a quintessential component of positive psychology and is inherently linked to effective leadership. A mindful and compassionate clinician leader will play a crucial role in addressing gaps in current practice, prioritise staff mental health, and provide a supportive platform for innovation.

Keywords: mindfulness practice, clinician burnout, healthcare leadership, COVID-19

Procedia PDF Downloads 152
2866 Challenges of Climate Change on Agricultural Productivity in Sub-Saharan Africa

Authors: Mohammed Sale Abubakar, Kabir Omar, Mohammed Umar Abba

Abstract:

The effects of climate change continue to ravage globe upsetting or even overturning the entire communities in its wake. It is therefore on the front burner of most global issues affecting the world today. Hardly any field of endeavor has escaped the manifestation of its effects. The effects of climate change on agricultural productivity calls for intense study because of the nexus between agriculture, global food security and provision of employment for the teaming population in sub-saharan Africa. This paper examines current challenges of climate change on agricultural productivity in this region. This challenge indicated that both long and short-term change in climate bring unpleasant repercussion on agricultural productivity as they manifest in the vulnerability of industrial work force. The paper also focused on the impact of agriculture and bio-environmental engineering as a separate entity that will help to fight these major challenges facing humanity currently associated with negative effects of climate change such as scarcity of water, declining agricultural yields, desert encroachment, and damage of coastal structures. Finally, a suggestion was put forward as an effort that should be directed towards mitigating the negative effects of climate change on our environment.

Keywords: climate change mitigation, desert encroachment, environment, global food security, greenhouse gases (GHGs)

Procedia PDF Downloads 355
2865 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 66