Search results for: human factor in security
13572 Life Imprisonment: European Convention on Human Rights Standards and the New Serbian Criminal Code
Authors: Veljko Turanjanin
Abstract:
In this article, an author deals with the issue of life imprisonment. Life imprisonment represents a new sentence in the Serbian legislature, in addition to the standard one, imprisonment. The author elaborated on judgments of the European Court of Human Rights (ECtHR), imposing the possibility of parole for the person sentenced to life imprisonment, emphasizing rehabilitation as the primary goal of penalties. According to the ECtHR, life imprisonment without parole is not permitted. The right to rehabilitation is very strictly set in the ECtHR jurisprudence. Life imprisonment represents a new sentence in the Serbian legislature, in addition to the standard one, imprisonment. The legislator provided the possibility of parole for most criminal offenses after 27 years in prison, while for some of them, a possibility of parole is explicitly prohibited. The author points out the shortcomings of the legal solution that exists in Serbia, which flagrantly threatens to violate the human rights of the offenders.Keywords: European Court of Human Rights, life imprisonment, parole, rehabilitation
Procedia PDF Downloads 10413571 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand
Authors: Pichamon Chansuchai
Abstract:
The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.Keywords: audit, best practice, internet, payment
Procedia PDF Downloads 50013570 The Human Rights Code: Fundamental Rights as the Basis of Human-Robot Coexistence
Authors: Gergely G. Karacsony
Abstract:
Fundamental rights are the result of thousand years’ progress of legislation, adjudication and legal practice. They serve as the framework of peaceful cohabitation of people, protecting the individual from any abuse by the government or violation by other people. Artificial intelligence, however, is the development of the very recent past, being one of the most important prospects to the future. Artificial intelligence is now capable of communicating and performing actions the same way as humans; such acts are sometimes impossible to tell from actions performed by flesh-and-blood people. In a world, where human-robot interactions are more and more common, a new framework of peaceful cohabitation is to be found. Artificial intelligence, being able to take part in almost any kind of interaction where personal presence is not necessary without being recognized as a non-human actor, is now able to break the law, violate people’s rights, and disturb social peace in many other ways. Therefore, a code of peaceful coexistence is to be found or created. We should consider the issue, whether human rights can serve as the code of ethical and rightful conduct in the new era of artificial intelligence and human coexistence. In this paper, we will examine the applicability of fundamental rights to human-robot interactions as well as to the actions of artificial intelligence performed without human interaction whatsoever. Robot ethics has been a topic of discussion and debate of philosophy, ethics, computing, legal sciences and science fiction writing long before the first functional artificial intelligence has been introduced. Legal science and legislation have approached artificial intelligence from different angles, regulating different areas (e.g. data protection, telecommunications, copyright issues), but they are only chipping away at the mountain of legal issues concerning robotics. For a widely acceptable and permanent solution, a more general set of rules would be preferred to the detailed regulation of specific issues. We argue that human rights as recognized worldwide are able to be adapted to serve as a guideline and a common basis of coexistence of robots and humans. This solution has many virtues: people don’t need to adjust to a completely unknown set of standards, the system has proved itself to withstand the trials of time, legislation is easier, and the actions of non-human entities are more easily adjudicated within their own framework. In this paper we will examine the system of fundamental rights (as defined in the most widely accepted source, the 1966 UN Convention on Human Rights), and try to adapt each individual right to the actions of artificial intelligence actors; in each case we will examine the possible effects on the legal system and the society of such an approach, finally we also examine its effect on the IT industry.Keywords: human rights, robot ethics, artificial intelligence and law, human-robot interaction
Procedia PDF Downloads 24413569 Red Green Blue Image Encryption Based on Paillier Cryptographic System
Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson
Abstract:
In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier
Procedia PDF Downloads 23813568 Export and Import Indicators of Georgian Agri-food Products during the Pandemic: Challenges and Opportunities
Authors: Eteri Kharaishvili
Abstract:
Introduction. The paper analyzes the main indicators of export and import of Georgian agri-food products; identifies positive and negative trends under the pandemic; based on the revealed problemssubstantiates the need formodernization ofin agri-food sector. It is argued that low production and productivity rates of food products negatively impact achieving the optimal export-to-import ratio; therefore, it leads toincreaseddependence on other countries andreduces the level of food security. Research objectives. The objective of the research is to identify the key challenges based on the analysis of export-import indicators of Georgian food products during the pandemic period and develop recommendations on the possibilities of post-pandemic perspectives. Research methods. Various theoretical and methodological research tools are used in the paper; in particular, a desk research is carried out on the research topic; endogenous and exogenous variables affecting export and import are determined through factor analysis; SWOT and PESTEL analysis are used to identify development opportunities; selection and groupingof data, identification of similarities and differences is carried outby using analysis, synthesis, sampling, induction and other methods; a qualitative study is conducted based on a survey of agri-food experts and exporters for clarifying the factors that impede export-import flows. Contributions. The factors that impede the export of Georgian agri-food products in the short run under COVID-19 pandemic are identified. These are: reduced income of farmers, delays in the supply of raw materials and supplies to the agri-food sectorfrom the neighboring industries, as well as in harvesting, processing, marketing, transportation, and other sectors; increased indirect costs, etc. The factors that impede the export in the long run areas follows loss of public confidence in the industry, risk of losing positions in traditional markets, etc. Conclusions are made on the problems in the field of export and import of Georgian agri-food products in terms of the pandemic; development opportunities are evaluated based on the analysis of the agri-food sector potential. Recommendations on the development opportunities for export and import of Georgian agri-food products in the post-pandemic period are proposed.Keywords: agri-food products, export, and import, pandemic period, hindering factor, development potential
Procedia PDF Downloads 14313567 Human Thinking Explained with Basic Drives
Authors: Peter Pfeifer, Julian Pfeifer, Niko Pfeifer
Abstract:
Information processing is the focus of brain and cognition research. This work has a different perspective; it starts with behaviors. The detailed analysis of behaviors leads to the discovery that a significant proportion of them are based on only five basic drives. These basic drives are combinable, and the combinations result in the diversity of human behavior and thinking. The key elements are drive memories. They collect memories of drive-related situations and feelings. They contain variations of basic drives in numerous areas of life and build combinations with different meanings depending on the area. Human thinking could be explained with variations on these nested combinations of basic drives.Keywords: cognition, psycholinguistics, psychology, psychophysiology of cognition
Procedia PDF Downloads 16113566 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 50413565 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher
Authors: Okike Benjami, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 29013564 Data and Spatial Analysis for Economy and Education of 28 E.U. Member-States for 2014
Authors: Alexiou Dimitra, Fragkaki Maria
Abstract:
The objective of the paper is the study of geographic, economic and educational variables and their contribution to determine the position of each member-state among the EU-28 countries based on the values of seven variables as given by Eurostat. The Data Analysis methods of Multiple Factorial Correspondence Analysis (MFCA) Principal Component Analysis and Factor Analysis have been used. The cross tabulation tables of data consist of the values of seven variables for the 28 countries for 2014. The data are manipulated using the CHIC Analysis V 1.1 software package. The results of this program using MFCA and Ascending Hierarchical Classification are given in arithmetic and graphical form. For comparison reasons with the same data the Factor procedure of Statistical package IBM SPSS 20 has been used. The numerical and graphical results presented with tables and graphs, demonstrate the agreement between the two methods. The most important result is the study of the relation between the 28 countries and the position of each country in groups or clouds, which are formed according to the values of the corresponding variables.Keywords: Multiple Factorial Correspondence Analysis, Principal Component Analysis, Factor Analysis, E.U.-28 countries, Statistical package IBM SPSS 20, CHIC Analysis V 1.1 Software, Eurostat.eu Statistics
Procedia PDF Downloads 51113563 Accuracy of VCCT for Calculating Stress Intensity Factor in Metal Specimens Subjected to Bending Load
Authors: Sanjin Kršćanski, Josip Brnić
Abstract:
Virtual Crack Closure Technique (VCCT) is a method used for calculating stress intensity factor (SIF) of a cracked body that is easily implemented on top of basic finite element (FE) codes and as such can be applied on the various component geometries. It is a relatively simple method that does not require any special finite elements to be used and is usually used for calculating stress intensity factors at the crack tip for components made of brittle materials. This paper studies applicability and accuracy of VCCT applied on standard metal specimens containing trough thickness crack, subjected to an in-plane bending load. Finite element analyses were performed using regular 4-node, regular 8-node and a modified quarter-point 8-node 2D elements. Stress intensity factor was calculated from the FE model results for a given crack length, using data available from FE analysis and a custom programmed algorithm based on virtual crack closure technique. Influence of the finite element size on the accuracy of calculated SIF was also studied. The final part of this paper includes a comparison of calculated stress intensity factors with results obtained from analytical expressions found in available literature and in ASTM standard. Results calculated by this algorithm based on VCCT were found to be in good correlation with results obtained with mentioned analytical expressions.Keywords: VCCT, stress intensity factor, finite element analysis, 2D finite elements, bending
Procedia PDF Downloads 30513562 Evaluation of Osteoprotegrin (OPG) and Tumor Necrosis Factor A (TNF-A) Changes in Synovial Fluid and Serum in Dogs with Osteoarthritis; An Experimental Study
Authors: Behrooz Nikahval, Mohammad Saeed Ahrari-Khafi, Sakineh Behroozpoor, Saeed Nazifi
Abstract:
Osteoarthritis (OA) is a progressive and degenerative condition of the articular cartilage and other joints’ structures. It is essential to diagnose this condition as early as possible. The present research was performed to measure the Osteoprotegrin (OPG) and Tumor Necrosis Factor α (TNF-α) in synovial fluid and blood serum of dogs with surgically transected cruciate ligament as a model of OA, to evaluate if measuring of these parameters can be used as a way of early diagnosis of OA. In the present study, four mature, clinically healthy dogs were selected to investigate the effect of experimental OA, on OPG and TNF-α as a way of early detection of OA. OPG and TNF-α were measured in synovial fluid and blood serum on days 0, 14, 28, 90 and 180 after surgical transaction of cranial cruciate ligament in one stifle joint. Statistical analysis of the results showed that there was a significant increase in TNF-α in both synovial fluid and blood serum. OPG showed a decrease two weeks after OA induction. However, it fluctuated afterward. In conclusion, TNF-α could be used in both synovial fluid and blood serum as a way of early detection of OA; however, further research still needs to be conducted on OPG values in OA detection.Keywords: osteoarthritis, osteoprotegrin, tumor necrosis factor α, synovial fluid, serum, dog
Procedia PDF Downloads 31813561 People Management, Knowledge Sharing and Intermediary Variables
Authors: Nizar Mansour, Chiha Gaha, Emna Gara
Abstract:
The present research investigates the relationship among HRM practices, knowledge sharing behavior and a certain number of intermediary variables in the context of Tunisian knowledge-intensive firms. Results suggest that five HR practices influence either directly or indirectly the knowledge sharing behavior through enhancing the value of human capital and fostering a learning-oriented organizational climate. Results have strong theoretical implications for both the fields of knowledge management and strategic human resource management. Managerial implications are also derived.Keywords: human capital, knowledge intensive firms, knowledge sharing, organizational climate, Tunisia
Procedia PDF Downloads 33213560 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve
Authors: Eun-Jun Yoon
Abstract:
Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis
Procedia PDF Downloads 33213559 Organotin (IV) Based Complexes as Promiscuous Antibacterials: Synthesis in vitro, in Silico Pharmacokinetic, and Docking Studies
Authors: Wajid Rehman, Sirajul Haq, Bakhtiar Muhammad, Syed Fahad Hassan, Amin Badshah, Muhammad Waseem, Fazal Rahim, Obaid-Ur-Rahman Abid, Farzana Latif Ansari, Umer Rashid
Abstract:
Five novel triorganotin (IV) compounds have been synthesized and characterized. The tin atom is penta-coordinated to assume trigonal-bipyramidal geometry. Using in silico derived parameters; the objective of our study is to design and synthesize promiscuous antibacterials potent enough to combat resistance. Among various synthesized organotin (IV) complexes, compound 5 was found as potent antibacterial agent against various bacterial strains. Further lead optimization of drug-like properties was evaluated through in silico predictions. Data mining and computational analysis were utilized to derive compound promiscuity phenomenon to avoid drug attrition rate in designing antibacterials. Xanthine oxidase and human glucose- 6-phosphatase were found as only true positive off-target hits by ChEMBL database and others utilizing similarity ensemble approach. Propensity towards a-3 receptor, human macrophage migration factor and thiazolidinedione were found as false positive off targets with E-value 1/4> 10^-4 for compound 1, 3, and 4. Further, displaying positive drug-drug interaction of compound 1 as uricosuric was validated by all databases and docked protein targets with sequence similarity and compositional matrix alignment via BLAST software. Promiscuity of the compound 5 was further confirmed by in silico binding to different antibacterial targets.Keywords: antibacterial activity, drug promiscuity, ADMET prediction, metallo-pharmaceutical, antimicrobial resistance
Procedia PDF Downloads 50413558 Is HR in a State of Transition? An International Comparative Study on the Development of HR Competencies
Authors: Barbara Covarrubias Venegas, Sabine Groblschegg, Bernhard Klaus, Julia Domnanovich
Abstract:
Research Objectives: The roles and activities of human resource management (HRM) have changed a lot in the past years. Driven by a changing environment and therefore, new business requirements, the scope of human resource (HR) activities has widened. The extent to which these activities should focus on strategic issues to support the long-term success of a company has been discussed in science for many years. As many economies of Central and Eastern Europe (CEE) experienced a phase of transition after the socialist era and are now recovering from the 2008 global crisis it is needed to examine the current state of HR positioning. Furthermore, a trend in HR work developing from rather administrative units to being strategic partners of management can be noticed. This leads to the question of better understanding the underlying competencies which are necessary to support organisations. This topic was addressed by the international study “HR Competencies in international comparison”. The quantitative survey was conducted by the Institute for Human Resources & Organisation of FHWien University of Applied Science of WKW (A) in cooperation with partner universities in the countries Bosnia-Herzegovina, Croatia, Serbia and Slovenia. Methodology: Using the questionnaire developed by Dave Ulrich we tested whether the HR Competency model can be used for Austria, Bosnia and Herzegovina, Croatia, Serbia and Slovenia. After performing confirmatory and exploratory factor analysis for the whole data set containing all five countries we could clearly distinguish between four competencies. In a further step, our analysis focused on median and average comparisons between the HR competency dimensions. Conclusion: Our literature review, in alignment with other studies, shows a relatively rapid pace of development of HR Roles and HR Competencies in BCSS in the past decades. Comparing data from BCSS and Austria we still can notice that regards strategic orientation there is a lack in BCSS countries, thus competencies are not as developed as in Austria. This leads us to the tentative conclusion that HR has undergone a rapid change but is still in a State of Transition from being a rather administrative unit to performing the role of a strategic partner.Keywords: comparative study, HR competencies, HRM, HR roles
Procedia PDF Downloads 31013557 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive
Authors: Swapan Maiti, Dipanwita Roy Chowdhury
Abstract:
Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions
Procedia PDF Downloads 31413556 Comparative Study between Angiotensin Converting Enzyme Inhibitors and Angiotensin Receptor Blockers on Ulcerative Colitis Induced Experimentally in Rats
Authors: Azza H. El-Medany, Hanan H. Hagar, Jamila H. El-Medany
Abstract:
Ulcerative colitis (UC) is one of chronic inflammatory diseases primarily affecting colon with unknown etiology. Some researches papers mentioned the possibility of the use of drugs that affect the angiotensin II in reducing the complication of ulcerative colitis. The aim of the present study is to evaluate the potential protective and therapeutic effects of captopril and valsartan on ulcerative colitis induced experimentally in rats using acetic acid. The results were assessed by histological assessment of colonic tissues and measurement of malondialdehyde (MDA), tumor necrosis factor (TNF-α), transforming growth factor (TGF-1B), angiotensin converting enzyme (ACE), reduced glutathione (GSH) and platelet activating factor (PAF) levels in colonic tissues. Oral pre-treatment with captopril or valsartan in a dose of 30 mgkg-1 body weight for 2 weeks before induction of colitis (prophylactic groups) and continuously for 2 weeks after induction (therapeutic groups) significantly reduce MDA, TNF-α, PAF, TGF-1B and ACE levels in colonic tissues as compared to acetic acid control group. Also, a significant increase in GSH level was observed in colonic tissues. Captopril and valsartan attenuated the macroscopic and microscopic colonic damage induced by acetic acid. These results suggest that either captopril or valsartan may be effective as prophylactic or treatment of UC through inhibition of ACE and scavenging effect on oxygen-derived free radicals.Keywords: captopril, valsartan, angiotensin converting enzyme, reduced glutathione, tumor necrosis factor
Procedia PDF Downloads 26913555 Exploring the Impact of Corruption on Human Rights in Cameroon: The Quest for Sustainable Solutions
Authors: Eugene Muambeh Muntoh
Abstract:
Corruption has a destructive effect on State institutions and on the capacity of States to respect, protect and fulfil human rights, particularly of those persons and groups in situation of vulnerability and marginalization. In Cameroon, corruption pose a major challenge as it divert public revenues and cripple public budgets that should provide healthcare, housing, education, and other essential services. Corruption has undermined the States’ ability to meet the minimum core obligations and pre-existing legal obligations to maximize all available resources to respect, protect and fulfil Economic, Social and Cultural Rights. This study therefore makes use of the qualitative research design, ranging from interviews, observations and content analysis of vital documents to provide evidence and associations between corruption and human rights concerns in Cameroon. The study made use of research material from both primary and secondary sources. Findings from the study reveals that the impact of corruption in Cameroon is especially pronounced regarding economic, social and cultural rights. In most cases, the right to be treated equally is violated, for example, when someone is requested to pay a bribe to obtain a public service. There is an urgent need for sustainable measures to counter corruption in order to protect and promote human rights.Keywords: corruption, governance, human rights, law
Procedia PDF Downloads 8813554 Descriptive Study of Role Played by Exercise and Diet on Brain Plasticity
Authors: Mridul Sharma, Praveen Saroha
Abstract:
In today's world, everyone has become so busy in their to-do tasks and daily routine that they tend to ignore some of the basal components of our life, including exercise and diet. This comparative study analyzes the pathways of the relationship between exercise and brain plasticity and also includes another variable diet to study the effects of diet on learning by answering questions including which diet is known to be the best learning supporter and what are the recommended quantities of the same. Further, this study looks into inter-relation between diet and exercise, and also some other approach of the relation between diet and exercise on learning apart from through Brain Derived Neurotrophic Factor (BDNF).Keywords: brain derived neurotrophic factor, brain plasticity, diet, exercise
Procedia PDF Downloads 14113553 The Impact of Non State Actor’s to Protect Refugees in Kurdistan Region of Iraq
Authors: Rozh Abdulrahman Kareem
Abstract:
The displacement of individuals has become a common interest for international players. Mostly occurs in Islamic states, as religion is considered the most common cause of this form of displacement. Therefore, this thesis aims to depict the reality of the situations of the refugees, particularly in KRI, illustrating how they are treated and protected and if the treatment merits the protection clause as envisaged in the 1951 Refugee Convention. Overall, the aim is to touch on the issue of protection by non-governmental organizations and government towards the refugees here. In light of this, it focused on the adequate protection of refugees in relation to the refugee law. In the Middle East, including Iraq, there have been multiple reports on violations of these refugee laws and human rights. Protection involves providing physical security to the concerned parties, functional administration with legal structures, and infrastructural setup that could help citizens exercise rights. The KRI has provided the refugees with various benefits, including education, access to residency, and employment. It also provided transitionary in various social dimensions like gender-based violence. The Convention on Status of Refugees 1951 tried to resolve this problem, whereby the principle of ‘nonrefoulement’ under Article 33 was passed. The ‘nonrefoulement’, an exceptional reference, was enacted to protect refugees from forcible return to their countries of the original. However, the convention never addressed an unusual scenario regarding the application of this principle, ‘Extradition Treaties.’ Even though some scholarly article exists regarding the problems of refugees, the topic of interplay between Nonrefoulement and Extradition Treaties has never been explained in detail in the available books on refugee laws and practices. Each year, millions of refugees seek protection from foreign countries for fear of being tortured, victimized, or executed. People seeking international protection are susceptible and insecure. The main objective of the prevention is to provide security to citizens susceptible to inhuman treatment, distress, oppression, or other human rights defilements when they arrive back in their own countries. The refugee situation may get worse in the near future. Just like several nations within the Middle East, Iraq is not a signatory to the globally acknowledged legal structure for the protection of refugees. The first law of 1971 in Iraq was issued only for military or political causes. This law also establishes benefits such as the right to education and health services and the right to acquire employment just as the Iraqi nationals. The other legislative instrument is the 21st law from the ministry of migration of Iraq widened the description of an immigrant to incorporate the definition from the refugee resolution. Nonetheless, there is a lack of overall consistency in the protection provided under these legislations regarding rights and entitlement. A Memorandum of Understanding was signed in October 2016 by the UNHCR and the Iraq government to develop the protection of refugees. Under the term of this MoU, the Iraqi Government is obligated to provide identity documents to asylum seekers beside that UNHCR provides more guidance.Keywords: law, refugee, protection, Kurdistan
Procedia PDF Downloads 6313552 The Influence of Nyerere in Integrating Ubuntu Knowledge and Social Work in Tanzania – A Literature Review
Authors: Meinrad Haule Lembuka
Abstract:
Ubuntu is an African philosophy and model with the meaning of 'humanity to others' or 'care for other’s needs because of the guiding principle of interdependence’ that embraces collective and holistic efforts in development through the human face. The study uses a literature review method reflecting Julius Nyerere’s contributions in realizing Ubuntu and social work practice. Nyerere strived to restore Africa development in the lens of humanism through the values of solidarity, communal participation, compassion, care, justice etc; He later founded developmental social work through Ujamaa model, educational for self reliance and African dignity. Nyerere was against post-colonial syndromes through African socialism that envisioned values and principles of social work to provide social justice, human dignity, social change and social development. Also, he managed to serve the primary mission of the social work profession to enhance human wellbeing and help meet basic human needs of all people, with particular attention to the needs and empowerment of people who are vulnerable, oppressed, and living in poverty with African Ubuntu practice of equal distribution of resources. Nyerere further endorsed social work legal framework that embraced universal human rights: service, equality, social justice, and human dignity, Importance of human relationship, integrity and competence. Nyerere proved that Indigenous model can work with formal system like Social work profession. In 2014 the National Heritage Council of South Africa (NHC) honored him an Award of African Ubuntu champion. Nyerere strongly upheld to be an ambassador of social work through his remarkably contributions in developmental social work (Ujamaa model), social change, human dignity, equality, social unity and social justice in Africa and globe at large.Keywords: ubuntu, Indiginious knowledge, Indiginious social work, ubuntu social work
Procedia PDF Downloads 10313551 Human Resource Development and Social Entrepreneurship: A Pan-African Perspective
Authors: Leon C. Prieto, Simone T. A. Phipps
Abstract:
There is a need to promote social entrepreneurship in order to solve some of the complex problems facing various countries in Africa (poverty, unemployment, crime, HIV, etc.). For example, one possible consequence of the HIV/AIDS crisis in Zimbabwe and elsewhere is a deterioration in the educational opportunities for orphans and other vulnerable children. Given that high returns are associated with education, the loss of education for a large segment of the population would likely worsen the already dire economic consequences of the HIV/AIDS crisis. Using a systems approach, this paper argues that social entrepreneurship can be used as a vehicle to promote national human resource development, which will assist in the alleviation of societal ills on the national level as well as throughout Africa.Keywords: human resource development, pan-african, social entrepreneurship, social enterprise
Procedia PDF Downloads 38413550 The Promise of Social Enterprise to Improve Health Outcomes in Trafficking Survivors: A Quantitative Case Study
Authors: Sean Roy, Mercedes Miller
Abstract:
A study was conducted to assess the positive outcomes related to Filipino human trafficking survivors working at a social enterprise. As most existing research on human survivors pertains to the adverse outcomes of victims, the researchers were seeking to fill the dearth of existing data related to positive outcomes. A quantitative study was conducted using a convenience sample of 41 participants within three staggered cohorts of the social enterprise. A Kruskal-Wallis H test was conducted and indicated that participants in the third cohort (who were employed at the social enterprise the longest) had significantly lower anxiety scores than participants in other cohorts. This study indicates that social enterprises hold the promise of positively impacting anxiety of human trafficking survivors and provides a starting point for researchers looking to assess ways to positively influence the lives of survivors.Keywords: human trafficking, Philippines, quantitative analysis, self-identity
Procedia PDF Downloads 16613549 Effects of Social Media on Class Layers in Kuwait
Authors: Bashaiar Al-Sanaa
Abstract:
Class has always been a vital distinguishing factor among people within any society. Clear borders between social layers; such as royals, nobles, aristocrats, the bourgeoisie, and working class; have been minimized and blurred due to the advent of social media. Unprecedented access to information has played a significant role in teaching different individuals about the nature of other social layers, hence, allowing for imitation and integration. This study aims to fill the void in research conducted on such topic. The research explores how social media may be slowly but surely dissolving apparent and rigid borderlines of social class. In order to present an overview of the topic, the study surveys individuals in Kuwait to measure how using social media changed their views and style of social class. It also draws a framework through which implications and suggestions for future research may be discussed to better serve the advancement of human communication.Keywords: class, communication, Kuwait, social media
Procedia PDF Downloads 19013548 Assessment of Heavy Metals in Irrigation Water Collected from Various Vegetables Growing Areas of Swat Valley
Authors: Islam Zeb
Abstract:
The water of poor quality used for irrigation purposes has the potential to be the direct source of contamination and a vehicle for spreading contamination in the field. A number of wide-ranging review articles have been published that highlight irrigation water as a source of heavy metals toxicity which leads to chronic diseases in the human body. Here a study was planned to determine the microbial and heavy metals status of irrigation water collected from various locations of district Swat in various months. The analyses were carried out at the Environmental Horticulture Laboratory, Department of Horticulture, The University of Agriculture Peshawar, during the year 2018 – 19. The experiment was laid out in Randomized Complete Block Design (RCBD) with two factors and three replicates. Factor A consist of different locations and factor B represent various months. The result of heavy metals concentration in different regions, maximum Lead, Cadmium, Chromium, Nickel and Copper (4.27, 0.56, 0.81, 1.33 and 1.51 mg L-1 respectively) were noted for the irrigation water samples collected from Mingora while minimum Lead, Cadmium, Chromium, Nickel and Copper concentration (2.59, 0.30, 0.27, 0.40 and 0.54 mg L-1 respectively) were noted for the samples of matta. Whereas results of heavy metals content in irrigation water samples for various months maximum content of Lead, Cadmium, Chromium, Nickel and Copper (4.56, 0.63, 1.15, 1.31 and 1.48 mg L-1 respectively) were noted for the samples collected in Jan/Feb while lowest values for Lead, Cadmium, Chromium, Nickel and Copper (2.38, 0.24, 0.21, 0.41 and 0.52 mg L-1 respectively) were noted in the samples of July/August. A significant interaction was found for all the studied parameters. It was concluded that the concentration of heavy metal was maximum in irrigation water samples collected from the Mingora location during the month of Jan/Feb because Mingora is the most polluted area as compared to other studied regions, whereas the water content in winter goes to freeze and mostly contaminated water is used for irrigation purposes.Keywords: irrigation water, various months, different regions, heavy metals contamination, Swat
Procedia PDF Downloads 7813547 Prevalence of Breast Cancer Molecular Subtypes at a Tertiary Cancer Institute
Authors: Nahush Modak, Meena Pangarkar, Anand Pathak, Ankita Tamhane
Abstract:
Background: Breast cancer is the prominent cause of cancer and mortality among women. This study was done to show the statistical analysis of a cohort of over 250 patients detected with breast cancer diagnosed by oncologists using Immunohistochemistry (IHC). IHC was performed by using ER; PR; HER2; Ki-67 antibodies. Materials and methods: Formalin fixed Paraffin embedded tissue samples were obtained by surgical manner and standard protocol was followed for fixation, grossing, tissue processing, embedding, cutting and IHC. The Ventana Benchmark XT machine was used for automated IHC of the samples. Antibodies used were supplied by F. Hoffmann-La Roche Ltd. Statistical analysis was performed by using SPSS for windows. Statistical tests performed were chi-squared test and Correlation tests with p<.01. The raw data was collected and provided by National Cancer Insitute, Jamtha, India. Result: Luminal B was the most prevailing molecular subtype of Breast cancer at our institute. Chi squared test of homogeneity was performed to find equality in distribution and Luminal B was the most prevalent molecular subtype. The worse prognostic indicator for breast cancer depends upon expression of Ki-67 and her2 protein in cancerous cells. Our study was done at p <.01 and significant dependence was observed. There exists no dependence of age on molecular subtype of breast cancer. Similarly, age is an independent variable while considering Ki-67 expression. Chi square test performed on Human epidermal growth factor receptor 2 (HER2) statuses of patients and strong dependence was observed in percentage of Ki-67 expression and Her2 (+/-) character which shows that, value of Ki depends upon Her2 expression in cancerous cells (p<.01). Surprisingly, dependence was observed in case of Ki-67 and Pr, at p <.01. This shows that Progesterone receptor proteins (PR) are over-expressed when there is an elevation in expression of Ki-67 protein. Conclusion: We conclude from that Luminal B is the most prevalent molecular subtype at National Cancer Institute, Jamtha, India. There was found no significant correlation between age and Ki-67 expression in any molecular subtype. And no dependence or correlation exists between patients’ age and molecular subtype. We also found that, when the diagnosis is Luminal A, out of the cohort of 257 patients, no patient shows >14% Ki-67 value. Statistically, extremely significant values were observed for dependence of PR+Her2- and PR-Her2+ scores on Ki-67 expression. (p<.01). Her2 is an important prognostic factor in breast cancer. Chi squared test for Her2 and Ki-67 shows that the expression of Ki depends upon Her2 statuses. Moreover, Ki-67 cannot be used as a standalone prognostic factor for determining breast cancer.Keywords: breast cancer molecular subtypes , correlation, immunohistochemistry, Ki-67 and HR, statistical analysis
Procedia PDF Downloads 12313546 Role of von Willebrand Factor and ADAMTS13 In The Prediction of Thrombotic Complications In Patients With COVID-19
Authors: Nataliya V. Dolgushina, Elena A. Gorodnova, Olga S. Beznoshenco, Andrey Yu Romanov, Irina V. Menzhinskaya, Lyubov V. Krechetova, Gennady T. Suchich
Abstract:
In patients with COVID-19, generalized hypercoagulability can lead to the development of severe coagulopathy. This event is accompanied by the development of a pronounced inflammatory reaction. The observational prospective study included 39 patients with mild COVID-19 and 102 patients with moderate and severe COVID-19. Patients were then stratified into groups depending on the risk of venous thromboembolism. vWF to ADAMTS-13 concentrations and activity ratios were significantly higher in patients with a high venous thromboembolism risks in patients with moderate and severe forms COVID-19.Keywords: ADAMTS-13, COVID-19, hypercoagulation, thrombosis, von Willebrand factor
Procedia PDF Downloads 8913545 Legacy of Islamic Hadith and Biodiversity
Authors: Mohsen Nouraei, M. Amouei
Abstract:
Islamic studies are considered in both the Quran and Hadith. Hadith is defined as a set of reports that narrated the words, and behaviors, of infallible persons such as the holy Prophet (pbuh) or the Infallible Imams (as). The issue of biodiversity which is the one of the most important environmental aspects is considered in the field of Hadith. The present paper has investigated biodiversity on the basis of descriptive-analytical methods and with the approach of library-documentary. The household of the Prophet (as) have referred biodiversity that were included diversity of animals, plants, climate etc. In addition to, they also have emphasized on the human need to keep diversity and no damage. It should be noted that they have expressed the rights of the animals and plants for correct using of human, so that human can use these rights in conservation of diversity and their generation.Keywords: biodiversity, conservation of biodiversity, degradation of biodiversity, extinction of biodiversity
Procedia PDF Downloads 46313544 The Impact of India’s Centre-State Relations on its Maritime Counter-Terrorism Strategy
Authors: Riddhi Shah
Abstract:
Centre-state relations in India are a fascinating area of studies. The structure of the relationship has an effect on every single aspect of life as we know it in India. This paper is an attempt to study centre-state relations in the context of India’s maritime counter-terrorism strategy. Although the Government of India has not publicly stated its counter-terrorism strategy on the sea; intelligence, information sharing, crisis response, finances for internal security and the nation’s legislation for battling terrorism together comprise of India’s maritime-terrorism strategy. Through study of these areas, the paper argues that the centre-state divide has had systemic implications on India’s maritime security and has largely done more harm than good to collective initiatives that aspire to prevent future risk of terrorism from the sea or on the sea.Keywords: counter-terrorism, maritime terrorism, India, federalism, centre-state relations
Procedia PDF Downloads 60013543 The Link of the Human Immunodeficiency Virus With the Progression of Multiple Sclerosis Disease
Authors: Sina Mahdavi
Abstract:
Multiple sclerosis (MS) is a progressive inflammatory autoimmune disease of the CNS that affects the myelination process in the central nervous system (CNS). Complex interactions of various "environmental or infectious" factors may act as triggers in autoimmunity and disease progression. The association between viral infections, especially human immunodeficiency virus (HIV) and MS is one potential cause that is not well understood. This study aims to summarize the available data on human HIV infection in MS disease progression. In this study, the keywords "Multiple sclerosis", "Human immunodeficiency virus ", and "Central nervous system" in the databases PubMed, and Google Scholar between 2017 and 2022 were searched and 15 articles were chosen, studied, and analyzed. Revealed histologic signs of "MS-like illness" in the setting of HIV, which comprised widespread demyelination with reactive astrocytes, foamy macrophages, and perivascular infiltration with inflammatory cells, all of which are compatible with MS lesions. Human immunodeficiency virus causes dysfunction of the immune system, especially characterized by hypergammaglobulinemia and chronic activation of B cells. Activation of B cells leads to increased synthesis of immunoglobulin and finally to an excess of free light chains. Free light chains may be involved in autoimmune responses against neurons. There is a high expression of HIV during the course of MS, which indicates the relationship between HIV and MS, that this virus can play a role in the development of MS by creating an inflammatory state. Therefore, measures to modulate the expression of HIV may be effective in reducing inflammatory processes in demyelinated areas of MS patients.Keywords: multiple sclerosis, human immunodeficiency virus, central nervous system, autoimmunity
Procedia PDF Downloads 84