Search results for: intellectual security immunization
1878 To Include or Not to Include: Resolving Ethical Concerns over the 20% High Quality Cassava Flour Inclusion in Wheat Flour Policy in Nigeria
Authors: Popoola I. Olayinka, Alamu E. Oladeji, B. Maziya-Dixon
Abstract:
Cassava, an indigenous crop grown locally by subsistence farmers in Nigeria has potential to bring economic benefits to the country. Consumption of bread and other confectionaries has been on the rise due to lifestyle changes of Nigerian consumers. However, wheat, being the major ingredient for bread and confectionery production does not thrive well under Nigerian climate hence the huge spending on wheat importation. To reduce spending on wheat importation, the Federal Government of Nigeria intends passing into law mandatory inclusion of 20% high-quality cassava flour (HQCF) in wheat flour. While the proposed policy may reduce post harvest loss of cassava, and also increase food security and domestic agricultural productivity, there are downsides to the policy which include reduction in nutritional quality and low sensory appeal of cassava-wheat bread, reluctance of flour millers to use HQCF, technology and processing challenges among others. The policy thus presents an ethical dilemma which must be resolved for its successful implementation. While inclusion of HQCF to wheat flour in bread and confectionery is a topic that may have been well addressed, resolving the ethical dilemma resulting from the act has not received much attention. This paper attempts to resolve this dilemma using various approaches in food ethics (cost benefits, utilitarianism, deontological and deliberative). The Cost-benefit approach did not provide adequate resolution of the dilemma as all the costs and benefits of the policy could not be stated in the quantitative term. The utilitarianism approach suggests that the policy delivers greatest good to the greatest number while the deontological approach suggests that the act (inclusion of HQCF to wheat flour) is right hence the policy is not utterly wrong. The deliberative approach suggests a win-win situation through deliberation with the parties involved.Keywords: HQCF, ethical dilemma, food security, composite flour, cassava bread
Procedia PDF Downloads 4071877 Circular Labour Migration and Its Consequences in Georgia
Authors: Manana Lobzhanidze
Abstract:
Introduction: The paper will argue that labor migration is the most important problem Georgia faces today. The structure of labor migration by age and gender of Georgia is analyzed. The main driving factors of circular labor migration during the last ten years are identified. While studying migration, it is necessary to discuss the interconnection of economic, social, and demographic features, also taking into consideration the policy of state regulations in terms of education and professional training. Methodology: Different research methods are applied in the presented paper: statistical, such as selection, grouping, observation, trend, and qualitative research methods, namely; analysis, synthesis, induction, deduction, comparison ones. Main Findings: Labour migrants are filling the labor market as a low salary worker. The main positive feedback of migration from developing countries is poverty eradication, but this process is accompanied by problems, such as 'Brain Drain'. The country loses an important part of its intellectual potential, and it is invested by households or state itself. Conclusions: Labor migration is characterized to be temporary, but socio-economic problems of the country often push the labor migration in the direction of longterm and illegal migration. Countries with developed economies try to stricter migration policy and fight illegal migration with different methods; circular migration helps solve this problem. Conclusions and recommendations are included about circular labor migration consequences in Georgia and its influence on the reduction of unemployment level.Keywords: migration, circular labor migration, labor migration employment, unemployment
Procedia PDF Downloads 1791876 A Multi-Agent System for Accelerating the Delivery Process of Clinical Diagnostic Laboratory Results Using GSM Technology
Authors: Ayman M. Mansour, Bilal Hawashin, Hesham Alsalem
Abstract:
Faster delivery of laboratory test results is one of the most noticeable signs of good laboratory service and is often used as a key performance indicator of laboratory performance. Despite the availability of technology, the delivery time of clinical laboratory test results continues to be a cause of customer dissatisfaction which makes patients feel frustrated and they became careless to get their laboratory test results. The Medical Clinical Laboratory test results are highly sensitive and could harm patients especially with the severe case if they deliver in wrong time. Such results affect the treatment done by physicians if arrived at correct time efforts should, therefore, be made to ensure faster delivery of lab test results by utilizing new trusted, Robust and fast system. In this paper, we proposed a distributed Multi-Agent System to enhance and faster the process of laboratory test results delivery using SMS. The developed system relies on SMS messages because of the wide availability of GSM network comparing to the other network. The software provides the capability of knowledge sharing between different units and different laboratory medical centers. The system was built using java programming. To implement the proposed system we had many possible techniques. One of these is to use the peer-to-peer (P2P) model, where all the peers are treated equally and the service is distributed among all the peers of the network. However, for the pure P2P model, it is difficult to maintain the coherence of the network, discover new peers and ensure security. Also, security is a quite important issue since each node is allowed to join the network without any control mechanism. We thus take the hybrid P2P model, a model between the Client/Server model and the pure P2P model using GSM technology through SMS messages. This model satisfies our need. A GUI has been developed to provide the laboratory staff with the simple and easy way to interact with the system. This system provides quick response rate and the decision is faster than the manual methods. This will save patients life.Keywords: multi-agent system, delivery process, GSM technology, clinical laboratory results
Procedia PDF Downloads 2491875 Monitoring of Serological Test of Blood Serum in Indicator Groups of the Population of Central Kazakhstan
Authors: Praskovya Britskaya, Fatima Shaizadina, Alua Omarova, Nessipkul Alysheva
Abstract:
Planned preventive vaccination, which is carried out in the Republic of Kazakhstan, promoted permanent decrease in the incidence of measles and viral hepatitis B. In the structure of VHB patients prevail people of young, working age. Monitoring of infectious incidence, monitoring of coverage of immunization of the population, random serological control over the immunity enable well-timed identification of distribution of the activator, effectiveness of the taken measures and forecasting. The serological blood analysis was conducted in indicator groups of the population of Central Kazakhstan for the purpose of identification of antibody titre for vaccine preventable infections (measles, viral hepatitis B). Measles antibodies were defined by method of enzyme-linked assay (ELA) with test-systems "VektoKor" – Ig G ('Vektor-Best' JSC). Antibodies for HBs-antigen of hepatitis B virus in blood serum was identified by method of enzyme-linked assay (ELA) with VektoHBsAg test systems – antibodies ('Vektor-Best' JSC). The result of the analysis is positive, the concentration of IgG to measles virus in the studied sample is equal to 0.18 IU/ml or more. Protective level of concentration of anti-HBsAg makes 10 mIU/ml. The results of the study of postvaccinal measles immunity showed that the share of seropositive people made 87.7% of total number of surveyed. The level of postvaccinal immunity to measles in age groups differs. So, among people older than 56 the percentage of seropositive made 95.2%. Among people aged 15-25 were registered 87.0% seropositive, at the age of 36-45 – 86.6%. In age groups of 25-35 and 36-45 the share of seropositive people was approximately at the same level – 88.5% and 88.8% respectively. The share of people seronegative to a measles virus made 12.3%. The biggest share of seronegative people was found among people aged 36-45 – 13.4% and 15-25 – 13.0%. The analysis of results of the examined people for the existence of postvaccinal immunity to viral hepatitis B showed that from all surveyed only 33.5% have the protective level of concentration of anti-HBsAg of 10 mIU/ml and more. The biggest share of people protected from VHB virus is observed in the age group of 36-45 and makes 60%. In the indicator group – above 56 – seropositive people made 4.8%. The high percentage of seronegative people has been observed in all studied age groups from 40.0% to 95.2%. The group of people which is least protected from getting VHB is people above 56 (95.2%). The probability to get VHB is also high among young people aged 25-35, the percentage of seronegative people made 80%. Thus, the results of the conducted research testify to the need for carrying out serological monitoring of postvaccinal immunity for the purpose of operational assessment of the epidemiological situation, early identification of its changes and prediction of the approaching danger.Keywords: antibodies, blood serum, immunity, immunoglobulin
Procedia PDF Downloads 2551874 Study on Biodeterioration of Proteinous Objects in Museums and Toxic Efficacy of Myristica Fragrans and Syzygium Aromaticum Oils against the Larvae of Anthrenus verbasci
Authors: Fatma Faheem, K. Abduraheem
Abstract:
Museums are custodians of natural and cultural heritage. Objects like tribal dresses, headgears, weapons, musical instruments, manuscripts and other ethnocultural materials housed in museums are prized possessions of intellectual and cultural property of people. Tropical countries like India have a favorable climatic condition for biodeterioration. Organic materials such as leather and parchment objects which form a substantial part of natural history collections of museums across the world are promptly infested by insects like dermestid beetles, tenebrionides, silver fishes, cockroaches and other micro-organisms. The environmental problems caused due to the overuse of pesticides and other non-degradable chemicals have been the matter of serious concern for both the scientists and public in recent years. Synthetic pesticides are very expensive and also highly toxic for humans and its environment. Due to its high health risk factor government has taken severe initiatives on policy of banning it. In order to overcome the problems of biodeterioration, natural biocides should be applied. In this paper, comparative study has been done to investigate the toxic efficacy of Myristica fragrans and Syzygium aromaticum oil in variation with contact and stomach toxicity against larvae of Anthrenus verbasci.Keywords: biodeterioration, contact toxicity, cultural heritage, natural biocides, natural heritage, stomach toxicity
Procedia PDF Downloads 2451873 Undersea Communications Infrastructure: Risks, Opportunities, and Geopolitical Considerations
Authors: Lori W. Gordon, Karen A. Jones
Abstract:
Today’s high-speed data connectivity depends on a vast global network of infrastructure across space, air, land, and sea, with undersea cable infrastructure (UCI) serving as the primary means for intercontinental and ‘long-haul’ communications. The UCI landscape is changing and includes an increasing variety of state actors, such as the growing economies of Brazil, Russia, India, China, and South Africa. Non-state commercial actors, such as hyper-scale content providers including Google, Facebook, Microsoft, and Amazon, are also seeking to control their data and networks through significant investments in submarine cables. Active investments by both state and non-state actors will invariably influence the growth, geopolitics, and security of this sector. Beyond these hyper-scale content providers, there are new commercial satellite communication providers. These new players include traditional geosynchronous (GEO) satellites that offer broad coverage, high throughput GEO satellites offering high capacity with spot beam technology, low earth orbit (LEO) ‘mega constellations’ – global broadband services. And potential new entrants such as High Altitude Platforms (HAPS) offer low latency connectivity, LEO constellations offer high-speed optical mesh networks, i.e., ‘fiber in the sky.’ This paper focuses on understanding the role of submarine cables within the larger context of the global data commons, spanning space, terrestrial, air, and sea networks, including an analysis of national security policy and geopolitical implications. As network operators and commercial and government stakeholders plan for emerging technologies and architectures, hedging risks for future connectivity will ensure that our data backbone will be secure for years to come.Keywords: communications, global, infrastructure, technology
Procedia PDF Downloads 871872 Impact of Different Ripening Accelerators on the Microbial Load and Proximate Composition of Plantain (Musa paradisiaca) and Banana (Musa sapientum), during the Ripening Process, and the Nutrition Implication for Food Security
Authors: Wisdom Robert Duruji, Oluwasegun Christopher Akinleye
Abstract:
This study reports on the impact of different ripening accelerators on the microbial load and proximate composition of plantain (Musa paradisiaca) and Banana (Musa sapientum) during the ripening process, and the nutrition implication for food security. The study comprised of four treatments, namely: Calcium carbide, Irvingia gabonensis fruits, Newbouldia laevis leaves and a control, where no ripening accelerator was applied to the fingers of plantain and banana. The unripe and ripened plantain and banana were subjected to microbial analysis by isolating and enumerating their micro flora using pour plate method; and also, their proximate composition was determined using standard methods. The result indicated that the bacteria count of plantain increased from 3.25 ± 0.33 for unripe to 5.31 ± 0.30 log cfu/g for (treated) ripened, and that of banana increased from 3.69 ± 0.11 for unripe to 5.26 ± 0.21 log cfu/g for ripened. Also, the fungal count of plantain increased from 3.20 ± 0.16 for unripe to 4.88 ± 0.22 log sfu/g for ripened; and that of banana increased from 3.61 ± 0.19 for unripe to 5.43 ± 0.26 for ripened. Ripened plantain fingers without any ripening accelerator (control) had significantly (p < 0.05) higher values of crude protein 3.56 ± 0.06%, crude fat 0.42 ± 0.04%, total ash 2.74 ± 0.15 and carbohydrate 31.10 ± 0.20; but with significantly lower value of moisture 62.14 ± 0.07% when compared with treated plantain. The proximate composition trend of treated and banana fingers control is similar to that of treated and plantain control, except that higher moisture content of 75.11 ± 0.07% and lesser protein, crude fat, total ash and carbohydrate were obtained from treated and ripened banana control when the treatments were compared with that of plantain. The study concluded that plantain is more nutritious (mealy) than a banana; also, the ripening accelerators increased the microbial load and reduced the nutritional status of plantain and banana.Keywords: food nutrition, calcium carbide, rvingia gabonensis, newbouldia laevis, plantain, banana
Procedia PDF Downloads 3231871 The Crisis in Ukraine and the End of the Post Cold War Security Delusions in Europe
Authors: Georgios Siachamis
Abstract:
The main objective of this paper is to examine how the crisis in Ukraine can change our perception and understanding of the strategic challenges in Europe. It will try also to address the main factors behind the beginning of the conflict in Ukraine, the miscalculations and mistakes that lead towards the escalation of the crisis and what constructive initiatives are needed to be taken in order to avoid further instability in the region. Furthermore, measures in order to develop a more stable relation with Russia are also going to be presented. Finally the implementation of a new strategic outlook for the EU is also going to be analysed.Keywords: crisis management, European grand strategy, crisis in Ukraine, Russian policy
Procedia PDF Downloads 3691870 Exploring Heidegger’s Fourfold through Architecture-Dwelling for Imaginary Fictional Characters in Drawings
Authors: Hassan Wajid
Abstract:
Architecture design studio with all its accouterments, especially pedagogies, has been committed to awakening the students to the true meaning of the concept of Dwelling. The real task is how to make them unlearn the associations of “dwelling as a rented or owned accommodation by the road with a car parked in front of a garage door and replace it by the fundamental experiential-phenomenological manifestations of Light, Space, Gravity and Time through assigned readings and small theoretical challenges resulting in drawings and models. The primary challenge for teachers remained the introduction of the act or desire of ‘Dwelling’ philosophically. The academic link had been offered by Albert Hofstadter's Poetry, Language, through which Martin Heidegger’s fourfold concept of ‘Building Dwelling, Thinking’ primarily served to guide us through this trajectory in helping to build an intellectual framework as justification of the term “dwelling” in its various meanings. Gaston Bachelard’s Poetics of Space and Merleau-Ponti’s Phenomenology of Perception also got assigned as reading. Four fictional characters created by two master short story writers G Maupassant, and O Henry were introduced as DwellersClients in search of their respective dwellings as drawn imaginations in the studio four-fold of Light, Space, Gravity, and Time and at the same time aspire to understand thoroughly Heidegger’s Four-Fold of Earth, Sky, Divinities and Mortals. asserting its place in the corresponding story and its unique character as the Dweller.Keywords: dwelling, imagination, architectural manifestation, phenomenological
Procedia PDF Downloads 701869 Women Mayors and Management of Spanish Councils: An Empirical Analysis
Authors: Carmen Maria Hernandez-Nicolas, Juan Francisco Martín-Ugedo, Antonio Mínguez-Vera
Abstract:
This paper analyses the influence of gender of the mayors of Spanish local governments on different budget items using a sample of 8,243 town councils between 2002 and 2010 period and 64,361 observations. The system Generalized Method of Moments (GMM) technique was employed to examine this panel data. This powerful methodology allows controlling for the endogenity of the variables and the heterogeneity of the sample. Unlike previous works focused on the study of gender influence on firm decisions, the present work analyzes the influence of the gender of the major in the council’s decisions. Specifically, we examine the differences in financial liabilities, security, protection and social promotion expenses and income items relating to public management. In addition, the study focuses on the Spanish context, which is characterized by the presence of decentralization of public responsibility to a greater extent than in neighboring countries, feeding the debate on the operational efficiency of local government increased with an open debate on the importance of gender in public management. The results show that female mayors tend to have lower expenses in general without significant differences in incomes obtained for men and women majors. We also find that female majors incur fewer financial liabilities, one of the most important problems in the Spanish public sector. However, despite of cutting in the public sector, these councils have higher expenditure on security, protection and social promotion. According to these evidences, the presence of women in politics may serve to improve the councils’ economic situation and it is not only necessary for social justice but for economics efficiency. Besides, in councils with more inhabitants, women mayors are more common, but women who served for a very long time are less common.Keywords: councils, gender, local budgets, public management, women mayors
Procedia PDF Downloads 4001868 Islamic State: Franchising Jihad through the New Caliphate
Authors: Janiel David Melamed Visbal
Abstract:
The Islamic State has become one of the most remarkable threats for international security through their religious extremism and their establishment of a new caliphate by force. The main objective of this organization is to obtain territorial expansions beyond the Middle East and eventually to consolidate an Islamic global order based on their extremist ideology. This paper will conduct an analysis regarding how, over the past year, many jihadist organizations worldwide have pledged their alliagance to the Islamic State, transforming it into the most important jihadist franchise globally.Keywords: Islamic state, franchise, jihad, Islamic fundamentalism, caliphate
Procedia PDF Downloads 3591867 Individualized Teaching Process for Pupils with Moderate Mental Disability
Authors: VojtěCh Gybas, Libor Klubal, KateřIna KostoláNyová
Abstract:
Individualized teaching process for pupils with moderate mental disabilities with the help of using mobile touch devices may be one of the forms of teaching to achieve better development of these students during the teaching process. Didactics of information and communication technology (ICT) for special primary schools, where within the Czech Republic pupils with moderate mental retardation are educated, is not precisely and clearly defined. Still, general educational program for elementary school contains a special educational area of information and communication technology, in which the work and content area are focused on work with the classic desktop, and it is not always acceptable in the case of students with moderate mental disabilities. Individualization of their schooling requires a fully elaborate content of teaching material corresponding with intellectual abilities and individuality of each pupil. After three years of daily use of mobile touch devices iPad and participant observation of 7 pupils in a class from special elementary school, we can say that these technologies can be a very useful tool, and in many ways, they even exceed, compensate and replace freely available printed educational material that is rather outdated. By working with mobile touch technology, a pupil gains responsibility, trains his will, learns to rely on himself. The first results obtained from the case studies suggest that this form of teaching may also be beneficial for pupils with moderate mental disabilities.Keywords: individualized teaching, mobile touch technology, iPad, moderate mental disability, special education needs
Procedia PDF Downloads 3281866 The Status and Role of Women in Indian IT Industry and Relevant Role and Scope of HRM
Authors: Shivani Kolarkar
Abstract:
Splendid growth in Indian IT has generated women employment on a large scale in India and continues to do it. Indian IT industry has achieved this in spite of total masculine dominance in other Indian engineering industries, where the ratio of women employment is almost negligible as compared to men. Indian IT today proudly enjoys a strong pool of technically educated, intellectual, and skillful women employees. IT industry has encouraged technical education for women in India, to a great extent. The software industry has definitely contributed to developing a positive and dignified role and status of women employees in Indian IT industry. It has promoted women’s social and economic role and status. In spite of all, gender discrimination still persists in Indian IT, also, which is low as compared to other industries, but it is a matter of concern. An Indian woman is bound to carry dual roles which are equally over-stressed for IT women employees. Long working hours, night shifts, work pressures and insufficient safety majors and necessary facilities for women contributes to making her physical-mental life, family and married life troublesome. Which forces her either to cluster at low-end jobs in IT/elsewhere or to sacrifice her career. Nature, role and status of HRM needs to be broadened, deepened and shaped into research-oriented multidimensional perspective in the context of really enhancing role and status of Indian IT women with high appreciation of women employees’ dignity and entity.Keywords: attrition, gender discrimination, HRM, Indian IT, software industry, job satisfaction, safety, technical education, women employment
Procedia PDF Downloads 6461865 Improving Food Security and Commercial Development through Promotion of High Value Medicinal and Industrial Plants in the Swat Valley of Pakistan
Authors: Hassan Sher
Abstract:
Agriculture has a pivotal role in Pakistan’s economy, accounting for about one-fourth of the GDP and employing almost half the population. However, the competitiveness, productivity, growth, employment potential, export opportunity, and contribution to GDP of the sector is significantly hampered by agriculture marketing laws/regulations at the provincial level that reward rent seeking behavior, promote monopoly power, artificially reduce farmer incomes while inflating prices to consumers, and act as disincentives to investment. Although of more recent vintage than some other provincial agricultural marketing laws, the NWFP Agricultural and Livestock Produce Markets Act, 2007 is a throwback to a colonial paradigm, where restrictions on agricultural produce marketing and Government control of distribution channels is the norm. The Swat Valley (in which we include its tributary valleys) is an area of Pakistan in which there is poverty is both extreme and pervasive. For many, a significant portion of the family’s income comes from selling plants that are used as herbs, medicines, and perfumes. Earlier studies have shown that the benefit they derive from this work is less than they might because of: Lack of knowledge concerning which plants and which plant parts are valuable, Lack of knowledge concerning optimal preservation and storage of material, illiteracy. Another concern that much of the plant material sold from the valley is collected in the wild, without an appreciation of the negative impact continued collecting has on wild populations. We propose: Creating colored cards to help inhabitants recognize the 25 most valuable plants in their area; Developing and sharing protocols for growing the 25 most valuable plants in a home garden; Developing and sharing efficient mechanisms for drying plants so they do not lose value; Encouraging increased literacy by incorporating numbers and a few words in the handouts.Keywords: food security, medicinal plants, industrial plants, economic development
Procedia PDF Downloads 3271864 Sports Preferente Intervention as a Predictor of Sustainable Participation at Risk Teenagers in Ibadan Metropolis, Ibadan Nigerian
Authors: Felix Olajide Ibikunle
Abstract:
Introductory Statement: Sustainable participation of teenagers in sport requires deliberate and concerted plan and managerial policy rooted in the “philosophy of catch them young”. At risk, teenagers need proper integration into societal aspiration: This direction will go a long way to streamline them into the security breach and attractive nuisance free lifestyles. Basic Methodology: The population consists of children within 13-19 years old. A proportionate sampling size technique of 60% was adopted to select seven zones out of 11 geo-political zones in the Ibadan metropolis. Qualitative information and interview were used to collect needed information. Majority of the teenagers were out of school, street hawkers, motor pack, touts, and unserious vocation apprentices. These groups have the potentials of security breaches in the metropolis and beyond. Five hundred and thirty-four (534) respondents were used for the study. They were drawn from Ojoo, Akingbile, and Moniya axis = 72, Agbowo, Ajibode, and Apete axis = 74; Akobo, Basorun, and Idi-ape axis 79; Wofun, Monatan, and Iyana-Church axis = 78; Molete, Oke-ado and Oke-Bola axis = 75; Beere, Odinjo, Elekuro axis = 77; Eleyele, Ologuneru, and Alesinloye axis = 79. Major Findings: Multiple regression was used to analyze the independent variables and percentage. The respondents average age was 15.6 years old, and with 100% male. The instrument(questionnaire) used yielded; sport preference (r = 0.72); intervention (r = 0.68) and the sustainable participation (r = 0.70).The relative contributions of sport preference on participation of at risk teenagers was (F-ratio = 1.067); Intervention contribution of sport on participation of at risk teenagers = produced (F-ratio of 12.095) was significant while sustainable participation of at risk teenager produced (F-ratio = 1.062) was significant. Closing Statement: The respondents’ sport preference stimulated their participation in sport. The intervention exposed at risk-teenagers to coaching, which activated their interest and participation in sport. While sustainable participation contributed positively to evolve at risk teenagers participation in their preferred sport.Keywords: sport, preference, intervention, teenagers, sustainable, participation and risk teenagers
Procedia PDF Downloads 1121863 Assessment of Image Databases Used for Human Skin Detection Methods
Authors: Saleh Alshehri
Abstract:
Human skin detection is a vital step in many applications. Some of the applications are critical especially those related to security. This leverages the importance of a high-performance detection algorithm. To validate the accuracy of the algorithm, image databases are usually used. However, the suitability of these image databases is still questionable. It is suggested that the suitability can be measured mainly by the span the database covers of the color space. This research investigates the validity of three famous image databases.Keywords: image databases, image processing, pattern recognition, neural networks
Procedia PDF Downloads 2711862 The Effect of Language and Literature Integration on the Teaching of English Vocabulary and Grammar in Secondary Schools in Zamfara State, Nigeria
Authors: Umar Bello
Abstract:
Literature has become an invaluable subject which has added a great value and contribution to the teaching of English language and the discovery of many other developed ideas. Literature produces an exhilarating impulse that imprints a lasting picture on the mind of a learner. Many researchers have devised various means and approaches to language Teaching methods which remain unconvinging and which yield little result, but it has remained unconvincing because it has only produced little results. Devicing a method that eliminates monotony and boredome to learners is a good factor that enhances students’ motivation to learning. In this sense, literature and language become unavoidable components that aid intellectual development. This study examines the indispensability of literature as a means of English Language teaching to secondary school classes. The researcher has developed many instructive activities which are believed will help students to improve their study in grammar and vocabulary. The researcher has used quasi-experimental approach using experimental group and control group to find out how literature enhances the students grammar as well as their vocabulary. The findings revealed a positive performance in the experimental group doing better than the control group using simple percentage. The results make it clear that literature allows learners to pay more attention and develop more interest to their studies. In giving a perspicacious linguistic development, literature therefore remains an essential tool for language teaching classrooms, thereby enhancing their grammatical and vocabulary usage.Keywords: teaching vocabulary, integration, poetry, classroom
Procedia PDF Downloads 1041861 Enhancing Project Success: A Case Study of Investment Strategies and Planning Practices in Rwanda’s Housing Projects Managed by Rwanda Social Security Board
Authors: Amina Umulisa
Abstract:
Background: Despite efforts to enhance profitability and project planning, Rwanda has experienced a decline in project success rates, notably in housing projects managed by the Rwanda Social Security Board (RSSB). This study aims to assess the impact of investment strategies and project planning practices on the performance of pension funds projects in Rwanda, focusing on housing projects by RSSB. Methods: Using descriptive and correlational research designs, this study surveyed 109 randomly selected respondents from a pool of 148 workers. Data analysis was conducted using descriptive and inferential statistics in STATA version 18. Results: Findings revealed that 54% of respondents acknowledged the importance of personnel generation. Additionally, 61% agreed with the effectiveness of training programs, and 79% supported the cost of human resource utilization. In terms of project management practices, 65.7% could determine when a project needed adjustments, 65.7% agreed with the approved budget, and 73% supported forecasted expenses. Furthermore, 68% agreed with order placement, 76.0% with using the right materials, and 64.4% with defining project scope. The study found significant associations between order placement and project quality outcomes (r=0.711, P-value <0.001), as well as with time management (Pearson was 0.701 and sing was 0.00) and cost management (r=0.885, P-value <0.001). Moreover, project time targets were found to significantly affect quality management (Pearson was 0.798, sing was 0.000), time management, and cost management (r=0.740, P-value <0.001). Conclusion: The findings highlight the positive association between the project implementation stage and quality management, indicating effective project planning practices among senior staff. However, there is a need to enhance project team collaboration and coordination to improve the performance of constructed houses.Keywords: project success rates, investment strategies, training programs, cost management
Procedia PDF Downloads 521860 Women Retelling the Iranian Revolution: A Comparative Study of Novelists Maryam Madjidi and Negar Djavadi
Authors: Alessandro Giardino
Abstract:
The Iranian Revolution has been the object of numberless historical and semi-fictional accounts, often providing a monolithic perspective on the events, due to the westerner positioning of those recounting them. Against this tradition, two contemporary French-Iranian novels "Disoriental" (2016) by Negar Djavadi and "Marx and The Doll" (2017) by Maryam Madjidi have offered readers a female-oriented and interestingly layered representation of the Iranian Revolution, hence addressing the responsibilities and misconceptions of Western countries. Furthermore, these two women writers have shed light on the disenchantment of the Iranian intellectual class vis-à-vis the foundation of the Islamic Republic, by particularly focusing on the deterioration of women’s rights, as well as the repression of political, ethnical, religious and sexual minorities. By a psycholinguistic and semasiological analysis of the two novels by Djavadi and Madjidi, this essay will focus on alternative accounts of the revolution in order to reflect upon the role of intersectional literature to the understanding of history. More specifically, as both women, refugees, and bi-cultural writers, Djavadi and Madjidi unearthed moments and figures of the revolution which had disappeared from the prevalent narrative. In doing so, however, these two writers resorted to entirely opposite styles of writing that, it will be argued, stem from different types of female resistance. In defining these two approaches as a "narrative resistance" and a "photographic resistance," the essay will elucidate the dependence of these writers’ language on generational and psychological factors, but it will also stir a reflection on their different communicative strategies.Keywords: Iranian revolution, French-Iranian, intersectionality, literature, women writers
Procedia PDF Downloads 1581859 The Effect of Technology on Legal Securities and Privacy Issues
Authors: Nancy Samuel Reyad Farhan
Abstract:
even though international crook law has grown considerably inside the ultimate decades, it still remains fragmented and lacks doctrinal cohesiveness. Its idea is defined within the doctrine as pretty disputable. there is no concrete definition of the term. in the home doctrine, the hassle of crook law troubles that rise up within the worldwide setting, and international troubles that get up in the national crook regulation, is underdeveloped each theoretically and nearly. To the exceptional of writer’s know-how, there aren't any studies describing worldwide elements of crook law in a complete way, taking a more expansive view of the difficulty. This paper provides consequences of a part of the doctoral studies, assignment a theoretical framework of the worldwide crook law. It ambitions at checking out the present terminology on international components of criminal law. It demonstrates differences among the notions of global crook regulation, criminal regulation international and law worldwide crook. It confronts the belief of crook regulation with associated disciplines and indicates their interplay. It specifies the scope of international criminal regulation. It diagnoses the contemporary criminal framework of global components of criminal regulation, referring to each crook law issues that rise up inside the international setting, and international problems that rise up within the context of national criminal law. ultimately, de lege lata postulates had been formulated and route of modifications in global criminal law turned into proposed. The followed studies hypothesis assumed that the belief of international criminal regulation became inconsistent, not understood uniformly, and there has been no conformity as to its location inside the system of regulation, objective and subjective scopes, while the domestic doctrine did not correspond with international requirements and differed from the global doctrine. applied research strategies covered inter alia a dogmatic and legal technique, an analytical technique, a comparative approach, in addition to desk studies.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 311858 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 5521857 The Implementation of Anti-Circumvention Legislations in Thai Copyright System
Authors: Chuencheewin Yimfuang
Abstract:
The WIPO copyright treaty (WCT) was established by the World Intellectual Property Organisation (WIPO). This agreement required the contracting nations to provide adequate protection to technological measures to prevent massive copyright infringement in the internet system. Thailand had to implement the anti-circumvention rules into domestic legislation to comply with this international obligation. The purpose of this paper is to critically discuss the legislative standard under the WCT. It also aims to examine the legal development of technological protection measures in Thailand and demonstrate that the scope of prohibitions under the copyright Act 2022 (NO.5) is similar to the Digital Millennium Copyright Act 1998 (DMCA) of the United States (US). It could be found that the anti-circumvention laws of Thailand prohibit the circumvention of access-control technologies, and the regulation on trafficking circumvention devices has been added to the latest version of the Thai Copyright Act. These legislative evolutions have revealed the attempt to reinforce the legal protection of technological measures and copyright holders in order to be in line with global practices. However, the amendment has problems concerning the legal definitions of effective technological measure and the prohibited act of circumvention. The vagueness might affect the scope of protection and the boundary of prohibition. With this aspect, the DMCA will be evaluated and compared to gain guidelines for interpretation and enforcement in Thailand. The lessons and experiences learned from this study might be useful to correct the flaws or at least clarify the ambiguities embodied in Thai copyright legislation.Keywords: legal development, technological protection measure, circumvention, Thailand
Procedia PDF Downloads 871856 Flexible Communication Platform for Crisis Management
Authors: Jiří Barta, Tomáš Ludík, Jiří Urbánek
Abstract:
The topics of disaster and emergency management are highly debated among experts. Fast communication will help to deal with emergencies. Problem is with the network connection and data exchange. The paper suggests a solution, which allows possibilities and perspectives of new flexible communication platform to the protection of communication systems for crisis management. This platform is used for everyday communication and communication in crisis situations too.Keywords: crisis management, information systems, interoperability, crisis communication, security environment, communication platform
Procedia PDF Downloads 4751855 The Secrecy Capacity of the Semi-Deterministic Wiretap Channel with Three State Information
Authors: Mustafa El-Halabi
Abstract:
A general model of wiretap channel with states is considered, where the legitimate receiver and the wiretapper’s observations depend on three states S1, S2 and S3. State S1 is non-causally known to the encoder, S2 is known to the receiver, and S3 remains unknown. A secure coding scheme, based using structured-binning, is proposed, and it is shown to achieve the secrecy capacity when the signal at legitimate receiver is a deterministic function of the input.Keywords: physical layer security, interference, side information, secrecy capacity
Procedia PDF Downloads 3891854 Farmers’ Perception and Response to Climate Change Across Agro-ecological Zones in Conflict-Ridden Communities in Cameroon
Authors: Lotsmart Fonjong
Abstract:
The livelihood of rural communities in the West African state of Cameroon, which is largely dictated by natural forces (rainfall, temperatures, and soil), is today threatened by climate change and armed conflict. This paper investigates the extent to which rural communities are aware of climate change, how their perceptions of changes across different agro-ecological zones have impacted farming practices, output, and lifestyles, on the one hand, and the extent to which local armed conflicts are confounding their efforts and adaptation abilities. The paper is based on a survey conducted among small farmers in selected localities within the forest and savanna ecological zones of the conflict-ridden Northwest and Southwest Cameroon. Attention is paid to farmers’ gender, scale, and type of farming. Farmers’ perception of/and response to climate change are analysed alongside local rainfall and temperature data and mobilization for climate justice. Findings highlight the fact that farmers’ perception generally corroborates local climatic data. Climatic instability has negatively affected farmers’ output, food prices, standards of living, and food security. However, the vulnerability of the population varies across ecological zones, gender, and crop types. While these factors also account for differences in local response and adaptation to climate change, ongoing armed conflicts in these regions have further complicated opportunities for climate-driven agricultural innovations, inputs, and exchange of information among farmers. This situation underlines how poor communities, as victims, are forced into many complex problems outsider their making. It is therefore important to mainstream farmers’ perceptions and differences into policy strategies that consider both climate change and Anglophone conflict as national security concerns foe sustainable development in Cameroon.Keywords: adaptation policies, climate change, conflict, small farmers, cameroon
Procedia PDF Downloads 1561853 Security System for Safe Transmission of Medical Image
Authors: Mohammed Jamal Al-Mansor, Kok Beng Gan
Abstract:
This paper develops an optimized embedding of payload in medical image by using genetic optimization. The goal is to preserve region of interest from being distorted because of the watermark. By using this developed system there is no need of manual defining of region of interest through experts as the system will apply the genetic optimization to select the parts of image that can carry the watermark with guaranteeing less distortion. The experimental results assure that genetic based optimization is useful for performing steganography with less mean square error percentage.Keywords: AES, DWT, genetic algorithm, watermarking
Procedia PDF Downloads 4111852 Sports Preference Intervention as a Predictor of Sustainable Participation at Risk Teenagers in Ibadan Metropolis, Ibadan Nigerian
Authors: Felix Olajide Ibikunle
Abstract:
Introductory Statement: Sustainable participation of teenagers in sports requires deliberate and concerted plans and managerial policy rooted in the “philosophy of catch them young.” At risk, teenagers need proper integration into societal aspiration: This direction will go a long way to streamline them into security breaches and attractive nuisance free lifestyles. Basic Methodology: The population consists of children between 13-19 years old. A proportionate sampling size technique of 60% was adopted to select seven zones out of 11 geo-political zones in the Ibadan metropolis. Qualitative information and interview were used to collect needed information. The majority of the teenagers were out of school, street hawkers, motor pack touts and unserious vocation apprentices. These groups have the potential for security breaches in the metropolis and beyond. Five hundred and thirty-four (534) respondents were used for the study. They were drawn from Ojoo, Akingbile and Moniya axis = 72; Agbowo, Ajibode and Apete axis = 74; Akobo, Basorun and Idi-ape axis 79; Wofun, Monatan and Iyana-Church axis = 78; Molete, Oke-ado and Oke-Bola axis = 75; Beere, Odinjo, Elekuro axis = 77; Eleyele, Ologuneru and Alesinloye axis = 79. Major Findings: Multiple regression was used to analyze the independent variables and percentages. The respondents' average age was 15.6 years old, and 100% were male. The instrument (questionnaire) used yielded; sport preference (r = 0.72), intervention (r = 0.68), and sustainable participation (r = 0.70). The relative contributions of sport preference on the participation of at risk teenagers was (F-ratio = 1.067); Intervention contribution of sport on the participation of at risk teenagers = produced (F-ratio of 12.095) was significant while, sustainable participation of at risk teenagers produced (F-ratio = 1.062) was significant. Closing Statement: The respondents’ sport preference stimulated their participation in sports. The intervention exposed at risk-teenagers to coaching, which activated their interest and participation in sports. At the same time, sustainable participation contributed positively to evolving at risk teenagers' participation in their preferred sport.Keywords: sport, preference, intervention, teenagers, sustainable, participation and risk teenagers
Procedia PDF Downloads 801851 Eating Patterns and Food Coping Strategy for Students of Prof. Dr. Hamka University During Covid-19 Pandemic
Authors: Chica Riska Ashari, Yoli Farradika
Abstract:
Background: Nutritional problems arise due to food security problems in the family, such as the ability of families to obtain food which is common in poor people due to lack of economic access to buy food. For this reason, it is hoped that there will be actions or behaviors that can be taken to fulfill their food or known as the Food Coping Strategy. The purpose of this study is to identify the eating patterns and Food Coping strategies of household students of prof. DR. HAMKA Muhammadiyah University Jakarta during the covid-19 pandemic. Methods: This study is a quantitative observational study with a cross-sectional approach. The dependent variable in this study is food coping strategies and eating patterns. The location of this research is Prof. DR. Hamka Muhammadiyah University. The population in this study were all students of Prof. DR. HAMKA Muhammadiyah University. The sampling technique is purposive sampling. The minimum number of samples in this study is 97 people with a response rate or drop out an estimate of 10%, so the total number of samples was 107 people. Statistical analysis with descriptive analysis. Results: The results showed that most of the food coping strategies were carried out by the students of the household of Prof. DR. HAMKA Muhammadiyah University, were buying the cheaper food (91.6%), then changing the priority of buying food (75.7%) and household members who carry out this food coping strategy are mothers (59.8%) then followed by students themselves (57, 9%). The diet of most students at the Prof. DR. HAMKA Muhammadiyah University in a day was fond of consuming sugar and foods containing sugar (candy, sugar, honey, sweet drinks) (98.1%) then eggs (97.2%). Conclusion: Food coping strategies are mostly used by households students at Prof. DR. HAMKA Muhammadiyah University who were buying the cheaper food and the member who did this behavior the most were the mothers. The diet of most students at Prof. DR. HAMKA Muhammadiyah University in a day was fond of consuming sugar and foods containing sugar (candy, sugar, honey, sweet drinks).Keywords: behavior, eating patterns, food coping strategies, food security, students
Procedia PDF Downloads 1831850 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan
Authors: Sehrish Qayyum
Abstract:
In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.Keywords: asymmetric warfare, psychometric analysis, PRPP, security
Procedia PDF Downloads 1361849 Improving the Logistic System to Secure Effective Food Fish Supply Chain in Indonesia
Authors: Atikah Nurhayati, Asep A. Handaka
Abstract:
Indonesia is a world’s major fish producer which can feed not only its citizens but also the people of the world. Currently, the total annual production is 11 tons and expected to double by the year of 2050. Given the potential, fishery has been an important part of the national food security system in Indonesia. Despite such a potential, a big challenge is facing the Indonesians in making fish the reliable source for their food, more specifically source of protein intake. The long geographic distance between the fish production centers and the consumer concentrations has prevented effective supply chain from producers to consumers and therefore demands a good logistic system. This paper is based on our research, which aimed at analyzing the fish supply chain and is to suggest relevant improvement to the chain. The research was conducted in the Year of 2016 in selected locations of Java Island, where intensive transaction on fishery commodities occur. Data used in this research comprises secondary data of time series reports on production and distribution and primary data regarding distribution aspects which were collected through interviews with purposively selected 100 respondents representing fishers, traders and processors. The data were analyzed following the supply chain management framework and processed following logistic regression and validity tests. The main findings of the research are as follows. Firstly, it was found that improperly managed connectivity and logistic chain is the main cause for insecurity of availability and affordability for the consumers. Secondly, lack of quality of most local processed products is a major obstacle for improving affordability and connectivity. The paper concluded with a number of recommended strategies to tackle the problem. These include rationalization of the length of the existing supply chain, intensification of processing activities, and improvement of distribution infrastructure and facilities.Keywords: fishery, food security, logistic, supply chain
Procedia PDF Downloads 241