Search results for: security personnel
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3395

Search results for: security personnel

1775 Factors Affecting Contractual Disputes in Construction ProJects in Sri Lanka

Authors: R. M. Rajapaksa

Abstract:

Construction industry is one of the key players in driving the economy of a country to achieve its prosperity. However, a dispute is one of the crucial factors which prevent the completion of construction contracts within the budgeted cost, scheduled time, and accepted quality. Disputes are inevitable in the construction contract. Accordingly, a study has been undertaken to identify the factors affecting contractual disputes in construction projects in Sri Lanka. The study was a mixed approach with major qualitative and minor quantitative. Qualitative study was set in the form of in-depth interviews with eighteen participants, and quantitative study was conducted using a questionnaire with twenty-four respondents from previously implemented projects by the National Water Supply & Drainage Board representing the employer, engineer and the Contractor to identify the factors affecting contractual disputes and to verify most critical factors respectively. Data analysis for qualitative and quantitative studies was carried out by means of transcribing, code & categorizeand average score methods, respectively. The study reveals that there are forty factors affecting the contractual disputes in construction contracts in Sri Lanka. The finding further illustrates that conflicting decisions by inexperience personnel in the higher position of the Employer, ambiguities resulting inadequate descriptions of the preliminary/general items in price schedule, unfair valuation and late confirmation of variations, unfair determination due to lack of experience of the Engineer/Consultant, under certification of progress payments, unfair grant of EOT & application of delay damages, unreasonable claims for variation of works, errors/discrepancies/ambiguities in the contract conditions and discrepancies & errors in designs & specifications are the most critical factors affecting contractual disputes. Finally, the study proposed remedial measures to most critical factors affecting contractual disputes.

Keywords: dispute, contractual, factors, employer, engineer, contractor, construction projects

Procedia PDF Downloads 217
1774 Pakistan’s Counterinsurgency Operations: A Case Study of Swat

Authors: Arshad Ali

Abstract:

The Taliban insurgency in Swat which started apparently as a social movement in 2004 transformed into an anti-Pakistan Islamist insurgency by joining hands with the Tehrik-e-Taliban Pakistan (TTP) upon its formation in 2007. It quickly spread beyond Swat by 2009 making Swat the second stronghold of TTP after FATA. It prompted the Pakistan military to launch a full-scale counterinsurgency military operation code named Rah-i-Rast to regain the control of Swat. Operation Rah-i-Rast was successful not only in restoring the writ of the State but more importantly in creating a consensus against the spread of Taliban insurgency in Pakistan at political, social and military levels. This operation became a test case for civilian government and military to seek for a sustainable solution combating the TTP insurgency in the north-west of Pakistan. This study analyzes why the counterinsurgency operation Rah-i-Rast was successful and why the previous ones came into failure. The study also explores factors which created consensus against the Taliban insurgency at political and social level as well as reasons which hindered such a consensual approach in the past. The study argues that the previous initiatives failed due to various factors including Pakistan army’s lack of comprehensive counterinsurgency model, weak political will and public support, and states negligence. Also, the initial counterinsurgency policies were ad-hoc in nature fluctuating between military operations and peace deals. After continuous failure, the military revisited its approach to counterinsurgency in the operation Rah-i-Rast. The security forces learnt from their past experiences and developed a pragmatic counterinsurgency model: ‘clear, hold, build, and transfer.’ The military also adopted the population-centric approach to provide security to the local people. This case Study of Swat evaluates the strengths and weaknesses of the Pakistan's counterinsurgency operations as well as peace agreements. It will analyze operation Rah-i-Rast in the light of David Galula’s model of counterinsurgency. Unlike existing literature, the study underscores the bottom up approach adopted by the Pakistan’s military and government by engaging the local population to sustain the post-operation stability in Swat. More specifically, the study emphasizes on the hybrid counterinsurgency model “clear, hold, and build and Transfer” in Swat.

Keywords: Insurgency, Counterinsurgency, clear, hold, build, transfer

Procedia PDF Downloads 364
1773 The Effectiveness of Executive Order in the Implementation of Human Security Policies: The Violent Case of the Special Anti-Robbery Squad and Youths in Nigeria

Authors: Cita Ayeni

Abstract:

Amidst numerous arguments on reasons for low Human Development (low HDI) in Nigeria ranging from corruption, incompetence of the government and its agencies, mismanagement of funds, terrorism, violence, and crime in the country, just to mention a few. There have been several actions by agencies of the government that for years has threatened the security and development of the citizens, and the country in a broader sense. This paper analyses the activities of SARS (Special Anti-Robbery Squad) as a government agency with a mandate to tackling the high rate of crime in the country but instead have been marred with allegations of violence, killings, extortion, harsh treatment, and terror of the Nigerian citizenry, predominantly the youths. This paper establishes the effect of these actions of the agency on human development in Nigeria, hindering the capacity of the Nigerian youths to earn a decent living due to constant terrorism, extortion, and extrajudicial activities, which in numerous cases resulted in maiming and death, thus instigating fear in the vast majority. This research further analyses the executive order by the then Acting President of Nigeria (Vice-President) that overhauled the agency following many years of continuous public outcry, complaint, grievance, and protest. This work establishes that this order carried out in the absence of the President was to a large extent enough to stop these violations, thereby resulting in little or no recorded complaint or grievance by the public, as many of the officials involved in the gruesome activities were said to have been put away. This would pave way and give freedom to the youths to realize their potentials free from intimidation, violence, and fear from the agencies created to protect them, and on the other hand refocus the new agency FSARS (Federal Special Anti-Robbery Squad) on its real mandate in collaboration with independent organizations acting as a check to its actions. This work thus depicts how direct executive orders on policies pertaining to individual insecurities, on youths in this case, in a country can be a potential drive to increased human development.

Keywords: special anti-robbery squad, Nigerian youths, overhaul, insecurities, human development

Procedia PDF Downloads 170
1772 Robotic Solution for Nuclear Facility Safety and Monitoring System

Authors: Altab Hossain, Shakerul Islam, Golamur R. Khan, Abu Zafar M. Salahuddin

Abstract:

An effective identification of breakdowns is of premier importance for the safe and reliable operation of Nuclear Power Plants (NPP) and its associated facilities. A great number of monitoring and diagnosis methodologies are applied and used worldwide in areas such as industry, automobiles, hospitals, and power plant to detect and reduce human disasters. The potential consequences of several hazardous activities may harm the society using nuclear and its associated facilities. Hence, one of the most popular and effective methods to ensure safety and monitor the entire nuclear facility and imply risk-free operation without human interference during the hazardous situation is using a robot. Therefore, in this study, an advanced autonomous robot has been designed and developed that can monitor several parameters in the NPP to ensure the safety and do some risky job in case of nuclear disaster. The robot consisted of autonomous track following unit, data processing and transmitting unit can follow a straight line and take turn as the bank greater than 90 degrees. The developed robot can analyze various parameters such as temperature, altitude, radiation, obstacle, humidity, detecting fire, measuring distance, ultrasonic scan and taking the heat of any particular object. It has an ability to broadcast live stream and can record the document to its own server memory. There is a separate control unit constructed with a baseboard which processes the recorded data and a transmitter which transmits the processed data. To make the robot user-friendly, the code is developed such a way that a user can control any of robotic arm as per types of work. To control at any place and without the track, there is an advanced code has been developed to take manual overwrite. Through this process, administrator who has logged in permission to Dynamic Host Client Protocol (DHCP) can make the handover of the control of the robot. In this process, this robot is provided maximum nuclear security from being hacked. Not only NPP, this robot can be used to maximize the real-time monitoring system of any nuclear facility as well as nuclear material transportation and decomposition system.

Keywords: nuclear power plant, radiation, dynamic host client protocol, nuclear security

Procedia PDF Downloads 209
1771 Managing of Work Risk in Small and Medium-Size Companies

Authors: Janusz K. Grabara, Bartłomiej Okwiet, Sebastian Kot

Abstract:

The purpose of the article is presentation and analysis of the aspect of job security in small and medium-size enterprises in Poland with reference to other EU countries. We show the theoretical aspects of the risk with reference to managing small and medium enterprises, next risk management in small and medium enterprises in Poland, which were subjected to a detailed analysis. We show in detail the risk associated with the operation of the mentioned above companies, as well as analyses its levels on various stages and for different kinds of conducted activity.

Keywords: job safety, SME, work risk, risk management

Procedia PDF Downloads 496
1770 Inter-Communication-Management in Cases with Disabled Children (ICDC)

Authors: Dena A. Hussain

Abstract:

The objective of this project is to design an Information and Communication Technologies (ICT) tool based on a standardized platform to assist the work-integrated learning process of caretakers of disabled children. The tool should assist the intercommunication between caretakers and improve the learning process through knowledge bridging between all involved caretakers. Some children are born with disabilities while others have special needs after an illness or accident. Special needs children often need help in their learning process and require tools and services in a different way. In some cases the child has multiple disabilities that affect several capabilities in different ways. These needs are to be transformed into different learning techniques that the staff or personal (called caretakers in this project) caring for the child needs to learn and adapt. The caretakers involved are also required to learn new learning or training techniques and utilities specialized for the child’s needs. In many cases the number of people caring for the child’s development is rather large; the parents, specialist pedagogues, teachers, therapists, psychologists, personal assistants, etc. Each group of specialists has different objectives and in some cases the merge between theses specifications is very unique. This makes the synchronization between different caretakers difficult, resulting often in low level cooperation. By better intercommunication between professions both the child’s development could be improved but also the caretakers’ methods and knowledge of each other’s work processes and their own profession. This introduces a unique work integrated learning environment for all personnel involve, merging learning and knowledge in the work environment and at the same time assist the children’s development process. Creating an iterative process generates a unique learning experience for all involved. Using a work integrated platform will help encourage and support the process of all the teams involved in the process.We believe that working with children who have special needs is a continues learning/working process that is always integrated to achieve one main goal, which is to make a better future for all children.

Keywords: information and communication technologies (ICT), work integrated learning (WIL), sustainable learning, special needs children

Procedia PDF Downloads 294
1769 Children’s Experience of the Built Environment in the Initial Stages of a Settlement Formation: Case Study of Shahid-Keshvari New Settlement, Isfahan, Iran

Authors: Hassan Sheikh, Mehdi Nilipour, Amiraslan Fila

Abstract:

Many conventional town planning processes do little to give children and young people a voice on what is important about the urban environment. As a result of paying little attention to the children, their physical, social and mental needs are hardly met in urban environments. Therefore, urban spaces are impotent to attract children, while their recreational space has been confined to home or virtual spaces. Since children are just taking the first steps to learn the world beyond house borders, their living environment will profoundly influence almost all aspects of their lives. This puts a great deal of responsibility on the shoulders of planners, who need to balance a number of different issues in urban design to make places more child-friendly. The main purpose of present research is to analyze and plan a child-friendly environment in an on-going urban settlement development for the benefit of all residents. Assessing children’s needs and regard them in development strategies and policies will help to “plan for children”. Following this purpose, based on child-friendly environment studies, indicators of child-friendly environments were collected. Then three distinct characteristics of case study, which are being under-construction, lack of social ties between dwellers and high-rise building, determined seven indicators included basic services, Urban and environmental qualities, Family, kin, peers and community, Sense of belonging and continuity, participation, Safety, security and freedom of movement and human scale. With the survey, Informal observation and participation in small communities, essential data has been collected and analyzed by SPSS software. The field study is Shahid-Keshvari town in Isfahan, Iran. Eighty-six middle childhood, children (ages 8-13) participated. The results show Children's satisfaction is correlated with basic services and the quality of the environment, social environment and the safety and security. The considerable number of children and youth (55%) like to live somewhere other than the town. Satisfaction and sense of belonging and continuity have a strong inverse correlation with age. In other words, as age increases, satisfaction and consequently a sense of belonging will be reduced; thus children and youth consider their future somewhere out of the town. The main reason for dissatisfaction was the basic services and social environment. More than half of children (55%) expressed their wish to develop basic services in terms of availability, hierarchy, and quality. Among all recreational places, children showed more interest to the parks. About three-quarters (76%) considered building a park as a crucial item for residents. The significant number of children (54%) want to have a relationship with more friends. This could be due to the serious shortage of the leisure spaces such as parks or playgrounds. Also, the space around the house or space between the apartments has not been designed for play or children’s activities. Moreover, the presence of strangers and construction workers have a negative impact on children's sense of peace and security; 60% of children are afraid of theft and 36% of children found strangers as a menace. The analysis of children’s issues and suggestions provides an insight to plan and design of child-friendly environment in new towns.

Keywords: child-friendly city (CFC), child-friendly environment, child participation, under-construction environment, Isfahan Shahid-Keshvari Town

Procedia PDF Downloads 376
1768 Advanced Nuclear Measurements and Systems for Facilitating the Implementation of Safeguards and Safeguards-By-Design in SMR, AMR and Microreactor

Authors: Massimo Morichi

Abstract:

Over the last five years, starting in 2019, several nuclear measurement systems have been conceived and realized for specific nuclear safeguards applications, as well as for nuclear security, implementing some innovative technologies and methods for attended and unattended nuclear measurements. Some of those technologies imply the integration of combined gamma and neutron detection systems both for counting and spectroscopic applications that allow the SNM (Special Nuclear Material) verification and quantification through specific simultaneous measurements (gamma and neutron) from standard to high count rate due to high flux irradiation. IAEA has implemented some of these technologies in key international safeguards inspections worldwide, like a Fast Neutron Collar Monitor for fresh fuel verification of U235 mass (used during inspections for material declaration verification) or for unattended measuring systems with a distinct shift register installed in an anti-tampering sealed housing in unattended mode (remote inspection and continuous monitoring) together with an Unattended Multichannel Analyzer for spectroscopy analysis of SNM like canisters. Such developments, realized with integrated mid-resolution scintillators (FWHM: <3,5%) together with organic scintillators such as Stilbene detectors or Liquid sealed scintillators like EJ-309 with great pulse shape discrimination managed by a fast DAQ and with a high level of system integration, are offering in the near term the possibility to enhance further their implementation, reducing the form factor in order to facilitate their implementation in many critical parts of the Nuclear Fuel Operations as well as of the Next generation of Nuclear Reactors. This will facilitate embedding these advanced technical solutions in the next generation of nuclear installations, assuring the implementation of the Safeguards by Design requested by IAEA for all future/novel nuclear installations. This work presents the most recent designs/systems and provides some clear examples of ongoing applications on the Fuel Cycle-Fuel Fabrication as well as for the SMR/AMR and microreactors. Detailed technology testing and validation in different configuration if provided together with some case-studies and operational implications.

Keywords: nuclear safeguard, gamma and neutron detection systems, spectroscopy analysis, nuclear fuel cycle, nuclear power reactors, decommissioning dismantling, nuclear security

Procedia PDF Downloads 4
1767 Life Cycle Assessment of an Onshore Wind Turbine in Kuwait

Authors: Badriya Almutairi, Ashraf El-Hamalawi

Abstract:

Wind energy technologies are considered to be among the most promising types of renewable energy sources due to the growing concerns over climate change and energy security. Kuwait is amongst the countries that began realising the consequences of climate change and the long-term economic and energy security situation, considering options when oil runs out. Added to this are the fluctuating oil prices, rapid increase in population, high electricity consumption and protection of the environment It began to make efforts in the direction of greener solutions for energy needs by looking for alternative forms of energy and assessing potential renewable energy resources, including wind and solar. The aim of this paper is to examine wind energy as an alternative renewable energy source in Kuwait, due to its availability and low cost, reducing the dependency on fossil fuels compared to other forms of renewable energy. This paper will present a life cycle assessment of onshore wind turbine systems in Kuwait, comprising 4 stages; goal and scope of the analysis, inventory analysis, impact assessment and interpretation of the results. It will also provide an assessment of potential renewable energy resources and technologies applied for power generation and the environmental benefits for Kuwait. An optimum location for a site (Shagaya) will be recommended for reasons such as high wind speeds, land availability and distance to the next grid connection, and be the focus of this study. The potential environmental impacts and resources used throughout the wind turbine system’s life-cycle are then analysed using a Life Cycle Assessment (LCA). The results show the total carbon dioxide (CO₂) emission for a turbine with steel pile foundations is greater than emissions from a turbine with concrete foundations by 18 %. The analysis also shows the average CO₂ emissions from electricity generated using crude oil is 645gCO₂/kWh and the carbon footprint per functional unit for a wind turbine ranges between 6.6 g/kWh to 10 g/kWh, an increase of 98%, thus providing cost and environmental benefits by creating a wind farm in Kuwait. Using a cost-benefit analysis, it was also found that the electricity produced from wind energy in Kuwait would cost 17.6fils/kWh (0.05834 $/kWh), which is less than the cost of electricity currently being produced using conventional methods at 22 fils/kW (0.07$/kWh), i.e., a reduction of 20%.

Keywords: CO₂ emissions, Kuwait, life cycle assessment, renewable energy, wind energy

Procedia PDF Downloads 305
1766 Enhancing Strategic Counter-Terrorism: Understanding How Familial Leadership Influences the Resilience of Terrorist and Insurgent Organizations in Asia

Authors: Andrew D. Henshaw

Abstract:

The research examines the influence of familial and kinship based leadership on the resilience of politically violent organizations. Organizations of this type frequently fight in the same conflicts though are called 'terrorist' or 'insurgent' depending on political foci of the time, and thus different approaches are used to combat them. The research considers them correlated phenomena with significant overlap and identifies strengths and vulnerabilities in resilience processes. The research employs paired case studies to examine resilience in organizations under significant external pressure, and achieves this by measuring three variables. 1: Organizational robustness in terms of leadership and governance. 2. Bounce-back response efficiency to external pressures and adaptation to endogenous and exogenous shock. 3. Perpetuity of operational and attack capability, and political legitimacy. The research makes three hypotheses. First, familial/kinship leadership groups have a significant effect on organizational resilience in terms of informal operations. Second, non-familial/kinship organizations suffer in terms of heightened security transaction costs and social economics surrounding recruitment, retention, and replacement. Third, resilience in non-familial organizations likely stems from critical external supports like state sponsorship or powerful patrons, rather than organic resilience dynamics. The case studies pair familial organizations with non-familial organizations. Set 1: The Haqqani Network (HQN) - Pair: Lashkar-e-Toiba (LeT). Set 2: Jemaah Islamiyah (JI) - Pair: The Abu Sayyaf Group (ASG). Case studies were selected based on three requirements, being: contrasting governance types, exposure to significant external pressures and, geographical similarity. The case study sets were examined over 24 months following periods of significantly heightened operational activities. This enabled empirical measurement of the variables as substantial external pressures came into force. The rationale for the research is obvious. Nearly all organizations have some nexus of familial interconnectedness. Examining familial leadership networks does not provide further understanding of how terrorism and insurgency originate, however, the central focus of the research does address how they persist. The sparse attention to this in existing literature presents an unexplored yet important area of security studies. Furthermore, social capital in familial systems is largely automatic and organic, given at birth or through kinship. It reduces security vetting cost for recruits, fighters and supporters which lowers liabilities and entry costs, while raising organizational efficiency and exit costs. Better understanding of these process is needed to exploit strengths into weaknesses. Outcomes and implications of the research have critical relevance to future operational policy development. Increased clarity of internal trust dynamics, social capital and power flows are essential to fracturing and manipulating kinship nexus. This is highly valuable to external pressure mechanisms such as counter-terrorism, counterinsurgency, and strategic intelligence methods to penetrate, manipulate, degrade or destroy the resilience of politically violent organizations.

Keywords: Counterinsurgency (COIN), counter-terrorism, familial influence, insurgency, intelligence, kinship, resilience, terrorism

Procedia PDF Downloads 313
1765 Development and Validation of Work Movement Task Analysis: Part 1

Authors: Mohd Zubairy Bin Shamsudin

Abstract:

Work-related Musculoskeletal Disorder (WMSDs) is one of the occupational health problems encountered by workers over the world. In Malaysia, there is increasing in trend over the years, particularly in the manufacturing sectors. Current method to observe workplace WMSDs is self-report questionnaire, observation and direct measurement. Observational method is most frequently used by the researcher and practitioner because of the simplified, quick and versatile when it applies to the worksite. However, there are some limitations identified e.g. some approach does not cover a wide spectrum of biomechanics activity and not sufficiently sensitive to assess the actual risks. This paper elucidates the development of Work Movement Task Analysis (WMTA), which is an observational tool for industrial practitioners’ especially untrained personnel to assess WMSDs risk factors and provide a basis for suitable intervention. First stage of the development protocol involved literature reviews, practitioner survey, tool validation and reliability. A total of six themes/comments were received in face validity stage. New revision of WMTA consisted of four sections of postural (neck, back, shoulder, arms, and legs) and associated risk factors; movement, load, coupling and basic environmental factors (lighting, noise, odorless, heat and slippery floor). For inter-rater reliability study shows substantial agreement among rater with K = 0.70. Meanwhile, WMTA validation shows significant association between WMTA score and self-reported pain or discomfort for the back, shoulder&arms and knee&legs with p<0.05. This tool is expected to provide new workplace ergonomic observational tool to assess WMSDs for the next stage of the case study.

Keywords: assessment, biomechanics, musculoskeletal disorders, observational tools

Procedia PDF Downloads 469
1764 Nano-Enhanced In-Situ and Field Up-Gradation of Heavy Oil

Authors: Devesh Motwani, Ranjana S. Baruah

Abstract:

The prime incentive behind up gradation of heavy oil is to increase its API gravity for ease of transportation to refineries, thus expanding the market access of bitumen-based crude to the refineries. There has always been a demand for an integrated approach that aims at simplifying the upgrading scheme, making it adaptable to the production site in terms of economics, environment, and personnel safety. Recent advances in nanotechnology have facilitated the development of two lines of heavy oil upgrading processes that make use of nano-catalysts for producing upgraded oil: In Situ Upgrading and Field Upgrading. The In-Situ upgrading scheme makes use of Hot Fluid Injection (HFI) technique where heavy fractions separated from produced oil are injected into the formations to reintroduce heat into the reservoir along with suspended nano-catalysts and hydrogen. In the presence of hydrogen, catalytic exothermic hydro-processing reactions occur that produce light gases and volatile hydrocarbons which contribute to increased oil detachment from the rock resulting in enhanced recovery. In this way the process is a combination of enhanced heavy oil recovery along with up gradation that effectively handles the heat load within the reservoirs, reduces hydrocarbon waste generation and minimizes the need for diluents. By eliminating most of the residual oil, the Synthetic Crude Oil (SCO) is much easier to transport and more amenable for processing in refineries. For heavy oil reservoirs seriously impacted by the presence of aquifers, the nano-catalytic technology can still be implemented on field though with some additional investments and reduced synergies; however still significantly serving the purpose of production of transportable oil with substantial benefits with respect to both large scale upgrading, and known commercial field upgrading technologies currently on the market. The paper aims to delve deeper into the technology discussed, and the future compatibility.

Keywords: upgrading, synthetic crude oil, nano-catalytic technology, compatibility

Procedia PDF Downloads 408
1763 Renovation of Dilapidated Areas and Sustainable Reconstruction of Various Parts of Tehran, Iran

Authors: Alireza Rahpeyma

Abstract:

One of the most significant challenges faced by cities is inefficient and deteriorated urban fabric. Deteriorated areas bring about numerous issues, including economic, social, physical, and infrastructural problems, sewage management, environmental concerns, and security issues. One of the crucial necessities of modern urban life is the revitalization and renovation of these urban fabrics. Another important aspect is preserving a cohesive cultural and social identity during the urban renewal process. Urban renovation and upgrading are not a one-time occurrence but rather an ongoing process that ultimately needs to become ingrained in the system. This process is not swift; it involves sensitive and intricate stages that require well-designed plans within short, medium, and long-term timeframes. To revitalize dilapidated areas, a comprehensive understanding of the urban region's sustainability is essential. The goal of this study is to provide a suitable model for the upgrading and renewal of areas 2, 4, 5, 7, 8, and 10 in Tehran, preserving the heritage within these urban fabrics (urban assets), including the valuable morphologies of these areas, to prevent financial wastage. This study was conducted descriptively and analytically using the SWOT technique and GIS software. The research results regarding urban upgrading and renewal bring about the following points: 1) Urban upgrading and renewal ensure satisfactory efficiency, justice, environmental quality, safety and security, hygiene, sewage management, and the comfort and aesthetics of urban spaces. 2) Employing the above processes in old city centers re-establishes the historical and cultural connection between people and their past, a past that is evolving and improving and will not repeat itself. 3) Despite the expansion and growth of Iranian cities, cultural and national identity can be preserved by adhering to healthy urban revitalization principles. 4) Proper urban upgrading and renewal prevent social fragmentation, deviant behavioral patterns, psychological and occupational disorders, and financial losses. In general, preserving the identity and urban life in renovation and upgrading must be comprehensive, encompassing various dimensions, including physical, social, economic, political, and administrative aspects.

Keywords: dilapidated areas, renovation, sustainable reconstruction, Tehran-Iran

Procedia PDF Downloads 55
1762 Violence Against Nurses – Healthcare Workers with Great Sacrifice - During The COVID-19 Pandemic: A Discussion Article

Authors: Sarieh Poortaghi, Zakiyeh Jafaryparvar, Marzieh Hasanpour, Reza Negarandeh

Abstract:

Aim: This article aims to discuss how violence against health care workers especially nurses affects health care systems and the quality of care of the patients. In this paper causes of violence and strategies to reduce it have been discussed. Methods: Discourse of the literature considering the violence against nurses during the COVID-19 pandemic and its reasons and outcomes. Results: The COVID-19 pandemic has led to a significant increase in violence against healthcare providers. The attacker against nurses may be among patients, companions, visitors, colleagues such as doctors and other nurses, supervisors, and managers. Many individuals who experience violence in healthcare environments refrain from reporting it. The causes of violence against nurses include spending long periods with patients, perceiving nursing as a low-status profession, gender of nurses, direct and frequent contact with patients and their companions, inadequate facilities and high workload, weak healthcare delivery systems in public hospitals and inequality in health, nature of the department and shift type of personnel, work shifts and staff shortages, forcing nurses to work in non-standard conditions during the COVID-19 pandemic, prohibition of patient visits during the pandemic, patient death and nurses' sense of incompetence, and expressing stress through aggression. Workplace violence leads to a decrease in job satisfaction and an increase in continuous psychological stress, which has a negative impact on the personal and professional lives of nurses. Potential strategies for reducing workplace violence include protecting healthcare workers through laws, improving communication with patients and their families, critically analyzing information in social media, facilitating patient access through remote medical strategies, and improving access to primary healthcare services.

Keywords: nurses, health care workers, Covid-19, nursing

Procedia PDF Downloads 9
1761 Repository Blockchain for Collaborative Blockchain Ecosystem

Authors: Razwan Ahmed Tanvir, Greg Speegle

Abstract:

Collaborative blockchain ecosystems allow diverse groups to cooperate on tasks while providing properties such as decentralization and transaction security. We provide a model that uses a repository blockchain to manage hard forks within a collaborative system such that a single process (assuming that it has knowledge of the requirements of each fork) can access all of the blocks within the system. The repository blockchain replaces the need for Inter Blockchain Communication (IBC) within the ecosystem by navigating the networks. The resulting construction resembles a tree instead of a chain. A proof-of-concept implementation performs a depth-first search on the new structure.

Keywords: hard fork, shared governance, inter blockchain communication, blockchain ecosystem, regular research paper

Procedia PDF Downloads 17
1760 FPGA Implementation of the BB84 Protocol

Authors: Jaouadi Ikram, Machhout Mohsen

Abstract:

The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.

Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication

Procedia PDF Downloads 183
1759 Sudanese Dietitian’s Role in the Provision of Parenteral Nutrition: The Past, Present, and Future

Authors: Reem Osama Yousif Ali, Osama Yousif Ali Al Gibali

Abstract:

Introduction: Balanced nutrition is undeniably essential for maintaining health, body functions, and integrity of cell metabolism; however, some sick patients cannot tolerate oral or enteral feeding to meet their nutritional needs, so partial or total parenteral nutrition (PN) may be the most suitable alternative route in such situations. Dietitians are fundamental personnel among the medical team to ensure the proper provision of PN service, which was introduced in Sudan in the 1980s. Objective: The study aimed to recognize the dietitians' awareness of parenteral nutrition and their role in providing this service in Sudan – Khartoum State. Methodology: Formulated questionnaire forms composed of twelve questions were distributed to the dietitians working in four tertiary level hospitals. Results: The majority (75%) of the responded dietitians had reasonable knowledge about the importance of PN, its advantages, and its indications. Sixty percent of them were mindful of the PN side effects. Most of the dietitians were aware of the different assessment measurements and PN calculations and were exposed in their clinical practice to patients who were in need of PN, but only a few of them (about 30%) had the actual chance to participate in the formulation and application of PN therapy. The unavailability of the multidisciplinary team, lack of the required equipment and financial support, and associated complications were basic obstacles to the provision of long-term PN service in Khartoum state hospitals. Conclusion: Although dietitians in Khartoum state hospitals have good information about PN definition, indications, accesses, and assessment measures, they do not have enough knowledge and clinical exposure that make them confident to provide the PN service. Establishing a few models of parenteral nutrition units in tertiary hospitals will be of great help, as well as providing the dietitian's training in the area of parenteral nutrition. Further study can explore more requirements to run this service.

Keywords: nutrition support, dietitian, Sudan, parenteral nutrition, nutrition support team

Procedia PDF Downloads 105
1758 A Robust Implementation of a Building Resources Access Rights Management System

Authors: Eugen Neagoe, Victor Balanica

Abstract:

A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights).

Keywords: smart building controller, software security, access rights, access authorization

Procedia PDF Downloads 440
1757 Determinant Factor of Farm Household Fruit Tree Planting: The Case of Habru Woreda, North Wollo

Authors: Getamesay Kassaye Dimru

Abstract:

The cultivation of fruit tree in degraded areas has two-fold importance. Firstly, it improves food availability and income, and secondly, it promotes the conservation of soil and water improving, in turn, the productivity of the land. The main objectives of this study are to identify the determinant of farmer's fruit trees plantation decision and to major fruit production challenges and opportunities of the study area. The analysis was made using primary data collected from 60 sample household selected randomly from the study area in 2016. The primary data was supplemented by data collected from a key informant. In addition to the descriptive statistics and statistical tests (Chi-square test and t-test), a logit model was employed to identify the determinant of fruit tree plantation decision. Drought, pest incidence, land degradation, lack of input, lack of capital and irrigation schemes maintenance, lack of misuse of irrigation water and limited agricultural personnel are the major production constraints identified. The opportunities that need to further exploited are better access to irrigation, main road access, endowment of preferred guava variety, experience of farmers, and proximity of the study area to research center. The result of logit model shows that from different factors hypothesized to determine fruit tree plantation decision, age of the household head accesses to market and perception of farmers about fruits' disease and pest resistance are found to be significant. The result has revealed important implications for the promotion of fruit production for both land degradation control and rehabilitation and increasing the livelihood of farming households.

Keywords: degradation, fruit, irrigation, pest

Procedia PDF Downloads 236
1756 Classifying Turbomachinery Blade Mode Shapes Using Artificial Neural Networks

Authors: Ismail Abubakar, Hamid Mehrabi, Reg Morton

Abstract:

Currently, extensive signal analysis is performed in order to evaluate structural health of turbomachinery blades. This approach is affected by constraints of time and the availability of qualified personnel. Thus, new approaches to blade dynamics identification that provide faster and more accurate results are sought after. Generally, modal analysis is employed in acquiring dynamic properties of a vibrating turbomachinery blade and is widely adopted in condition monitoring of blades. The analysis provides useful information on the different modes of vibration and natural frequencies by exploring different shapes that can be taken up during vibration since all mode shapes have their corresponding natural frequencies. Experimental modal testing and finite element analysis are the traditional methods used to evaluate mode shapes with limited application to real live scenario to facilitate a robust condition monitoring scheme. For a real time mode shape evaluation, rapid evaluation and low computational cost is required and traditional techniques are unsuitable. In this study, artificial neural network is developed to evaluate the mode shape of a lab scale rotating blade assembly by using result from finite element modal analysis as training data. The network performance evaluation shows that artificial neural network (ANN) is capable of mapping the correlation between natural frequencies and mode shapes. This is achieved without the need of extensive signal analysis. The approach offers advantage from the perspective that the network is able to classify mode shapes and can be employed in real time including simplicity in implementation and accuracy of the prediction. The work paves the way for further development of robust condition monitoring system that incorporates real time mode shape evaluation.

Keywords: modal analysis, artificial neural network, mode shape, natural frequencies, pattern recognition

Procedia PDF Downloads 157
1755 Using the Weakest Precondition to Achieve Self-Stabilization in Critical Networks

Authors: Antonio Pizzarello, Oris Friesen

Abstract:

Networks, such as the electric power grid, must demonstrate exemplary performance and integrity. Integrity depends on the quality of both the system design model and the deployed software. Integrity of the deployed software is key, for both the original versions and the many that occur throughout numerous maintenance activity. Current software engineering technology and practice do not produce adequate integrity. Distributed systems utilize networks where each node is an independent computer system. The connections between them is realized via a network that is normally redundantly connected to guarantee the presence of a path between two nodes in the case of failure of some branch. Furthermore, at each node, there is software which may fail. Self-stabilizing protocols are usually present that recognize failure in the network and perform a repair action that will bring the node back to a correct state. These protocols first introduced by E. W. Dijkstra are currently present in almost all Ethernets. Super stabilization protocols capable of reacting to a change in the network topology due to the removal or addition of a branch in the network are less common but are theoretically defined and available. This paper describes how to use the Software Integrity Assessment (SIA) methodology to analyze self-stabilizing software. SIA is based on the UNITY formalism for parallel and distributed programming, which allows the analysis of code for verifying the progress property p leads-to q that describes the progress of all computations starting in a state satisfying p to a state satisfying q via the execution of one or more system modules. As opposed to demonstrably inadequate test and evaluation methods SIA allows the analysis and verification of any network self-stabilizing software as well as any other software that is designed to recover from failure without external intervention of maintenance personnel. The model to be analyzed is obtained by automatic translation of the system code to a transition system that is based on the use of the weakest precondition.

Keywords: network, power grid, self-stabilization, software integrity assessment, UNITY, weakest precondition

Procedia PDF Downloads 223
1754 Advancements in Smart Home Systems: A Comprehensive Exploration in Electronic Engineering

Authors: Chukwuka E. V., Rowling J. K., Rushdie Salman

Abstract:

The field of electronic engineering encompasses the study and application of electrical systems, circuits, and devices. Engineers in this discipline design, analyze and optimize electronic components to develop innovative solutions for various industries. This abstract provides a brief overview of the diverse areas within electronic engineering, including analog and digital electronics, signal processing, communication systems, and embedded systems. It highlights the importance of staying abreast of advancements in technology and fostering interdisciplinary collaboration to address contemporary challenges in this rapidly evolving field.

Keywords: smart home engineering, energy efficiency, user-centric design, security frameworks

Procedia PDF Downloads 87
1753 Three-Dimensional Computer Graphical Demonstration of Calcified Tissue and Its Clinical Significance

Authors: Itsuo Yokoyama, Rikako Kikuti, Miti Sekikawa, Tosinori Asai, Sarai Tsuyoshi

Abstract:

Introduction: Vascular access for hemodialysis therapy is often difficult, even for experienced medical personnel. Ultrasound guided needle placement have been performed occasionally but is not always helpful in certain cases with complicated vascular anatomy. Obtaining precise anatomical knowledge of the vascular structure is important to prevent access-related complications. With augmented reality (AR) device such as AR glasses, the virtual vascular structure is shown superimposed on the actual patient vessels, thus enabling the operator to maneuver catheter placement easily with free both hands. We herein report our method of AR guided vascular access method in dialysis treatment Methods: Three dimensional (3D) object of the arm with arteriovenous fistula is computer graphically created with 3D software from the data obtained by computer tomography, ultrasound echogram, and image scanner. The 3D vascular object thus created is viewed on the screen of the AR digital display device (such as AR glass or iPad). The picture of the vascular anatomical structure becomes visible, which is superimposed over the real patient’s arm, thereby the needle insertion be performed under the guidance of AR visualization with ease. By this method, technical difficulty in catheter placement for dialysis can be lessened and performed safely. Considerations: Virtual reality technology has been applied in various fields and medical use is not an exception. Yet AR devices have not been widely used among medical professions. Visualization of the virtual vascular object can be achieved by creation of accurate three dimensional object with the help of computer graphical technique. Although our experience is limited, this method is applicable with relative easiness and our accumulating evidence has suggested that our method of vascular access with the use of AR can be promising.

Keywords: abdominal-aorta, calcification, extraskeletal, dialysis, computer graphics, 3DCG, CT, calcium, phosphorus

Procedia PDF Downloads 164
1752 The Reality of Food Scarcity in Madhya Pradesh: Is It a Glimpse or Not?

Authors: Kalyan Sundar Som, Ghanshyam Prasad Jhariya

Abstract:

Population growth is an important pervasive phenomenon in the world. Its survival depends upon many daily needs and food is one of them. Population factors play a decisive role in the human endeavor to attain food. Nutrition and health status compose integral part of human development and progress of a society. Therefore, the neglect any one of these components may leads to the deterioration of the quality of life. Food is also intimately related with economic growth and social progress as well as with political stability and peace. It refers to the availability of food and its access to it. It can be observed from global to local level. Food scarcity has emerged as a matter of great concern all over the world due to uncontrolled and unregulated growth of population .For this purpose this study try to find out the deficit or surplus production of food availability in terms of their total population in the study area. It also ascertains the population pressure, demand and supply of food stuff and demarcation of insecure areas.The data base of the study under discussion includes government published data regarding agriculture production, yield and cropped area in 2005-06 to 2011-12 available at commissioner land record Madhya Pradesh, Gwalior. It also includes the census of India for population data. For measuring food security or insecurity regions is based on the consumption of net food available in terms caloric value minus the consumption by the weighted total population. This approach has been adopted because the direct estimate of production and consumption is the only reliable way to ascertain food security in a unit area and to compare one area with another (Noor Mohammad, dec. 2002). The scenario in 2005-06 is 57.78 percent district has food insufficient in terms of their population. On the other hand after 5 years, there are only 22 % districts are deficit in term of food availability where Burhanpur is the most deficit (56 percent) district. While 20% district are highly surplus district in the state where Harda and Hoshangabad districts are very high surplus district (5 times and 3.95 times) in term of food availability(2011). The drastic change (agriculture transformation) is happen due government good intervention in the agricultural sector.

Keywords: agriculture transformation, caloric value method, deficit or surplus region, population pressure

Procedia PDF Downloads 439
1751 Latest Generation Conducted Electrical Weapon Dart Design: Signature Marking and Removal for the Emergency Medicine Professional

Authors: J. D. Ho, D. M. Dawes, B. Driver

Abstract:

Introduction: TASER Conducted Electrical Weapons (CEWs) are the dominant CEWs in use and have been used in modern police and military operations since the late 1990s as a form of non-lethal weaponry. The 3rd generation of CEWs has been recently introduced and is known as The TASER 7. This new CEW will be replacing current CEW technology and has a new dart design that is important for emergency medical professionals to be familiar with because it requires a different method of removal and will leave a different marking pattern in human tissue than they may have been previously familiar with. features of this new dart design include: higher velocity impact, larger impact surface area, break away dart body segment, dual back-barb retention, newly designed removal process. As the TASER 7 begins to be deployed by the police and military personnel, these new features make it imperative that emergency medical professionals become familiar with the signature markings that this new dart design will make on human tissue and how to remove them. Methods: Multiple observational studies using high speed photography were used to record impact patterns of the new dart design on fresh tissue and also the newly recommended dart removal process. Both animal and human subjects were used to test this dart design prior to production release. Results: Data presented will include dart design overview, flight pattern accuracy, impact analysis, and dart removal example. Tissue photographs will be presented to demonstrate examples of signature TASER 7 dart markings that emergency medical professionals can expect to see. Conclusion: This work will provide the reader with an understanding of this newest generation CEW dart design, its key features, its signature marking pattern that can be expected and a recommendation of how to remove it from human tissue.

Keywords: TASER 7, conducted electrical weapon, dart mark, dart removal

Procedia PDF Downloads 155
1750 All at Sea: Why OT / IT Infrastructure Is So Complex and the Challenges of Securing These on a Cruise Ship

Authors: Ken Munro

Abstract:

Cruise ships are possibly the most complex collection of systems it is possible to find in one physical, moving location. Propulsion, navigation, power generation and more, combined with a hotel, restaurant, casino, theatre etc, with safety and fire control systems to boot. That complexity creates huge challenges with keeping OT and IT systems apart. Ships engines are often remotely managed, network segregation is often defeated through troubleshooting when at sea. This session will refer to multiple entertaining and informative tales of taking control of ships, including accessing a ships Azipods via a game simulator for passengers. Fortunately, genuine attacks against vessels are very rare, but the effects and impacts to world trade are becoming increasingly obvious.

Keywords: maritime security, cybersecurity, OT, IT, networks

Procedia PDF Downloads 33
1749 SARS-CoV-2 Transmission Risk Factors among Patients from a Metropolitan Community Health Center, Puerto Rico, July 2020 to March 2022

Authors: Juan C. Reyes, Linnette Rodríguez, Héctor Villanueva, Jorge Vázquez, Ivonne Rivera

Abstract:

On July 2020, a private non-profit community health center (HealthProMed) that serves people without a medical insurance plan or with limited resources in one of the most populated areas in San Juan, Puerto Rico, implemented a COVID-19 case investigation and contact-tracing surveillance system. Nursing personnel at the health center completed a computerized case investigation form that was translated, adapted, and modified from CDC’s Patient Under Investigation (PUI) Form. Between July 13, 2020, and March 17, 2022, a total of 9,233 SARS-CoV-2 tests were conducted at the health center, 16.9% of which were classified as confirmed cases (positive molecular test) and 27.7% as probable cases (positive serologic test). Most of the confirmed cases were females (60.0%), under 20 years old (29.1%), and living in their homes (59.1%). In the 14 days before the onset of symptoms, 26.3% of confirmed cases reported going to the supermarket, 22.4% had contact with a known COVID-19 case, and 20.7% went to work. The symptoms most commonly reported were sore throat (33.4%), runny nose (33.3%), cough (24.9%), and headache (23.2%). The most common preexisting medical conditions among confirmed cases were hypertension (19.3%), chronic lung disease including asthma, emphysema, COPD (13.3%), and diabetes mellitus (12.8). Multiple logistic regression analysis revealed that patients who used alcohol frequently during the last two weeks (OR=1.43; 95%CI: 1.15-1.77), those who were in contact with a positive case (OR=1.58; 95%CI: 1.33-1.88) and those who were obese (OR=1.82; 95%CI: 1.24-2.69) were significantly more likely to be a confirmed case after controlling for sociodemographic variables. Implementing a case investigation and contact-tracing component at community health centers can be of great value in the prevention and control of COVID-19 at the community level and could be used in future outbreaks.

Keywords: community health center, Puerto Rico, risk factors, SARS-CoV-2

Procedia PDF Downloads 116
1748 Quality Tools for Shaping Quality of Learning and Teaching in Education and Training

Authors: Renga Rao Krishnamoorthy, Raihan Tahir

Abstract:

The quality of classroom learning and teaching delivery has been and will continue to be debated at various levels worldwide. The regional cooperation programme to improve the quality and labour market orientation of the Technical and Vocational Education and Training (RECOTVET), ‘Deutsche Gesellschaft für Internationale Zusammenarbeit’ (GIZ), in line with the sustainable development goals (SDG), has taken the initiative in the development of quality TVET in the ASEAN region by developing the Quality Toolbox for Better TVET Delivery (Quality Toolbox). This initiative aims to provide quick and practical materials to trainers, instructors, and personnel involved in education and training at an institute to shape the quality of classroom learning and teaching. The Quality Toolbox for Better TVET Delivery was developed in three stages: literature review and development, validation, and finalization. Thematic areas in the Quality Toolbox were derived from collective input of concerns and challenges raised from experts’ workshops through moderated sessions involving representatives of TVET institutes from 9 ASEAN Member States (AMS). The sessions were facilitated by professional moderators and international experts. TVET practitioners representing AMS further analysed and discussed the structure of the Quality Toolbox and content of thematic areas and outlined a set of specific requirements and recommendations. The application exercise of the Quality Toolbox was carried out by TVET institutes among ASM. Experience sharing sessions from participating ASEAN countries were conducted virtually. The findings revealed that TVET institutes use two types of approaches in shaping the quality of learning and teaching, which is ascribed to inductive or deductive, shaping of quality in learning and teaching is a non-linear process and finally, Q-tools can be adopted and adapted to shape the quality of learning and teaching at TVET institutes in the following: improvement of the institutional quality, improvement of teaching quality and improvement on the organisation of learning and teaching for students and trainers. The Quality Toolbox has good potential to be used at education and training institutes to shape quality in learning and teaching.

Keywords: AMS, GIZ, RECOTVET, quality tools

Procedia PDF Downloads 129
1747 When Conducting an Analysis of Workplace Incidents, It Is Imperative to Meticulously Calculate Both the Frequency and Severity of Injuries Sustain

Authors: Arash Yousefi

Abstract:

Experts suggest that relying exclusively on parameters to convey a situation or establish a condition may not be adequate. Assessing and appraising incidents in a system based on accident parameters, such as accident frequency, lost workdays, or fatalities, may not always be precise and occasionally erroneous. The frequency rate of accidents is a metric that assesses the correlation between the number of accidents causing work-time loss due to injuries and the total working hours of personnel over a year. Traditionally, this has been calculated based on one million working hours, but the American Occupational Safety and Health Organization has updated its standards. The new coefficient of 200/000 working hours is now used to compute the frequency rate of accidents. It's crucial to ensure that the total working hours of employees are equally represented when calculating individual event and incident numbers. The accident severity rate is a metric used to determine the amount of time lost or wasted during a given period, often a year, in relation to the total number of working hours. It measures the percentage of work hours lost or wasted compared to the total number of useful working hours, which provides valuable insight into the number of days lost or wasted due to work-related incidents for each working hour. Calculating the severity of an incident can be difficult if a worker suffers permanent disability or death. To determine lost days, coefficients specified in the "tables of days equivalent to OSHA or ANSI standards" for disabling injuries are used. The accident frequency coefficient denotes the rate at which accidents occur, while the accident severity coefficient specifies the extent of damage and injury caused by these accidents. These coefficients are crucial in accurately assessing the magnitude and impact of accidents.

Keywords: incidents, safety, analysis, frequency, severity, injuries, determine

Procedia PDF Downloads 91
1746 Smart Trust Management for Vehicular Networks

Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel

Abstract:

Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.

Keywords: active vehicle, cooperation, petri nets, trust management, VANET

Procedia PDF Downloads 405