Search results for: security screen
1700 Analyzing Restrictive Refugee Policies in Japan and the United Kingdom: An Examination of Fundamental Causes and Implications
Authors: Shalini Shawari Matharage
Abstract:
The worldwide refugee challenge has arisen as a critical concern, with millions of individuals fleeing their home countries owing to conflict, persecution, and human rights violations. Since the establishment of an international framework in 1951 for tackling the humanitarian needs of refugees and asylum seekers, many developed and developing countries have adopted a refugee admittance framework into their national immigration policy and steadily changed their domestic legislation to assist the resettlement of refugees. However, many developed nations have put forth strict limitations on refugee admission in the midst of the continuing refugee crisis, claiming factors including national sovereignty, security of their borders, and national economy. Two such developed nations that have been restrictive on refugees is Japan and the United Kingdom. Despite their contrasting histories, migration methods, and viewpoints on diversity in modern society, the two notably developed nations have taken similar restrictive approaches in refugee policy in the recent years. This study attempts to investigate the underlying causes that led these countries to adopt strict refugee policies and how those policies have affected their compliance with international human rights responsibilities. The study employs a head-to-head methodology to examine the structural inequities in Japan and the United Kingdom's refugee policies. Using data from the UNHCR Refugee Data Finder, official government policy proposals, statements, and academic works, the study evaluates the contemporary refugee legislations, fundamental causes, and subsequent implications. The study illustrates a combination of economic, security, and demographic issues, as well as political rigidity and negative public perceptions, as major determinants of the two countries' restrictive refugee policies. The findings shed light on the restrictive actions taken by Japan and the UK, raising concerns about potential breaches in obligations to their commitments to international law and human rights obligations. Understanding the underlying issues influencing these policies allows lawmakers and activists to establish more compassionate refugee policies that adhere to international human rights and protect vulnerable individuals fleeing persecution. Ultimately, this study aims to contribute to the development of sensible refugee policies that uphold human rights and humanitarian values.Keywords: immigration, Japan, refugee policy, united kingdom
Procedia PDF Downloads 721699 Israeli Households Caring for Children and Adults with Intellectual and Developmental Disabilities: An Explorative Study
Authors: Ayelet Gur
Abstract:
Background: In recent years we are witnessing a welcome trend in which more children/persons with disabilities are living at home with their families and within their communities. This trend is related to various policy innovations as the UN Convention on the Rights of People with Disabilities that reflect a shift from the medical-institutional model to a human rights approach. We also witness the emergence of family centered approaches that perceive the family and not just the individual with the disability as a worthy target of policy planning, implementation and evaluation efforts. The current investigation aims to explore economic, psychological and social factors among households of families of children or adults with intellectual disabilities in Israel and to present policy recommendation. Methods: A national sample of 301 households was recruited through the education and employment settings of persons with intellectual disability. The main caregiver of the person with the disability (a parent) was interviewed. Measurements included the income and expense surveys; assets and debts questionnaire; the questionnaire on resources and stress; the social involvement questionnaire and Personal Wellbeing Index. Results: Findings indicate significant gaps in financial circumstances between households of families of children with intellectual disabilities and households of the general Israeli society. Households of families of children with intellectual disabilities report lower income and higher expenditures and loans than the general society. They experience difficulties in saving and coping with unexpected expenses. Caregivers (the parents) experience high stress, low social participation, low financial support from family, friend and non-governmental organizations and decreased well-being. They are highly dependent on social security allowances which constituted 40% of the household's income. Conclusions: Households' dependency on social security allowances may seem contradictory to the encouragement of persons with intellectual disabilities to favor independent living in light of the human rights approach to disability. New policy should aim at reducing caregivers' stress and enhance their social participation and support, with special emphasis on families of lower socio-economic status. Finally, there is a need to continue monitoring the economic and psycho-social needs of households of families of children with intellectual disabilities and other developmental disabilities.Keywords: disability policy, family policy, intellectual and developmental disabilities, Israel, households study, parents of children with disabilities
Procedia PDF Downloads 1521698 Wheat Production and Market in Afghanistan
Authors: Fayiz Saifurahman, Noori Fida Mohammad
Abstract:
Afghanistan produces the highest rate of wheat, it is the first source of food, and food security in Afghanistan is dependent on the availability of wheat. Although Afghanistan is the main producer of wheat, on the other hand, Afghanistan is the largest importers of flour. The objective of this study is to assess the structure and dynamics of the wheat market in Afghanistan, can compute with foreign markets, and increase the level of production. To complete this, a broad series of secondary data was complied with, group discussions and interviews with farmers, agricultural and market experts. The research findings propose that; the government should adopt different policies to support the local market. The government should distribute the seed, support financially and technically to increase wheat production.Keywords: Afghanistan, wheat, production , import
Procedia PDF Downloads 1651697 Seroprevalence of Hepatitis B and C among Healthcare Workers in Dutse Metropolis, Jigawa State, Nigeria
Authors: N. M. Sani, I. Bitrus, A. M. Sarki, N. S. Mujahid
Abstract:
Hepatitis is one of the neglected infectious diseases in sub Saharan Africa, and most of the available data is based on blood donors. Health care workers (HCWs) often get infected as a result of their close contact with patients. A cross-sectional study was conducted to determine the prevalence of hepatitis B and C among this group of professionals with a view to improving the quality of care to their patients. Hepatitis B and C infections pose a major public health problem worldwide. While infection is highest in the developing world particularly Asia and sub-Saharan Africa, healthcare workers are at higher risk of acquiring blood-borne viral infections, particularly Hepatitis B and C which are mostly asymptomatic. This study was aimed at determining the prevalence of Hepatitis B and C infections and associated risk factors among health care workers in Dutse Metropolis, Jigawa State - Nigeria. A standard rapid immuno-chromatographic technique i.e. rapid ELISA was used to screen all sera for Hepatitis B surface antigen (HBsAg) and Hepatitis C viral antibody (HCVAb) respectively. Strips containing coated antibodies and antigens to HBV and HCV respectively were removed from the foil. Strips were labeled according to samples. Using a separate disposable pipette, 2 drops of the sample (plasma) were added into each test strip and allowed to run across the absorbent pad. Results were read after 15 minutes. The prevalence of HBV and HCV infection in 100 healthcare workers was determined by testing the plasma collected from the clients during their normal checkup using HBsAg and HCVAb test strips. Results were subjected to statistical analysis using chi-square test. The prevalence of HBV among HCWs was 19 out of 100 (19.0%) and that of HCV was 5 out of 100 (5.0%) where in both cases, higher prevalence was observed among female nurses. It was also observed that all HCV positive cases were recorded among nurses only. The study revealed that nurses are at greater risk of contracting HBV and HCV due to their frequent contact with patients. It is therefore recommended that effective vaccination and other infection control measures be encouraged among healthcare workers.Keywords: prevalence, hepatitis, viruses, healthcare workers, infection
Procedia PDF Downloads 3601696 Real-Time Detection of Space Manipulator Self-Collision
Authors: Zhang Xiaodong, Tang Zixin, Liu Xin
Abstract:
In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.Keywords: space manipulator, collision detection, self-collision, the real-time collision detection
Procedia PDF Downloads 4681695 Penguins Search Optimization Algorithm for Chaotic Synchronization System
Authors: Sofiane Bououden, Ilyes Boulkaibet
Abstract:
In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing.Keywords: meta-heuristic, PeSOA, chaotic systems, encryption, synchronization optimization
Procedia PDF Downloads 1931694 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 2661693 Antioxidant Activity and Total Phenolic Content within the Aerial Parts of Artemisia absinthium
Authors: Hallal Nouria, Kharoubi Omar
Abstract:
Wormwood (Artemisia absinthium L.) is a medicinal and aromatic bitter herb, which has been used as a medicine from ancient times. It has traditionally been used as anthelmintic, choleretic, antiseptic, balsamic, depurative, digestive, diuretic, emmenagogue and in treating leukemia and sclerosis. The species was cited to be used externally as cataplasm of crushed leaves for snake and scorpion bites or decoction for wounds and sores applied locally as antiseptic and antifungal. Wormwood extract have high contents of total phenolic compounds and total flavonoids indicating that these compounds contribute to antiradical and antioxidative activity. Most of the degenerative diseases are caused by free radicals. Antioxidants are the agents responsible for scavenging free radicals. The aim of present study was to evaluate the phytochemical and in vitro antioxidant properties of Wormwood extract. DPPH assay and reducing power assay were the method adopted to study antioxidant potentials of extracts. Standard methods were used to screen preliminary phytochemistry and quantitative analysis of tannin, phenolics and flavanoids. Aqueous and alcoholic extracts were showed good antioxidant effect with IC50 ranges from 62 μg/ml for aqueous and 116μg/ml for alcoholic extracts. Phenolic compounds, tannins and flavonoids were the major phytochemicals present in both the extracts. Percentage of inhibition increased with the increased concentration of extracts. The aqueous and alcoholic extract yielded 20, 15& 3, 59 mg/g gallic acid equivalent phenolic content 2, 78 & 1,83 mg/g quercetin equivalent flavonoid and 2, 34 & 6, 40 g tannic acid equivalent tannins respectively. The aqueous and methanol extracts of the aerial parts showed a positive correlation between the total phenolic content and the antioxidant activity measured in the plant samples. The present study provides evidence that both extracts of Artemisia absinthium is a potential source of natural antioxidant.Keywords: pharmaceutical industries, medicinal and aromatic plant, antioxidants, phenolic compounds, Artemisia absinthium
Procedia PDF Downloads 4301692 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application
Authors: Khaled Shehata, Hanady Hussien, Sara Yehia
Abstract:
Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential
Procedia PDF Downloads 3881691 Genetic Diversity Analysis of Pearl Millet (Pennisetum glaucum [L. R. Rr.]) Accessions from Northwestern Nigeria
Authors: Sa’adu Mafara Abubakar, Muhammad Nuraddeen Danjuma, Adewole Tomiwa Adetunji, Richard Mundembe, Salisu Mohammed, Francis Bayo Lewu, Joseph I. Kiok
Abstract:
Pearl millet is the most drought tolerant of all domesticated cereals, is cultivated extensively to feed millions of people who mainly live in hash agroclimatic zones. It serves as a major source of food for more than 40 million smallholder farmers living in the marginal agricultural lands of Northern Nigeria. Pearl millet grain is more nutritious than other cereals like maize, is also a principal source of energy, protein, vitamins, and minerals for millions of poorest people in the regions where it is cultivated. Pearl millet has recorded relatively little research attention compared with other crops and no sufficient work has analyzed its genetic diversity in north-western Nigeria. Therefore, this study was undertaken with the objectives to analyze the genetic diversity of pearl millet accessions using SSR marker and to analyze the extent of evolutionary relationship among pearl millet accessions at the molecular level. The result of the present study confirmed diversity among accessions of pearl millet in the study area. Simple Sequence Repeats (SSR) markers were used for genetic analysis and evolutionary relationship of the accessions of pearl millet. To analyze the level of genetic diversity, 8 polymorphic SSR markers were used to screen 69 accessions collected based on three maturity periods. SSR markers result reveal relationships among the accessions in terms of genetic similarities, evolutionary and ancestral origin, it also reveals a total of 53 alleles recorded with 8 microsatellites and an average of 6.875 per microsatellite, the range was from 3 to 9 alleles in PSMP2248 and PSMP2080 respectively. Moreover, both the factorial analysis and the dendrogram of phylogeny tree grouping patterns and cluster analysis were almost in agreement with each other that diversity is not clustering according to geographical patterns but, according to similarity, the result showed maximum similarity among clusters with few numbers of accessions. It has been recommended that other molecular markers should be tested in the same study area.Keywords: pearl millet, genetic diversity, simple sequence repeat (SSR)
Procedia PDF Downloads 2681690 Computer Self-Efficacy, Study Behaviour and Use of Electronic Information Resources in Selected Polytechnics in Ogun State, Nigeria
Authors: Fredrick Olatunji Ajegbomogun, Bello Modinat Morenikeji, Okorie Nancy Chituru
Abstract:
Electronic information resources are highly relevant to students' academic and research needs but are grossly underutilized, despite the institutional commitment to making them available. The under-utilisation of these resources could be attributed to a low level of study behaviour coupled with a low level of computer self-efficacy. This study assessed computer self-efficacy, study behaviour, and the use of electronic information resources by students in selected polytechnics in Ogun State. A simple random sampling technique using Krejcie and Morgan's (1970) Table was used to select 370 respondents for the study. A structured questionnaire was used to collect data on respondents. Data were analysed using frequency counts, percentages, mean, standard deviation, Pearson Product Moment Correlation (PPMC) and multiple regression analysis. Results reveal that the internet (= 1.94), YouTube (= 1.74), and search engines (= 1.72) were the common information resources available to the students, while the Internet (= 4.22) is the most utilized resource. Major reasons for using electronic information resources were to source materials and information (= 3.30), for research (= 3.25), and to augment class notes (= 2.90). The majority (91.0%) of the respondents have a high level of computer self-efficacy in the use of electronic information resources through selecting from screen menus (= 3.12), using data files ( = 3.10), and efficient use of computers (= 3.06). Good preparation for tests (= 3.27), examinations (= 3.26), and organization of tutorials (= 3.11) are the common study behaviours of the respondents. Overall, 93.8% have good study behaviour. Inadequate computer facilities to access information (= 3.23), and poor internet access (= 2.87) were the major challenges confronting students’ use of electronic information resources. According to the PPMC results, study behavior (r = 0.280) and computer self-efficacy (r = 0.304) have significant (p 0.05) relationships with the use of electronic information resources. Regression results reveal that self-efficacy (=0.214) and study behavior (=0.122) positively (p 0.05) influenced students' use of electronic information resources. The study concluded that students' use of electronic information resources depends on the purpose, their computer self-efficacy, and their study behaviour. Therefore, the study recommended that the management should encourage the students to improve their study habits and computer skills, as this will enhance their continuous and more effective utilization of electronic information resources.Keywords: computer self-efficacy, study behaviour, electronic information resources, polytechnics, Nigeria
Procedia PDF Downloads 1191689 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law
Authors: Barakat Adebisi Raji
Abstract:
In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah
Procedia PDF Downloads 371688 Characterization of Defense-Related Genes and Metabolite Profiling in Oil Palm Elaeis guineensis during Interaction with Ganoderma boninense
Authors: Mohammad Nazri Abdul Bahari, Nurshafika Mohd Sakeh, Siti Nor Akmar Abdullah
Abstract:
Basal stem rot (BSR) is the most devastating disease in oil palm. Among the oil palm pathogenic fungi, the most prevalent and virulent species associated with BSR is Ganoderma boninense. Early detection of G. boninense attack in oil palm wherein physical symptoms has not yet appeared can offer opportunities to prevent the spread of the necrotrophic fungus. However, poor understanding of molecular defense responses and roles of antifungal metabolites in oil palm against G. boninense has complicated the resolving measures. Hence, characterization of defense-related molecular responses and production of antifungal compounds during early interaction with G. boninense is of utmost important. Four month-old oil palm (Elaeis guineensis) seedlings were artificially infected with G. boninense-inoculated rubber wood block via sitting technique. RNA of samples were extracted from roots and leaves tissues at 0, 3, 7 and 11 days post inoculation (d.p.i) followed with sequencing using RNA-Seq method. Differentially-expressed genes (DEGs) of oil palm-G. boninense interaction were identified, while changes in metabolite profile will be scrutinized related to the DEGs. The RNA-Seq data generated a total of 113,829,376 and 313,293,229 paired-end clean reads from untreated (0 d.p.i) and treated (3, 7, 11 d.p.i) samples respectively, each with two biological replicates. The paired-end reads were mapped to Elaeis guineensis reference genome to screen out non-oil palm genes and subsequently generated 74,794 coding sequences. DEG analysis of phytohormone biosynthetic genes in oil palm roots revealed that at p-value ≤ 0.01, ethylene and jasmonic acid may act in antagonistic manner with salicylic acid to coordinate defense response at early interaction with G. boninense. Findings on metabolite profiling of G. boninense-infected oil palm roots and leaves are hoped to explain the defense-related compounds elicited by Elaeis guineensis in response to G. boninense colonization. The study aims to shed light on molecular defense response of oil palm at early interaction with G. boninense and promote prevention measures against Ganoderma infection.Keywords: Ganoderma boninense, metabolites, phytohormones, RNA-Seq
Procedia PDF Downloads 2641687 Memory Retrieval and Implicit Prosody during Reading: Anaphora Resolution by L1 and L2 Speakers of English
Authors: Duong Thuy Nguyen, Giulia Bencini
Abstract:
The present study examined structural and prosodic factors on the computation of antecedent-reflexive relationships and sentence comprehension in native English (L1) and Vietnamese-English bilinguals (L2). Participants read sentences presented on the computer screen in one of three presentation formats aimed at manipulating prosodic parsing: word-by-word (RSVP), phrase-segment (self-paced), or whole-sentence (self-paced), then completed a grammaticality rating and a comprehension task (following Pratt & Fernandez, 2016). The design crossed three factors: syntactic structure (simple; complex), grammaticality (target-match; target-mismatch) and presentation format. An example item is provided in (1): (1) The actress that (Mary/John) interviewed at the awards ceremony (about two years ago/organized outside the theater) described (herself/himself) as an extreme workaholic). Results showed that overall, both L1 and L2 speakers made use of a good-enough processing strategy at the expense of more detailed syntactic analyses. L1 and L2 speakers’ comprehension and grammaticality judgements were negatively affected by the most prosodically disrupting condition (word-by-word). However, the two groups demonstrated differences in their performance in the other two reading conditions. For L1 speakers, the whole-sentence and the phrase-segment formats were both facilitative in the grammaticality rating and comprehension tasks; for L2, compared with the whole-sentence condition, the phrase-segment paradigm did not significantly improve accuracy or comprehension. These findings are consistent with the findings of Pratt & Fernandez (2016), who found a similar pattern of results in the processing of subject-verb agreement relations using the same experimental paradigm and prosodic manipulation with English L1 and L2 English-Spanish speakers. The results provide further support for a Good-Enough cue model of sentence processing that integrates cue-based retrieval and implicit prosodic parsing (Pratt & Fernandez, 2016) and highlights similarities and differences between L1 and L2 sentence processing and comprehension.Keywords: anaphora resolution, bilingualism, implicit prosody, sentence processing
Procedia PDF Downloads 1521686 The Impact of Artificial Intelligence on Human Rights Development
Authors: Kerols Seif Said Botros
Abstract:
The relationship between development and human rights has been debated for a long time. Various principles, from the right to development to development-based human rights, are applied to understand the dynamics between these two concepts. Despite the measures calculated, the connection between enhancement and human rights remains vague. Despite, the connection between these two opinions and the need to strengthen human rights have increased in recent years. It will then be examined whether the right to sustainable development is acceptable or not. In various human rights instruments and this is a good vibe to the request cited above. The book then cites domestic and international human rights treaties, as well as jurisprudence and regulations defining human rights institutions, to support this view.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 521685 Lovely, Lyrical, Lilting: Kubrick’s Translation of Lolita’s Voice
Authors: Taylor La Carriere
Abstract:
“What I had madly possessed was not she, but my own creation, another, fanciful Lolita perhaps, more real than Lolita; overlapping, encasing he and having no will, no consciousness indeed, no life of her own,” Vladimir Nabokov writes in his seminal work, Lolita. Throughout Nabokov’s novel, the eponymous character is rendered nonexistent through unreliable narrator Humbert Humbert’s impenetrable narrative, infused with lyrical rationalization. Instead, Lolita is “safely solipsised,” as Humbert muses, solidifying the potential for the erasure of Lolita’s agency and identity. In this literary work, Lolita’s voice is reduced to a nearly invisible presence, only seen through the eyes of her captor. However, in Stanley Kubrick’s film adaptation of Lolita (1962), the “nymphet,” as Nabokov coins, reemerges with a voice of her own, fueled by a lyric impulse, that displaces Humbert’s first-person narration. The lyric, as defined by Catherine Ing, is the voice of the invisible; it is also characterized by performance, the concentrated utterance of individual emotion, and the appearance of spontaneity. The novel’s lyricism is largely in the service of Humbert’s “seductive” voice, while the film reorients it more to Lolita’s subjectivity. Through a close analysis of Kubrick’s cinematic techniques, this paper examines the emergence and translation of Lolita’s voice in contrast with Humbert’s attempts to silence her in Nabokov’s Lolita, hypothesizing that Kubrick translates Lolita’s presence into a visual and aural voice with lyrical attributes, exemplified through the establishment of an altered power dynamic, Sue Lyon’s transformative performance as the titular character, Nelson Riddle and Bob Harris’ musical score, and the omission of Humbert’s first-person point-of-view. In doing so, the film reclaims Lolita’s agency by taking instances of Lolita’s voice in the novel as depicted in the last half of the work and expanding upon them in a way only cinematic depictions could allow. The results of this study suggest that Lolita’s voice in Kubrick’s adaptation functions without disrupting the lyricism present in Nabokov’s source text, materializing through the actions, expressions, and performance of Sue Lyon in the film. This voice, fueled by a lyric impulse of its own, refutes the silence bestowed upon the titular character and enables its ultimate reclamation upon the silver screen.Keywords: cinema, adaptation, Lolita, lyric voice
Procedia PDF Downloads 1921684 Influence of Auditory Visual Information in Speech Perception in Children with Normal Hearing and Cochlear Implant
Authors: Sachin, Shantanu Arya, Gunjan Mehta, Md. Shamim Ansari
Abstract:
The cross-modal influence of visual information on speech perception can be illustrated by the McGurk effect which is an illusion of hearing of syllable /ta/ when a listener listens one syllable, e.g.: /pa/ while watching a synchronized video recording of syllable, /ka/. The McGurk effect is an excellent tool to investigate multisensory integration in speech perception in both normal hearing and hearing impaired populations. As the visual cue is unaffected by noise, individuals with hearing impairment rely more than normal listeners on the visual cues.However, when non congruent visual and auditory cues are processed together, audiovisual interaction seems to occur differently in normal and persons with hearing impairment. Therefore, this study aims to observe the audiovisual interaction in speech perception in Cochlear Implant users compares the same with normal hearing children. Auditory stimuli was routed through calibrated Clinical audiometer in sound field condition, and visual stimuli were presented on laptop screen placed at a distance of 1m at 0 degree azimuth. Out of 4 presentations, if 3 responses were a fusion, then McGurk effect was considered to be present. The congruent audiovisual stimuli /pa/ /pa/ and /ka/ /ka/ were perceived correctly as ‘‘pa’’ and ‘‘ka,’’ respectively by both the groups. For the non- congruent stimuli /da/ /pa/, 23 children out of 35 with normal hearing and 9 children out of 35 with cochlear implant had a fusion of sounds i.e. McGurk effect was present. For the non-congruent stimulus /pa/ /ka/, 25 children out of 35 with normal hearing and 8 children out of 35 with cochlear implant had fusion of sounds.The children who used cochlear implants for less than three years did not exhibit fusion of sound i.e. McGurk effect was absent in this group of children. To conclude, the results demonstrate that consistent fusion of visual with auditory information for speech perception is shaped by experience with bimodal spoken language during early life. When auditory experience with speech is mediated by cochlear implant, the likelihood of acquiring bimodal fusion is increased and it greatly depends on the age of implantation. All the above results strongly support the need for screening children for hearing capabilities and providing cochlear implants and aural rehabilitation as early as possible.Keywords: cochlear implant, congruent stimuli, mcgurk effect, non-congruent stimuli
Procedia PDF Downloads 3041683 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques
Authors: Stefan K. Behfar
Abstract:
The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing
Procedia PDF Downloads 751682 Stress among Mothers of Children with Cerebral Palsy
Authors: Priyanka Tiwari, Uma Devi Ranjit, Ritesh Thapa
Abstract:
Background and Significance: Cerebral Palsy (CP) influences not only the child's everyday functioning but also the functioning of whole family. Application of study findings can be used in clinical or community setting to screen the parents of children with cerebral palsy in order to identify the compromised domain of stress which in turn will help to improve the interaction between parent and child with disability and thus ultimately affect the progress that a child makes in his or her therapeutic or educational programs. Objective: The objective of the study was to assess the level of stress in mothers of children with CP by adopting mixed method design. Methodology: Cross-sectional descriptive design was adopted in the quantitative design where Parental Stress Scale (PSS) was utilized to collect data from a convenient sample of 40 mothers of children with CP who were under regular follow-up by home visitor of Self-help Group for Cerebral Palsy while embedded qualitative design was used to explore the stress of mothers of CP affected children. From the parent population of quantitative sample 4 mothers were chosen for in-depth exploration, regarding their stress by means of case study method. Descriptive statistics like frequency, percentage, mean, median, standard deviation, correlation and inferential statistics like Mann-Whitney U test and Kruskal-Wallis H test were used to describe and assess relationship between variables. Findings: The mean stress experienced by mothers of children with cerebral palsy was 53.62±9.53 with 15% percent of the mothers experiencing severe stress. There was significant association between age group of mother and total stress score and negative themes of stress. Similarly, signification association was found between educational status of the mother and positive themes of stress which was convergent with the qualitative finding as well, where literate mothers had more positive view of their child's disability which could be attributed to their educational level as education provides us with a broad perspective to look at a situation. Conclusions: Still one-sixth of the mothers experienced severe stress so if we want to ensure the well-being of the children affected by cerebral palsy, then parents caring for them need to be looked after as well.Keywords: stress, cerebral palsy, mothers, mixed method
Procedia PDF Downloads 2581681 Illicit Arms and the Emergence of Armed Groups in Nigeria
Authors: Halilu Babaji, Adamu Buba
Abstract:
Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.Keywords: arms, emergence, insecurity, groups
Procedia PDF Downloads 2611680 Solutions for Comfort and Safety on Vibrations Resulting from the Action of the Wind on the Building in the Form of Portico with Four Floors
Authors: G. B. M. Carvalho, V. A. C. Vale, E. T. L. Cöuras Ford
Abstract:
With the aim of increasing the levels of comfort and security structures, the study of dynamic loads on buildings has been one of the focuses in the area of control engineering, civil engineering and architecture. Thus, this work presents a study based on simulation of the dynamics of buildings in the form of portico subjected to wind action, besides presenting an action of passive control, using for this the dynamics of the structure, consequently representing a system appropriated on environmental issues. These control systems are named the dynamic vibration absorbers.Keywords: dynamic vibration absorber, structure, comfort, safety, wind behavior, structure
Procedia PDF Downloads 4051679 Exploring the Intersection Between the General Data Protection Regulation and the Artificial Intelligence Act
Authors: Maria Jędrzejczak, Patryk Pieniążek
Abstract:
The European legal reality is on the eve of significant change. In European Union law, there is talk of a “fourth industrial revolution”, which is driven by massive data resources linked to powerful algorithms and powerful computing capacity. The above is closely linked to technological developments in the area of artificial intelligence, which has prompted an analysis covering both the legal environment as well as the economic and social impact, also from an ethical perspective. The discussion on the regulation of artificial intelligence is one of the most serious yet widely held at both European Union and Member State level. The literature expects legal solutions to guarantee security for fundamental rights, including privacy, in artificial intelligence systems. There is no doubt that personal data have been increasingly processed in recent years. It would be impossible for artificial intelligence to function without processing large amounts of data (both personal and non-personal). The main driving force behind the current development of artificial intelligence is advances in computing, but also the increasing availability of data. High-quality data are crucial to the effectiveness of many artificial intelligence systems, particularly when using techniques involving model training. The use of computers and artificial intelligence technology allows for an increase in the speed and efficiency of the actions taken, but also creates security risks for the data processed of an unprecedented magnitude. The proposed regulation in the field of artificial intelligence requires analysis in terms of its impact on the regulation on personal data protection. It is necessary to determine what the mutual relationship between these regulations is and what areas are particularly important in the personal data protection regulation for processing personal data in artificial intelligence systems. The adopted axis of considerations is a preliminary assessment of two issues: 1) what principles of data protection should be applied in particular during processing personal data in artificial intelligence systems, 2) what regulation on liability for personal data breaches is in such systems. The need to change the regulations regarding the rights and obligations of data subjects and entities processing personal data cannot be excluded. It is possible that changes will be required in the provisions regarding the assignment of liability for a breach of personal data protection processed in artificial intelligence systems. The research process in this case concerns the identification of areas in the field of personal data protection that are particularly important (and may require re-regulation) due to the introduction of the proposed legal regulation regarding artificial intelligence. The main question that the authors want to answer is how the European Union regulation against data protection breaches in artificial intelligence systems is shaping up. The answer to this question will include examples to illustrate the practical implications of these legal regulations.Keywords: data protection law, personal data, AI law, personal data breach
Procedia PDF Downloads 641678 Cloud-Based Mobile-to-Mobile Computation Offloading
Authors: Ebrahim Alrashed, Yousef Rafique
Abstract:
Mobile devices have drastically changed the way we do things on the move. They are being extremely relied on to perform tasks that are analogous to desktop computer capability. There has been a rapid increase of computational power on these devices; however, battery technology is still the bottleneck of evolution. The primary modern approach day approach to tackle this issue is offloading computation to the cloud, proving to be latency expensive and requiring high network bandwidth. In this paper, we explore efforts to perform barter-based mobile-to-mobile offloading. We present define a protocol and present an architecture to facilitate the development of such a system. We further highlight the deployment and security challenges.Keywords: computational offloading, power conservation, cloud, sandboxing
Procedia PDF Downloads 3861677 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data
Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda
Abstract:
Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.Keywords: BGP, BGP hijacking, cybersecurity, detection
Procedia PDF Downloads 741676 Magnetic Bio-Nano-Fluids for Hyperthermia
Authors: Z. Kolacinski, L. Szymanski. G. Raniszewski, D. Koza, L. Pietrzak
Abstract:
Magnetic Bio-Nano-Fluid (BNF) can be composed of a buffer fluid such as plasma and magnetic nanoparticles such as iron, nickel, cobalt and their oxides. However iron is one of the best elements for magnetization by electromagnetic radiation. It can be used as a tool for medical diagnosis and treatment. Radio frequency (RF) radiation is able to heat iron nanoparticles due to magnetic hysteresis. Electromagnetic heating of iron nanoparticles and ferro-fluids BNF can be successfully used for non-invasive thermal ablation of cancer cells. Moreover iron atoms can be carried by carbon nanotubes (CNTs) if iron is used as catalyst for CNTs synthesis. Then CNTs became the iron containers and they screen the iron content against oxidation. We will present a method of CNTs addressing to the required cells. For thermal ablation of cancer cells we use radio frequencies for which the interaction with human body should be limited to minimum. Generally, the application of RF energy fields for medical treatment is justified by deep tissue penetration. The highly iron doped CNTs as the carriers creating magnetic fluid will be presented. An excessive catalyst injection method using electrical furnace and microwave plasma reactor will be presented. This way it is possible to grow the Fe filled CNTs on a moving surface in continuous synthesis process. This also allows producing uniform carpet of the Fe filled CNTs carriers. For the experimental work targeted to cell ablation we used RF generator to measure the increase in temperature for some samples like: solution of Fe2O3 in BNF which can be plasma-like buffer, solutions of pure iron of different concentrations in plasma-like buffer and in buffer used for a cell culture, solutions of carbon nanotubes (MWCNTs) of different concentrations in plasma-like buffer and in buffer used for a cell culture. Then the targeted therapies which can be effective if the carriers are able to distinguish the difference between cancerous and healthy cell’s physiology are considered. We have developed an approach based on ligand-receptor or antibody-antigen interactions for the case of colon cancer.Keywords: cancer treatment, carbon nano tubes, drag delivery, hyperthermia, iron
Procedia PDF Downloads 4111675 Central Vascular Function and Relaxibility in Beta-thalassemia Major Patients vs. Sickle Cell Anemia Patients by Abdominal Aorta and Aortic Root Speckle Tracking Echocardiography
Authors: Gehan Hussein, Hala Agha, Rasha Abdelraof, Marina George, Antoine Fakhri
Abstract:
Background: β-Thalassemia major (TM) and sickle cell disease (SCD) are inherited hemoglobin disorders resulting in chronic hemolytic anemia. Cardiovascular involvement is an important cause of morbidity and mortality in these groups of patients. The narrow border is between overt myocardial dysfunction and clinically silent left ventricular (LV) and / or right ventricular (RV) dysfunction in those patients. 3 D Speckle tracking echocardiography (3D STE) is a novel method for the detection of subclinical myocardial involvement. We aimed to study myocardial affection in SCD and TM using 3D STE, comparing it with conventional echocardiography, correlate it with serum ferritin level and lactate dehydrogenase (LDH). Methodology: Thirty SCD and thirty β TM patients, age range 4-18 years, were compared to 30 healthy age and sex matched control group. Cases were subjected to clinical examination, laboratory measurement of hemoglobin level, serum ferritin, and LDH. Transthoracic color Doppler echocardiography, 3D STE, tissue Doppler echocardiography, and aortic speckle tracking were performed. Results: significant reduction in global longitudinal strain (GLS), global circumferential strain (GCS), and global area strain (GAS) in SCD and TM than control (P value <0.001) there was significantly lower aortic speckle tracking in patients with TM and SCD than control (P value< 0.001). LDH was significantly higher in SCD than both TM and control and it correlated significantly positive mitral inflow E, (p value:0.022 and 0.072. r: 0.416 and -0.333 respectively) lateral E/E’ (p value.<0.001and 0.818. r. 0.618 and -0. 044.respectively) and septal E/E’ (p value 0.007 and 0.753& r value 0.485 and -0.060 respectively) in SCD but not TM and significant negative correlation between LDH and aortic root speckle tracking (value 0.681& r. -0.078.). The potential diagnostic accuracy of LDH in predicting vascular dysfunction as represented by aortic root GCS with a sensitivity 74% and aortic root GCS was predictive of LV dysfunction in SCD patients with sensitivity 100% Conclusion: 3D STE LV and RV systolic dysfunction in spite of their normal values by conventional echocardiography. SCD showed significantly lower right ventricular dysfunction and aortic root GCS than TM and control. LDH can be used to screen patients for cardiac dysfunction in SCD, not in TMKeywords: thalassemia major, sickle cell disease, 3d speckle tracking echocardiography, LDH
Procedia PDF Downloads 1691674 Ergonomic Adaptations in Visually Impaired Workers - A Literature Review
Authors: Kamila Troper, Pedro Mestre, Maria Lurdes Menano, Joana Mendonça, Maria João Costa, Sandra Demel
Abstract:
Introduction: Visual impairment is a problem that has an influence on hundreds of thousands of people all over the world. Although it is possible for a Visually Impaired person to do most jobs, the right training, technological assistance, and emotional support are essential. Ergonomics be able to solve many of the problems/issues with the relative ease of positioning, lighting and design of the workplace. A little forethought can make a tremendous difference to the ease with which a person with an impairment function. Objectives: Review the main ergonomic adaptation measures reported in the literature in order to promote better working conditions and safety measures for the visually impaired. Methodology: This was an exploratory-descriptive, qualitative literature systematic review study. The main databases used were: PubMed, BIREME, LILACS, with articles and studies published between 2000 and 2021. Results: Based on the principles of the theoretical references of ergonomic analysis of work, the main restructuring of the physical space of the workstations were: Accessibility facilities and assistive technologies; A screen reader that captures information from a computer and sends it in real-time to a speech synthesizer or Braille terminal; Installations of software with voice recognition, Monitors with enlarged screens; Magnification software; Adequate lighting, magnifying lenses in addition to recommendations regarding signage and clearance of the places where the visually impaired pass through. Conclusions: Employability rates for people with visual impairments(both those who are blind and those who have low vision)are low and continue to be a concern to the world and for researchers as a topic of international interest. Although numerous authors have identified barriers to employment and proposed strategies to remediate or circumvent those barriers, people with visual impairments continue to experience high rates of unemployment.Keywords: ergonomic adaptations, visual impairments, ergonomic analysis of work, systematic review
Procedia PDF Downloads 1811673 Establishing Community-Based Pro-Biodiversity Enterprise in the Philippines: A Climate Change Adaptation Strategy towards Agro-Biodiversity Conservation and Local Green Economic Development
Authors: Dina Magnaye
Abstract:
In the Philippines, the performance of the agricultural sector is gauged through crop productivity and returns from farm production rather than the biodiversity in the agricultural ecosystem. Agricultural development hinges on the overall goal of increasing productivity through intensive agriculture, monoculture system, utilization of high yielding varieties in plants, and genetic upgrading in animals. This merits an analysis of the role of agro-biodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. These enterprises conserve biodiversity while equitably sharing production income in the utilization of biological resources. The study aims to determine how community-based pro-biodiversity enterprises become instrumental in local climate change adaptation and agro-biodiversity conservation as input to local green economic development planning. It also involves an assessment of the role of agrobiodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. The perceptions of the local community members both in urban and upland rural areas on community-based pro-biodiversity enterprises were evaluated. These served as a basis in developing a planning modality that can be mainstreamed in the management of local green economic enterprises to benefit the environment, provide local income opportunities, conserve species diversity, and sustain environment-friendly farming systems and practices. The interviews conducted with organic farmer-owners, entrepreneur-organic farmers, and organic farm workers revealed that pro-biodiversity enterprise such as organic farming involved the cyclic use of natural resources within the carrying capacity of a farm; recognition of the value of tradition and culture especially in the upland rural area; enhancement of socio-economic capacity; conservation of ecosystems in harmony with nature; and climate change mitigation. The suggested planning modality for community-based pro-biodiversity enterprises for a green economy encompasses four (4) phases to include community resource or capital asset profiling; stakeholder vision development; strategy formulation for sustained enterprises; and monitoring and evaluation.Keywords: agro-biodiversity, agro-biodiversity conservation, local green economy, organic farming, pro-biodiversity enterprise
Procedia PDF Downloads 3621672 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)
Authors: Wafa' Slaibi Alsharafat
Abstract:
Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection
Procedia PDF Downloads 4721671 Microbial Resource Research Infrastructure: A Large-Scale Research Infrastructure for Microbiological Services
Authors: R. Hurtado-Ortiz, D. Clermont, M. Schüngel, C. Bizet, D. Smith, E. Stackebrandt
Abstract:
Microbiological resources and their derivatives are the essential raw material for the advancement of human health, agro-food, food security, biotechnology, research and development in all life sciences. Microbial resources, and their genetic and metabolic products, are utilised in many areas such as production of healthy and functional food, identification of new antimicrobials against emerging and resistant pathogens, fighting agricultural disease, identifying novel energy sources on the basis of microbial biomass and screening for new active molecules for the bio-industries. The complexity of public collections, distribution and use of living biological material (not only living but also DNA, services, training, consultation, etc.) and service offer, demands the coordination and sharing of policies, processes and procedures. The Microbial Resource Research Infrastructure (MIRRI) is an initiative within the European Strategy Forum Infrastructures (ESFRI), bring together 16 partners including 13 European public microbial culture collections and biological resource centres (BRCs), supported by several European and non-European associated partners. The objective of MIRRI is to support innovation in microbiology by provision of a one-stop shop for well-characterized microbial resources and high quality services on a not-for-profit basis for biotechnology in support of microbiological research. In addition, MIRRI contributes to the structuring of microbial resources capacity both at the national and European levels. This will facilitate access to microorganisms for biotechnology for the enhancement of the bio-economy in Europe. MIRRI will overcome the fragmentation of access to current resources and services, develop harmonised strategies for delivery of associated information, ensure bio-security and other regulatory conditions to bring access and promote the uptake of these resources into European research. Data mining of the landscape of current information is needed to discover potential and drive innovation, to ensure the uptake of high quality microbial resources into research. MIRRI is in its Preparatory Phase focusing on governance and structure including technical, legal governance and financial issues. MIRRI will help the Biological Resources Centres to work more closely with policy makers, stakeholders, funders and researchers, to deliver resources and services needed for innovation.Keywords: culture collections, microbiology, infrastructure, microbial resources, biotechnology
Procedia PDF Downloads 444