Search results for: security personnel
1685 Secure Image Encryption via Enhanced Fractional Order Chaotic Map
Authors: Ismail Haddad, Djamel Herbadji, Aissa Belmeguenai, Selma Boumerdassi
Abstract:
in this paper, we provide a novel approach for image encryption that employs the Fibonacci matrix and an enhanced fractional order chaotic map. The enhanced map overcomes the drawbacks of the classical map, especially the limited chaotic range and non-uniform distribution of chaotic sequences, resulting in a larger encryption key space. As a result, this strategy improves the encryption system's security. Our experimental results demonstrate that our proposed algorithm effectively encrypts grayscale images with exceptional efficiency. Furthermore, our technique is resistant to a wide range of potential attacks, including statistical and entropy attacks.Keywords: image encryption, logistic map, fibonacci matrix, grayscale images
Procedia PDF Downloads 3181684 Flexible Alternative Current Transmission System Impact on Grid Stability and Power Markets
Authors: Abdulrahman M. Alsuhaibani, Martin Maken
Abstract:
FACTS devices have great influence on the grid stability and power markets price. Recently, there is intent to integrate a large scale of renewable energy sources to the power system which in turn push the power system to operate closer to the security limits. This paper discusses the power system stability and reliability improvement that could be achieved by using FACTS. There is a comparison between FACTS devices to evaluate their performance for different functions. A case study has also been made about its effect on reducing generation cost and minimizing transmission losses which have good impact on efficient and economic operation of electricity marketsKeywords: FACTS, grid stability, spot price, OPF
Procedia PDF Downloads 1591683 Addressing Factors Associated with Vertical HIV Transmission among Pregnant Women in Rwanda
Authors: Murorunkwere Marie Claire
Abstract:
Introduction: In Sub-Saharan Africa and specifically in Rwandan rural areas, mother-to-Child human immunodeficiency virus transmission remains a big challenge. This is mainly due to lack of awareness and ignorance among pregnant rural women, leading to neglect regular taking of prophylactic antiretroviral treatment and to persistently beliefs in traditional healers and home deliveries. This paper explores the factors associated with stagnant reduction in human immunodeficiency virus vertical transmission among pregnant rural women and provides solutions to tackle it. Methodology: The first phase of this research will be a qualitative survey was conducted to assess the knowledge, attitudes and practices towards vertical human immunodeficiency virus transmission among pregnant women in one rural district in Rwanda. The data generated from phase one of this research will be used to address the main factors revealed through community mobilization and motivation on attending required antenatal consultations and hospital deliveries, proper and regular antiretroviral treatment taking, and discouraging beliefs in traditional healers and home deliveries. Refresher training seminars will also be organized for healthcare providers qualified on conducting deliveries about current measures to maximize the reduction of chances that can lead to mother -child contamination (to avoid early rupture of membranes and to prevent any source of contamination). Results: This paper is expected to contribute in a significant reduction of the vertical human immunodeficiency virus transmission burden among pregnant rural women. Conclusion: Strong campaigns on prevention of mother- to-child human immunodeficiency virus transmission and community mobilization of pregnant rural women, and house to house education and continuous reminders as well as training seminars to health care personnel on updated measures is, key in addressing vertical human immunodeficiency virus transmission.Keywords: attitudes transformation, community mobilisation, pregnant rural women, vertical HIV transmission
Procedia PDF Downloads 801682 Examining Terrorism through a Constructivist Framework: Case Study of the Islamic State
Authors: Shivani Yadav
Abstract:
The Study of terrorism lends itself to the constructivist framework as constructivism focuses on the importance of ideas and norms in shaping interests and identities. Constructivism is pertinent to understand the phenomenon of a terrorist organization like the Islamic State (IS), which opportunistically utilizes radical ideas and norms to shape its ‘politics of identity’. This ‘identity’, which is at the helm of preferences and interests of actors, in turn, shapes actions. The paper argues that an effective counter-terrorism policy must recognize the importance of ideas in order to counter the threat arising from acts of radicalism and terrorism. Traditional theories of international relations, with an emphasis on state-centric security problematic, exhibit several limitations and problems in interpreting the phenomena of terrorism. With the changing global order, these theories have failed to adapt to the changing dimensions of terrorism, especially ‘newer’ actors like the Islamic State (IS). The paper observes that IS distinguishes itself from other terrorist organizations in the way that it recruits and spreads its propaganda. Not only are its methods different, but also its tools (like social media) are new. Traditionally, too, force alone has rarely been sufficient to counter terrorism, but it seems especially impossible to completely root out an organization like IS. Time is ripe to change the discourse around terrorism and counter-terrorism strategies. The counter-terrorism measures adopted by states, which primarily focus on mitigating threats to the national security of the state, are preoccupied with statist objectives of the continuance of state institutions and maintenance of order. This limitation prevents these theories from addressing the questions of justice and the ‘human’ aspects of ideas and identity. These counter-terrorism strategies adopt a problem-solving approach that attempts to treat the symptoms without diagnosing the disease. Hence, these restrictive strategies fail to look beyond calculated retaliation against violent actions in order to address the underlying causes of discontent pertaining to ‘why’ actors turn violent in the first place. What traditional theories also overlook is that overt acts of violence may have several causal factors behind them, some of which are rooted in the structural state system. Exploring these root causes through the constructivist framework helps to decipher the process of ‘construction of terror’ and to move beyond the ‘what’ in theorization in order to describe ‘why’, ‘how’ and ‘when’ terrorism occurs. Study of terrorism would much benefit from a constructivist analysis in order to explore non-military options while countering the ideology propagated by the IS.Keywords: constructivism, counter terrorism, Islamic State, politics of identity
Procedia PDF Downloads 1891681 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map
Authors: Hongmin Deng, Qionghua Wang
Abstract:
A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID
Procedia PDF Downloads 4011680 Communicating Corporate Social Responsibility in Kuwait: Assessment of Environmental Responsibility Efforts and Targeted Stakeholders
Authors: Manaf Bashir
Abstract:
Corporate social responsibility (CSR) has become a tool for corporations to meet the expectations of different stakeholders about economic, social and environmental issues. It has become indispensable for an organization’s success, positive image and reputation. Equally important is how corporations communicate and report their CSR. Employing the stakeholder theory, the purpose of this research is to analyse CSR content of leading Kuwaiti corporations. No research analysis of CSR reporting has been conducted in Kuwait and this study is an attempt to redress in part this empirical deficit in the country and the region. It attempts to identify the issues and stakeholders of the CSR and if corporations are following CSR reporting standards. By analysing websites, annual and CSR reports of the top 100 Kuwaiti corporations, this study found low mentions of the CSR issues and even lower mentions of CSR stakeholders. Environmental issues were among the least mentioned despite an increasing global concern toward the environment. ‘Society’ was mentioned the most as a stakeholder and ‘The Environment’ was among the least mentioned. Cross-tabulations found few significant relationships between type of industry and the CSR issues and stakeholders. Independent sample t-tests found no significant difference between the issues and stakeholders that are mentioned on the websites and the reports. Only two companies from the sample followed reporting standards and both followed the Global Reporting Initiative. Successful corporations would be keen to identify the issues that meet the expectations of different stakeholders and address them through their corporate communication. Kuwaiti corporations did not show this keenness. As the stakeholder theory suggests, extending the spectrum of stakeholders beyond investors can open mutual dialogue and understanding between corporations and various stakeholders. However, Kuwaiti corporations focus on few CSR issues and even fewer CSR stakeholders. Kuwaiti corporations need to pay more attention to CSR and particularly toward environmental issues. They should adopt a strategic approach and allocate specialized personnel such as marketers and public relations practitioners to manage it. The government and non-profit organizations should encourage the private sector in Kuwait to do more CSR and meet the needs and expectations of different stakeholders and not only shareholders. This is in addition to reporting the CSR information professionally because of its benefits to corporate image, reputation, and transparency.Keywords: corporate social responsibility, environmental responsibility, Kuwait, stakeholder theory
Procedia PDF Downloads 1511679 Food Processing Role in Ensuring Food and Health Security
Authors: Muhammad Haseeb
Abstract:
It is crucial to have a balanced approach to food's energy and nutritional content in a world with limited resources. The preservation of the environment is vital, and both the agrifood-making and food service sectors will be requested to use fewer resources to produce a wider range of existing foods and develop imaginative foods that are physiologically appropriate for a better sense of good health, have long shelf lives and are conveniently transportable. Delivering healthy diets that satisfy consumer expectations from robust and sustainable agrifood systems is necessary in a world that is changing and where natural resources are running out. Across the whole food supply chain, an integrated multi-sectoral approach is needed to alleviate global food and nutrition insecurity.Keywords: health, food, nutrition, supply chain
Procedia PDF Downloads 201678 The Importance of Efficient and Sustainable Water Resources Management and the Role of Artificial Intelligence in Preventing Forced Migration
Authors: Fateme Aysin Anka, Farzad Kiani
Abstract:
Forced migration is a situation in which people are forced to leave their homes against their will due to political conflicts, wars and conflicts, natural disasters, climate change, economic crises, or other emergencies. This type of migration takes place under conditions where people cannot lead a sustainable life due to reasons such as security, shelter and meeting their basic needs. This type of migration may occur in connection with different factors that affect people's living conditions. In addition to these general and widespread reasons, water security and resources will be one that is starting now and will be encountered more and more in the future. Forced migration may occur due to insufficient or depleted water resources in the areas where people live. In this case, people's living conditions become unsustainable, and they may have to go elsewhere, as they cannot obtain their basic needs, such as drinking water, water used for agriculture and industry. To cope with these situations, it is important to minimize the causes, as international organizations and societies must provide assistance (for example, humanitarian aid, shelter, medical support and education) and protection to address (or mitigate) this problem. From the international perspective, plans such as the Green New Deal (GND) and the European Green Deal (EGD) draw attention to the need for people to live equally in a cleaner and greener world. Especially recently, with the advancement of technology, science and methods have become more efficient. In this regard, in this article, a multidisciplinary case model is presented by reinforcing the water problem with an engineering approach within the framework of the social dimension. It is worth emphasizing that this problem is largely linked to climate change and the lack of a sustainable water management perspective. As a matter of fact, the United Nations Development Agency (UNDA) draws attention to this problem in its universally accepted sustainable development goals. Therefore, an artificial intelligence-based approach has been applied to solve this problem by focusing on the water management problem. The most general but also important aspect in the management of water resources is its correct consumption. In this context, the artificial intelligence-based system undertakes tasks such as water demand forecasting and distribution management, emergency and crisis management, water pollution detection and prevention, and maintenance and repair control and forecasting.Keywords: water resource management, forced migration, multidisciplinary studies, artificial intelligence
Procedia PDF Downloads 871677 The Main Characteristics of Destructive Motivation
Authors: Elen Gasparyan, Naira Hakobyan
Abstract:
One of the leading factors determining the effectiveness of work in a modern organization is the motivation of its employees. In the scientific psychological literature, this phenomenon is understood mainly as constructive forms of motivation and the search for ways to increase it. At the same time, the motivation of employees can sometimes lead to a decrease in the productivity of the organization, i.e., destructive motivation is usually not considered from the point of view of various motivational theories. This article provides an analysis of various forms of destructive motivation of employees. These forms include formalism in labor behavior, inadequate assessment of the work done, and an imbalance of personal and organizational interests. The destructive motivation of personnel has certain negative consequences both for the employees themselves and for the entire organization - it leads to a decrease in the rate of production and the quality of products or services, increased conflict in the behavior of employees, etc. Currently, there is an increase in scientific interest in the study of destructive motivation. The subject of psychological research is not only modern socio-psychological processes but also the achievements of scientific thought in the field of theories of motivation and management. This article examines the theoretical approaches of J. S. Adams and Porter-Lawler, provides an analysis of theoretical concepts, and emphasizes the main characteristics of the destructiveness of motivation. Destructive work motivation is presented at the macro, meso, and micro levels. These levels express various directions of development of motivation stimuli, such as social, organizational, and personal ones. At the macro level, the most important characteristics of destructive motivation are the high-income gap between employers and employees, а high degree of unemployment, weak social protection of workers, non-compliance by employers with labor legislation, and emergencies. At the organizational level, the main characteristics are decreasing the diversity of work and insufficient work conditions. At the personal level, the main characteristic of destructive motivation is a discrepancy between personal and organizational interests. A comparative analysis of the theoretical and methodological foundations of the study of motivation makes it possible to identify not only the main characteristics of destructive motivation but also to determine the contours of psychological counseling to reduce destructiveness in the behavior of employees.Keywords: destructive, motivation, organization, behavior
Procedia PDF Downloads 441676 Big Data Analytics and Public Policy: A Study in Rural India
Authors: Vasantha Gouri Prathapagiri
Abstract:
Innovations in ICT sector facilitate qualitative life style for citizens across the globe. Countries that facilitate usage of new techniques in ICT, i.e., big data analytics find it easier to fulfil the needs of their citizens. Big data is characterised by its volume, variety, and speed. Analytics involves its processing in a cost effective way in order to draw conclusion for their useful application. Big data also involves into the field of machine learning, artificial intelligence all leading to accuracy in data presentation useful for public policy making. Hence using data analytics in public policy making is a proper way to march towards all round development of any country. The data driven insights can help the government to take important strategic decisions with regard to socio-economic development of her country. Developed nations like UK and USA are already far ahead on the path of digitization with the support of Big Data analytics. India is a huge country and is currently on the path of massive digitization being realised through Digital India Mission. Internet connection per household is on the rise every year. This transforms into a massive data set that has the potential to improvise the public services delivery system into an effective service mechanism for Indian citizens. In fact, when compared to developed nations, this capacity is being underutilized in India. This is particularly true for administrative system in rural areas. The present paper focuses on the need for big data analytics adaptation in Indian rural administration and its contribution towards development of the country on a faster pace. Results of the research focussed on the need for increasing awareness and serious capacity building of the government personnel working for rural development with regard to big data analytics and its utility for development of the country. Multiple public policies are framed and implemented for rural development yet the results are not as effective as they should be. Big data has a major role to play in this context as can assist in improving both policy making and implementation aiming at all round development of the country.Keywords: Digital India Mission, public service delivery system, public policy, Indian administration
Procedia PDF Downloads 1591675 The Fight against Terrorist Radicalization: A French Perspective
Authors: Julia Burchett
Abstract:
After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism
Procedia PDF Downloads 4311674 Analyzing Soviet and Post-Soviet Contemporary Russian Foreign Policy by Applying the Theory of Political Realism
Authors: Simon Tsipis
Abstract:
In this study, we propose to analyze Russian foreign policy conduct by applying the theory of Political Realism and the qualitative comparative method of analysis. We find that the paradigm of Political Realism supplies us with significant insights into the sources of contemporary Russian foreign policy conduct since the power factor was and remains an integral element in Russian foreign policies, especially when we apply comparative analysis and compare it with the behavior of its Soviet predecessor. Through the lens of the Realist theory, a handful of Russian foreign policy-making becomes clearer and much more comprehensible.Keywords: realism, Russia, cold war, Soviet Union, European security
Procedia PDF Downloads 1171673 Risk Factors Associated with Outbreak of Cerebrospinal Meningitis in Kano State- Nigeria, March-May 2017
Authors: Visa I. Tyakaray, M. Abdulaziz, O. Badmus, N. Karaye, M. Dalhat, A. Shehu, I. Bello, T. Hussaini, S. Akar, G. Effah, P. Nguku
Abstract:
Introduction: Nigeria has recorded outbreaks of meningitis in the past, being in the meningitis belt. A multi-state outbreak of Cerebrospinal Meningitis (CSM) from Neisseria meningitides occurred in 2017 involving 24 states, and Kano State reported its first two confirmed CSM cases on 22nd March, 2017. We conducted the outbreak investigation to characterize the outbreak, determine its associated risk factors and institute appropriate control measures. Method: We conducted an unmatched Case-control study with ratio 1:2. A case was defined as any person with sudden onset of fever (>38.5˚C rectal or 38.0˚C axillary) and one of the following: neck stiffness, altered consciousness or bulging fontanelle in toddlers while a control was defined as any person who resides around the case such as family members, caregivers, neighbors, and healthcare personnel. We reviewed and validated line list and conducted active case search in health facilities and neighboring communities. Descriptive, bivariate, stratified and multivariate analysis were performed. Laboratory confirmation was by Latex agglutination and/or Culture. Results: We recruited 48 cases with median age of 11 years (1 month – 65 years), attack rate was 2.4/100,000 population with case fatality rate of 8%; 34 of 44 local government areas were affected.On stratification, age was found to be a confounder. Independent factors associated with the outbreak were age (Adjusted Odds Ratio, AOR =6.58; 95% Confidence Interval (CI) =2.85-15.180, history of Vaccination (AOR=0.37; 95% CI=0.13-0.99) and history of travel (AOR=10.16; (1.99-51.85). Laboratory results showed 22 positive cases for Neisseria meningitides types C and A/Y. Conclusion: Major risk factors associated with this outbreak were age (>14years), not being vaccinated and history of travel. We sensitized communities and strengthened case management. We recommended immediate reactive vaccination and enhanced surveillance in bordering communities.Keywords: cerebrospinal, factors, Kano-Nigeria, meningitis, risk
Procedia PDF Downloads 2161672 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 1481671 Military Leadership: Emotion Culture and Emotion Coping in Morally Stressful Situations
Authors: Sofia Nilsson, Alicia Ohlsson, Linda-Marie Lundqvist, Aida Alvinius, Peder Hyllengren, Gerry Larsson
Abstract:
In irregular warfare contexts, military personnel are often presented with morally ambiguous situations where they are aware of the morally correct choice but may feel prevented to follow through with it due to organizational demands. Moral stress and/or injury can be the outcome of the individual’s experienced dissonance. These types of challenges put a large demand on the individual to manage their own emotions and the emotions of others, particularly in the case of a leader. Both the ability and inability for emotional regulation can result in different combinations of short and long term reactions after morally stressful events, which can be either positive or negative. Our study analyzed the combination of these reactions based upon the types of morally challenging events that were described by the subjects. 1)What institutionalized norms concerning emotion regulation are favorable in short-and long-term perspectives after a morally stressful event? 2)What individual emotion-focused coping strategies are favorable in short-and long-perspectives after a morally stressful? To address these questions, we conducted a quantitative study in military contexts in Sweden and Norway on upcoming or current military officers (n=331). We tested a theoretical model built upon a recently developed qualitative study. The data was analyzed using factor analysis, multiple regression analysis and subgroup analyses. The results indicated that an individual’s restriction of emotion in order to achieve an organizational goal, which results in emotional dissonance, can be an effective short term strategy for both the individual and the organization; however, it appears to be unfavorable in a long-term perspective which can result in negative reactions. Our results are intriguing because they showed an increased percentage of reported negative long term reactions (13%), which indicated PTSD-related symptoms in comparison to previous Swedish studies which indicated lower PTSD symptomology.Keywords: emotion culture, emotion coping, emotion management, military
Procedia PDF Downloads 5991670 Teacher Education in a Bilingual Perspective: Brazilian Sign Language and Portuguese
Authors: Neuma Chaveiro, Juliana Guimarães Faria
Abstract:
Introduction: The thematic that guides this study is teacher training for the teaching of sign language in a perspective of bilingual education – specifically aimed at Brazilian public schools that offer inclusive education, and that have, among its students, deaf children who use Brazilian Sign Language as a means of communication and expression. In the Teacher Training Course for Letters/Libras at the Universidade Federal de Goiás/UFG, we developed a bilingual education project for the deaf, linked to PIBID (Institutional Scholarship for Teaching Initiation Program), funded by the Brazilian Federal Government through CAPES (Coordination for the Improvement of Higher Education Personnel). Goals: to provide the education of higher education teachers to work in public schools in basic education and to insert students from the UFG’s Letters/Libras course in the school’s daily life, giving them the opportunity for the creation and participation in methodological experiences and of teaching practices in order to overcome the problems identified in the teaching-learning process of deaf students, in a bilingual perspective, associating Libras (Brazilian Sign Language) and Portuguese. Methodology: qualitative approach and research-action, prioritizing action – reflection – action of the people involved. The Letters-Libras PIBID of the College of Letters/UFG, in this qualitative context, is guided by the assumptions of investigation-action to contribute to the education of the Libras teacher. Results: production of studies and researches in the area of education, professionalization and teaching practice for the degree holder in Letters: Libras; b) studies, research and training in bilingual education; c) clarification and discussion of the myths that permeate the reality of users of sign languages; d) involving students in the development of didactic materials for bilingual education. Conclusion: the PIBID Project Letters/Libras allows, both to the basic education school and to the teachers in training for the teaching of Libras, an integrated and collective work partnership, with discussions and changes in relation to bilingual education for the deaf and the teaching of Libras.Keywords: deaf, sign language, teacher training, educacion
Procedia PDF Downloads 2971669 Multilevel Gray Scale Image Encryption through 2D Cellular Automata
Authors: Rupali Bhardwaj
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient
Procedia PDF Downloads 3781668 Assessment of Rural Youth Adoption of Cassava Production Technologies in Southwestern Nigeria
Authors: J. O. Ayinde, S. O. Olatunji
Abstract:
This study assessed rural youth adoption of cassava production technologies in Southwestern, Nigeria. Specifically, it examine the level of awareness and adoption of cassava production technologies by rural youth, determined the extent of usage of cassava production technologies available to the rural youth, examined constrains to the adoption of cassava production technologies by youth and suggested possible solutions. Multistage sampling procedure was adopted for the study. In the first stage, two states were purposively selected in southwest, Nigeria which are Osun and Oyo states due to high level of cassava production and access to cassava production technology in the areas. In the second stage, purposive sampling technique was used to select two local governments each from the states selected which are Ibarapa central (Igbo-Ora) and Ibarapa East (Eruwa) Local Government Areas (LGAs) in Oyo state; and Ife North (Ipetumodu) and Ede South (Oke Ireesi) LGAs in Osun State. In the third stage, proportionate sampling technique was used to randomly select five, four, six and four communities from the selected LGAs respectively representing 20 percent of the rural communities in them, in all 19 communities were selected. In the fourth stage, Snow ball sampling technique was used to select about 7 rural youths in each community selected to make a total of 133 respondents. Validated structured interview schedule was used to elicit information from the respondents. The data collected were analyzed using both descriptive and inferential statistics to summarize and test the hypotheses of the study. The results show that the average age of rural youths participating in cassava production in the study area is 29 ± 2.6 years and 60 percent aged between 30 and 35 years. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). The result also reveals that the average size of farm land of the respondents is 2.5 ± 0.3 hectares. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). Also, extent of usage of the technologies (r = 0.363, p ≤ 0.01) shows significant relationship with level of adoption of the technologies. Household size (b = 0.183; P ≤ 0.01) and membership of social organizations were significant at 0.01 (b = 0.331; P ≤ 0.01) while age was significant at 0.10 (b = 0.097; P ≤ 0.05). On the other hand 0.01, years of residence (b = - 0.063; P ≤ 0.01) and income (b = - 0.204; P ≤ 0.01) had negative values and implies that a unit increase in each of these variables would decrease extent of usage of the Cassava production technologies. It was concluded that the extent of usage of the technologies in the communities will affect the rate of adoption positively and this will change the negative perception of youths on cassava production thereby ensure food security in the study area.Keywords: assessment, rural youths’, Cassava production technologies, agricultural production, food security
Procedia PDF Downloads 2071667 Seismic Preparedness Challenge in Ionian Islands (Greece) through 'Telemachus' Project
Authors: A. Kourou, M. Panoutsopoulou
Abstract:
Nowadays, disaster risk reduction requires innovative ways of working collaboratively, monitoring tools, management methods, risk communication, and knowledge, as key factors for decision-making actors. Experience has shown that the assessment of seismic risk and its effective management is still an important challenge. In Greece, Ionian Islands region is characterized as the most seismic area of the country and one of the most active worldwide. It is well known that in case of a disastrous earthquake the local authorities need to assess the situation in the affected area and coordinate the disaster response. In particular, the main outcomes of 'Telemachus' project are the development of an innovative operational system that hosts the needed data of seismic risk management in the Ionian Islands and the implementation of educational actions for the involved target groups. This project is funded in the Priority Axis 'Environmental Protection and Sustainable Development' of Operational Plan 'Ionian Islands 2014-2020'. EPPO is one of the partners of the project and it is responsible, among others, for the development of proper training material. This paper presents the training material of 'Telemachus' and its usage as a helpful, managerial tool in case of earthquake emergency. This material is addressed to different target groups, such as civil protection staff, people that involved with the tourism industry, educators of disabled people, etc. Very positive aspect of the project is the involvement of end-users that should evaluate the training products; test standards; clarify the personnel’s roles and responsibilities; improve interagency coordination; identify gaps in resources; improve individual performance; and identify opportunities for improvement. It is worth mentioning that even though the abovementioned material developed is useful for the training of specific target groups on emergency management issues within Ionian Islands Region, it could be used throughout Greece and other countries too.Keywords: education of civil protection staff, Ionian Islands Region of Greece, seismic risk, training material
Procedia PDF Downloads 1231666 School Administrators’ Perspectives on Child Neglect and Abuse and Intervention Methods
Authors: Eylem G. Cengiz, Ersin Çilek, Gözde Başkaya, Havva Nur Taş
Abstract:
It is possible to define the abuse and neglect of the child as a social problem. Such adverse experiences of the child are witnessed by wider social circles as well as his or her immediate environment. The most effective institution among these social circles is the school. The awareness of teachers, administrators, and even auxiliary personnel on this issue can act as a protective and preventive buffer because teachers have the opportunity to be with children every day and constantly observe them; therefore, they can notice the physical and mental changes in students. Furthermore, school administrators have an undeniable role in recognizing and responding to the risk of neglect and abuse. This study aims to evaluate the awareness of school administrators on the risk factors, clues, and ways of intervention towards abuse and neglect through the scenarios given to them. Data were collected from 37 primary, secondary, and high school administrators working in various provinces of Turkey through descriptive and scenario-based questions to determine their general knowledge of the concepts of neglect and abuse and their general tendencies towards practice. Descriptive questions were evaluated with content analysis, and scenario-based questions were evaluated with numerical qualitative data analysis. Concepts and themes were tried to be reached by content analysis from the descriptive data collected. When the results are evaluated in general, it is striking that the concept of child abuse means only sexual abuse for some school administrators. There is an important uncertainty for school administrators in the content of the idea of neglect. When the views on the causes of neglect and abuse are examined, the family factor was seen as the primary source of both neglect and abuse. In addition, among the prevention strategies applied by school administrators, intervention for the family -interviewing and informing- was recommended by only 9 (29%) out of 31 administrators. When the responses to the physical, emotional, and sexual abuse scenarios are examined, it is revealed that the administrators generally realize the abuse but fail to develop an appropriate/whole intervention method. The research results show that school administrators' awareness should be increased. Although administrators have sensitivity towards children, they should be empowered to recognize all types of neglect and abuse and develop appropriate intervention tools.Keywords: assessment child abuse and neglect, child abuse, child neglect, school administrators
Procedia PDF Downloads 1331665 Criminal Law and Internet of Things: Challenges and Threats
Authors: Celina Nowak
Abstract:
The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.Keywords: criminal law, internet of things, privacy, security threats
Procedia PDF Downloads 1631664 Reactive Power Cost Evaluation with FACTS Devices in Restructured Power System
Authors: A. S. Walkey, N. P. Patidar
Abstract:
It is not always economical to provide reactive power using synchronous alternators. The cost of reactive power can be minimized by optimal placing of FACTS devices in power systems. In this paper a Particle Swarm Optimization- Sequential Quadratic Programming (PSO-SQP) algorithm is applied to minimize the cost of reactive power generation along with real power generation to alleviate the bus voltage violations. The effectiveness of proposed approach tested on IEEE-14 bus systems. In this paper in addition to synchronous generators, an opportunity of FACTS devices are also proposed to procure the reactive power demands in the power system.Keywords: reactive power, reactive power cost, voltage security margins, capability curve, FACTS devices
Procedia PDF Downloads 5061663 Association of Daily Physical Activity with Diabetes Control in Patients with Type II Diabetes
Authors: Chia-Hsun Chang
Abstract:
Background: Combination of drug treatment, dietary management, and regular exercise can effectively control type II diabetes mellitus (T2DM). Performing daily physical activities other than structured exercise is much easier and whether daily physical activities including work, walking, housework, gardening, leisure exercise, or transportation have a similar effect on diabetes control is not well studied.Aims and Objectives: This study aims to determine whether daily physical activity undertaken by patients with T2DM is associated with their diabetes control. Design: A correlation study with prospective design. Methods: Purposive sampling of 206 patients with T2DM was recruited from a medical center in Central Taiwan. The International Physical Activity Questionnaire was used to assess daily levels of physical activities, and the Diabetes Compliance Questionnaire was used to assess medication and dietary compliance. Data of diabetes control (hemoglobin A1c, HbA1c)were followed up every three months for one year after recruitment. Results: In this study, the average age of the participants was 62.5 years (±10.4 years), and the average duration of diabetes since diagnosis was 13.2 years (±7.8), 112 of the participants were women (54.4%) and 94 of the participants were men (45.6%). The mean HbA1c level was 7.8% (±1.4), and 78.2% of the participants presented with unsatisfactory diabetes control. Because the participants were distributed across a wide age range, and their physical health, activity levels, and comorbidities might have varied with age, the participants were divided into two groups: 121 participants who were younger than 65 years (58.7%) and 85 participants who were older than 65 years (41.3%). Both younger (< 65 years) and older (> 65 years) patients with diabetes engaged in more moderate and low levels of physical activity (89.3% and 87%, respectively). Results showed that the levels of daily physical activity were not significantly associated with diabetes control after adjustment for medication and dietary compliance in both groups. Conclusion: Performing daily physical activity is not significantly correlated with diabetes control. Daily physical activity cannot completely replace exercise. Relevance to Clinical Practice: Health personnel must encourage patients to engage in exercise that is planned, structured, and repetitive for improving diabetes control.Keywords: daily physical activity, diabetes control, international physical activity questionnaire (IPAQ), type II diabetes mellitus (T2DM)
Procedia PDF Downloads 1691662 Exploitation behind the Development of Home Batik Industry in Lawean, Solo, Central Java
Authors: Mukhammad Fatkhullah, Ayla Karina Budita, Cut Rizka Al Usrah, Kanita Khoirun Nisa, Muhammad Alhada Fuadilah Habib, Siti Muslihatul Mukaromah
Abstract:
Batik industry has become one of the leading industries in the economy of Indonesia. Since the recognition of batik as one of cultural wealth and national identity of Indonesia by UNESCO, batik production keeps increasing as a result of increasing demands for batik, whether from domestically or abroad. One of the rapid development batik industries in Indonesia is batik industry in Lawean Village, Solo, Central Java, Indonesia. This batik industry generally uses putting-out system where batik workers work in their own houses. With the implementation of this system, therefore employers don’t have to prepare Environmental Impact Analysis (EIA), social security for workers, overtime payment, space for working, and equipment for working. The implementation of putting-out system causes many problems, starting from environmental pollution, the loss of social rights of workers, and even exploitation of workers by batik entrepreneurs. The data used to describe this reality is the primary data from qualitative research with in-depth interview data collection technique. Informants were determined purposively. The theory used to perform data interpretation is the phenomenology of Alfred Schutz. Both qualitative and phenomenology are used in this study to describe batik workers exploitation in terms of the implementation of putting-out system on home batik industry in Lawean. The research result showed that workers in batik industry sector in Lawean were exploited with the implementation of putting-out system. The workers were strictly employed by the entrepreneurs, so that their job cannot be called 'part-time' job anymore. In terms of labor and time, the workers often work more than 12 hours per day and they often work overtime without receiving any overtime payment. In terms of work safety, the workers often have contact with chemical substances contained in batik making materials without using any protection, such as clothes work, which is worsened by the lack of standard or procedure in work that can cause physical damage, such as burnt and peeled off skin. Moreover, exposure and contamination of chemical materials make the workers and their families vulnerable to various diseases. Meanwhile, batik entrepreneurs did not give any social security (including health cost aid). Besides that, the researchers found that batik industry in home industry sector is not environmentally friendly, even damaging ecosystem because industrial waste disposed without EIA.Keywords: exploitation, home batik industry, occupational health and safety, putting-out system
Procedia PDF Downloads 3171661 Restriction on the Freedom of Economic Activity in the Polish Energy Law
Authors: Zofia Romanowska
Abstract:
Recently there have been significant changes in the Polish energy market. Due to the government's decision to strengthen energy security as well as to strengthen the implementation of the European Union common energy policy, the Polish energy market has been undergoing significant changes. In the face of these, it is necessary to answer the question about the direction the Polish energy rationing sector is going, how wide apart the powers of the state are and also whether the real regulator of energy projects in Poland is not in fact the European Union itself. In order to determine the role of the state as a regulator of the energy market, the study analyses the basic instruments of regulation, i.e. the licenses, permits and permissions to conduct various activities related to the energy market, such as the production and sale of liquid fuels or concessions for trade in natural gas. Bearing in mind that Polish law is part of the widely interpreted European Union energy policy, the legal solutions in neighbouring countries are also being researched, including those made in Germany, a country which plays a key role in the shaping of EU policies. The correct interpretation of the new legislation modifying the current wording of the Energy Law Act, such as obliging the entities engaged in the production and trade of liquid fuels (including abroad) to meet a number of additional requirements for the licensing and providing information to the state about conducted business, plays a key role in the study. Going beyond the legal framework for energy rationing, the study also includes a legal and economic analysis of public and private goods within the energy sector and delves into the subject of effective remedies. The research caused the relationships between progressive rationing introduced by the legislator and the rearrangement rules prevailing on the Polish energy market to be taken note of, which led to the introduction of greater transparency in the sector. The studies refer to the initial conclusion that currently, despite the proclaimed idea of liberalization of the oil and gas market and the opening of market to a bigger number of entities as a result of the newly implanted changes, the process of issuing and controlling the conduction of the concessions will be tightened, guaranteeing to entities greater security of energy supply. In the long term, the effect of the introduced legislative solutions will be the reduction of the amount of entities on the energy market. The companies that meet the requirements imposed on them by the new regulation to cope with the profitability of the business will in turn increase prices for their services, which will be have an impact on consumers' budgets.Keywords: license, energy law, energy market, public goods, regulator
Procedia PDF Downloads 2461660 Building Education Leader Capacity through an Integrated Information and Communication Technology Leadership Model and Tool
Authors: Sousan Arafeh
Abstract:
Educational systems and schools worldwide are increasingly reliant on information and communication technology (ICT). Unfortunately, most educational leadership development programs do not offer formal curricular and/or field experiences that prepare students for managing ICT resources, personnel, and processes. The result is a steep learning curve for the leader and his/her staff and dissipated organizational energy that compromises desired outcomes. To address this gap in education leaders’ development, Arafeh’s Integrated Technology Leadership Model (AITLM) was created. It is a conceptual model and tool that educational leadership students can use to better understand the ICT ecology that exists within their schools. The AITL Model consists of six 'infrastructure types' where ICT activity takes place: technical infrastructure, communications infrastructure, core business infrastructure, context infrastructure, resources infrastructure, and human infrastructure. These six infrastructures are further divided into 16 key areas that need management attention. The AITL Model was created by critically analyzing existing technology/ICT leadership models and working to make something more authentic and comprehensive regarding school leaders’ purview and experience. The AITL Model then served as a tool when it was distributed to over 150 educational leadership students who were asked to review it and qualitatively share their reactions. Students said the model presented crucial areas of consideration that they had not been exposed to before and that the exercise of reviewing and discussing the AITL Model as a group was useful for identifying areas of growth that they could pursue in the leadership development program and in their professional settings. While development in all infrastructures and key areas was important for students’ understanding of ICT, they noted that they were least aware of the importance of the intangible area of the resources infrastructure. The AITL Model will be presented and session participants will have an opportunity to review and reflect on its impact and utility. Ultimately, the AITL Model is one that could have significant policy and practice implications. At the very least, it might help shape ICT content in educational leadership development programs through curricular and pedagogical updates.Keywords: education leadership, information and communications technology, ICT, leadership capacity building, leadership development
Procedia PDF Downloads 1161659 A Comparative Study of Virus Detection Techniques
Authors: Sulaiman Al amro, Ali Alkhalifah
Abstract:
The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based
Procedia PDF Downloads 4851658 Secure Data Sharing of Electronic Health Records With Blockchain
Authors: Kenneth Harper
Abstract:
The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,
Procedia PDF Downloads 221657 Managing Early Stakeholder Involvement at the Early Stages of a Building Project Life Cycle
Authors: Theophilus O. Odunlami, Hasan Haroglu, Nader Saleh-Matter
Abstract:
The challenges facing the construction industry are often worsened by the compounded nature of projects coupled with the complexity of key stakeholders involved at different stages of the project. Projects are planned to achieve outlined benefits in line with the business case; however, a lack of effective management of key stakeholders can result in unrealistic delivery aspirations, unnecessary re-works, and overruns. The aim of this study is to examine the early stages of a project lifecycle and investigate the stakeholder management and involvement processes and their impact on the successful delivery of the project. The research engaged with conventional construction organisations and project personnel and stakeholders on diverse projects, using a research strategy to analyse existing project case studies, narrative enquiries, interviews, and surveys using a combined qualitative, quantitative, and mixed method of analysis. Research findings have shown that the involvement of stakeholders at different levels during the early stages has pronounced effects on project delivery; it helps to forge synergy and promotes a clear understanding of individual responsibilities, strengths, and weaknesses. This has often fostered a positive sense of productive collaboration right through the early stages of the project. These research findings intend to contribute to the development of a process framework for stakeholder and project team involvement in the early stages of a project. This framework will align with the selection criteria for stakeholders, contractors, and resources, ultimately contributing to the successful completion of projects. The primary question addressed in this study is stakeholder involvement and management of the early stages of a building project life cycle impacts project delivery. Findings showed that early-stage stakeholder involvement and collaboration between project teams and contractors significantly contribute to project success. However, a strong and healthy communication strategy would be required to maintain the flow of value-added ideas among stakeholders at the early stages to benefit the project at the execution stage.Keywords: early stages, project lifecycle, stakeholders, decision-making strategy, project framework
Procedia PDF Downloads 1001656 Surgical Team Perceptions of the Surgical Safety Checklist in a Tertiary Hospital in Jordan: A Descriptive Qualitative Study
Authors: Rania Albsoul, Muhammad Ahmed Alshyyab, Baraa Ayed Al Odat, Nermeen Borhan Al Dwekat, Batool Emad Al-masri, Fatima Abdulsattar Alkubaisi, Salsabil Awni Flefil, Majd Hussein Al-Khawaldeh, Ragad Ayman Sa’ed, Maha Waleed Abu Ajamieh, Gerard Fitzgerald
Abstract:
Purpose: The purpose of this paper is to explore the perceptions of operating room staff towards the use of the World Health Organization Surgical Safety Checklist in a tertiary hospital in Jordan. Design/methodology/approach: This was a qualitative descriptive study. Semi-structured interviews were conducted with a purposeful sample of 21 healthcare staff employed in the operating room (nurses, residents, surgeons, and anaesthesiologists). The interviews were conducted in the period from October to December 2021. Thematic analysis was used to analyse the data. Findings: Three main themes emerged from data analysis, namely compliance with the surgical safety checklist, the impact of the surgical safety checklist, and barriers and facilitators to the use of the surgical safety checklist. The use of the checklist was seen as enabling staff to communicate effectively and thus accomplish patient safety and positive outcomes. The perceived barriers to compliance included excessive workload, congestion, and lack of training and awareness. Enhanced training and education were thought to improve the utilization of the surgical safety checklist and help enhance awareness about its importance. Originality/value: While steps to utilize the surgical safety checklist by the operation room personnel may seem simple, the quality of its administration is not necessarily robust. There are several challenges to consistent, complete, and effective administration of the surgical safety checklist by the surgical team members. Healthcare managers must employ interventions to eliminate barriers to and offer facilitators of adherence to the application of the surgical safety checklist, therefore promoting quality healthcare and patient safety.Keywords: patient safety, surgical safety checklist, compliance, utility, operating room, quality healthcare, communication, teamwork
Procedia PDF Downloads 109