Search results for: vulnerable
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1057

Search results for: vulnerable

907 Association of Vulnerability and Behavioural Outcomes of FSWs Linked with TI Prevention HIV Program: An Evidence from Cross-Sectional Behavioural Study in Thane District of Maharashtra

Authors: Jayanta Bora, Sukhvinder Kaur, Ashok Agarwal, Sangeeta Kaul

Abstract:

Background: It is important for targeted interventions to consider vulnerabilities of female sex workers (FSWs) such as poverty, work-related mobility and literacy for effective human immunodeficiency virus (HIV) prevention. This paper examines the association between vulnerability and behavioural outcomes among FSWs in Thane district, Maharashtra under USAID PHFI-PIPPSE project. Methods: Data were used from the Behavioural Tracking Survey, a cross-sectional behavioural study conducted in 2015 with 503 FSWs randomly selected from 12 TI-NGOs which were functioning and providing services to FSWs in Thane district prior to April 2014 in Thane district of Maharashtra. We have created the “vulnerability index”, a composite index of literacy, factors of dependence (alternative livelihood options, current debt), and aspects of sex work (mobility and duration in sex work) as a dependent variable. The key independent measures used were program exposure to intervention, service uptake, self-confidence, and self-identity. Bi-variate and multivariate logistic regressions were used to examine the study objectives. Results: A higher proportion of FSWs who were in the age-group 18–25 years from brothel/street /home/ lodge-based were categorized as highly vulnerable to HIV risk as compared to bar-based sex worker (74.1% versus 59.8%, P,0.002); regression analysis highlighted lower odds of vulnerability among FSWs who were aware of services and visited NGO clinic for medical check-up and counselling for STI [AOR= 0.092, 95% CI 0.018-0.460; P,0.004], However, lower odds of vulnerability on confident in supporting fellow sex worker in crisis [AOR= 0.601, 95% CI 0.476-0.758; P, 0.000] and were able to turn away clients when they refused to use a condom during sex [AOR= 0.524, 95% CI 0.342-0.802; P, 0.003]. Conclusion: The results highlight that FSWs associated with TIs and getting services are less vulnerable and highly empowered. As a result of behavioural change communication and other services provided by TIs, FSWs were able to successfully negotiate about condom use with their clients and manage solidarity in the crisis situation for fellow FSWs. Therefore, it is evident from study paper that TI prevention programs may transform the lives of masses considerably and may open a window of opportunity to infuse the information and awareness about HIV risk.

Keywords: female sex worker, HIV prevention, HIV service uptake, vulnerability

Procedia PDF Downloads 240
906 Livestock Production in Vietnam: Technical Efficiency and Productivity Performance Based on Regional Differences

Authors: Diep Thanh Tung

Abstract:

This study aims to measure technical efficiency and examine productivity performance of livestock production in regions of Vietnam based on a panel data of 2008–2012. After four years, although there are improvements in efficiency of some regions, low technical efficiency, poor performance of productivity and its compositions are dominant features in almost regions. Households which much depend on livestock income in agricultural income or agricultural income in total income are more vulnerable than the others in term of livestock production.

Keywords: data envelopment analysis, meta-frontier, Malmquist, technical efficiency, livestock production

Procedia PDF Downloads 685
905 Global Health Access to Reproductive Care: Vesicovaginal Fistulas and Obstetrics in Pakistan

Authors: Aena Iqbal

Abstract:

The lack of access to maternal and reproductive health in Pakistan poses a great threat to global public health. Obstetric issues, including vesicovaginal fistulas (VVF), are the most common in South Asian countries, leaving women in a more vulnerable state. Koohi Goth Women’s Hospital offers free VVF operations, which draws in women from all over Pakistan. Although reproductive health is being handled, mental health is often neglected in these scenarios. Using a series of questions inspired by the Warwick Edinburgh Model, this paper builds on the results from interviewing women who have received vesicovaginal fistula repair surgery on their mental health, a taboo topic in Pakistan.

Keywords: obstetrics, VVF, Pakistan, reproductive health

Procedia PDF Downloads 78
904 Phone Number Spoofing Attack in VoLTE 4G

Authors: Joo-Hyung Oh

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 413
903 Human Resource Development and Social Entrepreneurship: A Pan-African Perspective

Authors: Leon C. Prieto, Simone T. A. Phipps

Abstract:

There is a need to promote social entrepreneurship in order to solve some of the complex problems facing various countries in Africa (poverty, unemployment, crime, HIV, etc.). For example, one possible consequence of the HIV/AIDS crisis in Zimbabwe and elsewhere is a deterioration in the educational opportunities for orphans and other vulnerable children. Given that high returns are associated with education, the loss of education for a large segment of the population would likely worsen the already dire economic consequences of the HIV/AIDS crisis. Using a systems approach, this paper argues that social entrepreneurship can be used as a vehicle to promote national human resource development, which will assist in the alleviation of societal ills on the national level as well as throughout Africa.

Keywords: human resource development, pan-african, social entrepreneurship, social enterprise

Procedia PDF Downloads 361
902 Detection and Tracking Approach Using an Automotive Radar to Increase Active Pedestrian Safety

Authors: Michael Heuer, Ayoub Al-Hamadi, Alexander Rain, Marc-Michael Meinecke

Abstract:

Vulnerable road users, e.g. pedestrians, have a high impact on fatal accident numbers. To reduce these statistics, car manufactures are intensively developing suitable safety systems. Hereby, fast and reliable environment recognition is a major challenge. In this paper we describe a tracking approach that is only based on a 24 GHz radar sensor. While common radar signal processing loses much information, we make use of a track-before-detect filter to incorporate raw measurements. It is explained how the Range-Doppler spectrum can help to indicated pedestrians and stabilize tracking even in occultation scenarios compared to sensors in series.

Keywords: radar, pedestrian detection, active safety, sensor

Procedia PDF Downloads 506
901 An Embedded System for Early Detection of Gas Leakage in Hospitals and Industries

Authors: Sehreen Moorat, Hiba, Maham Mahnoor, Faryal Soomro

Abstract:

Leakage of gases in a system makes infrastructures and users vulnerable; it can occur due to its environmental conditions or old groundwork. In hospitals and industries, it is very important to detect any small level of gas leakage because of their sensitivity. In this research, a portable detection system for the small leakage of gases has been developed, gas sensor (MQ-2) is used to find leakage when it’s at its initial phase. The sensor and transmitting module senses the change in level of gas by using a sensing circuit. When a concentration of gas reach at a specified threshold level, it will activate an alarm and send the alarming situation notification to receiver through GSM module. The proposed system works well in hospitals, home, and industries.

Keywords: gases, detection, Arduino, MQ-2, alarm

Procedia PDF Downloads 190
900 Assessment of Drinking Water Contamination from the Water Source to the Consumer in Palapye Region, Botswana

Authors: Tshegofatso Galekgathege

Abstract:

Poor water quality is of great concern to human health as it can cause disease outbreaks. A standard practice today, in developed countries, is that people should be provided with safe-reliable drinking water, as safe drinking water is recognized as a basic human right and a cost effective measure of reducing diseases. Over 1.1 billion people worldwide lack access to a safe water supply and as a result, the majority are forced to use polluted surface or groundwater. It is widely accepted that our water supply systems are susceptible to the intentional or accidental contamination .Water quality degradation may occur anywhere in the path that water takes from the water source to the consumer. Chlorine is believed to be an effective tool in disinfecting water, but its concentration may decrease with time due to consumption by chemical reactions. This shows that we are at the risk of being infected by waterborne diseases if chlorine in water falls below the required level of 0.2-1mg/liter which should be maintained in water and some contaminants enter into the water distribution system. It is believed that the lack of adequate sanitation also contributes to the contamination of water globally. This study therefore, assesses drinking water contamination from the source to the consumer by identifying the point vulnerable to contamination from the source to the consumer in the study area .To identify the point vulnerable to contamination, water was sampled monthly from boreholes, water treatment plant, water distribution system (WDS), service reservoirs and consumer taps from all the twenty (20) villages of Palapye region. Sampled water was then taken to the laboratory for testing and analysis of microbiological and chemical parameters. Water quality analysis were then compared with Botswana drinking water quality standards (BOS32:2009) to see if they comply. Major sources of water contamination identified during site visits were the livestock which were found drinking stagnant water from leaking pipes in 90 percent of the villages. Soils structure around the area was negatively affected because of livestock movement even vegetation in the area. In conclusion microbiological parameters of water in the study area do not comply with drinking water standards, some microbiological parameters in water indicated that livestock do not only affect land degradation but also the quality of water. Chlorine has been applied to water over some years but it is not effective enough thus preventative measures have to be developed, to prevent contaminants from reaching water. Remember: Prevention is better than cure.

Keywords: land degradation, leaking systems, livestock, water contamination

Procedia PDF Downloads 338
899 Seismic Fragility Curves Methodologies for Bridges: A Review

Authors: Amirmozafar Benshams, Khatere Kashmari, Farzad Hatami, Mesbah Saybani

Abstract:

As a part of the transportation network, bridges are one of the most vulnerable structures. In order to investigate the vulnerability and seismic evaluation of bridges performance, identifying of bridge associated with various state of damage is important. Fragility curves provide important data about damage states and performance of bridges against earthquakes. The development of vulnerability information in the form of fragility curves is a widely practiced approach when the information is to be developed accounting for a multitude of uncertain source involved. This paper presents the fragility curve methodologies for bridges and investigates the practice and applications relating to the seismic fragility assessment of bridges.

Keywords: fragility curve, bridge, uncertainty, NLTHA, IDA

Procedia PDF Downloads 266
898 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 122
897 The Experiences of Rural Family Caregivers of Cancer Patients in Newfoundland and Labrador and Their Challenges and Needs in Relocating to Urban Settings for Treatment

Authors: Mei Li, Victor Meddalena

Abstract:

Background: Newfoundland and Labrador (NL) has rapidly aging population and is characterized by its vast geography with high proportion of dispersed rural communities when compared to other provinces in Canada. Structural, demographic and geographic factors have created big gaps for rural residents across NL with respect to accessing various health and social services. While the barriers are well documented for patients’ access to cancer care in rural and remote areas, challenges faced by family caregivers are not fully recognized. Caregiving burden coupled with challenges associated with relocation and frequent travels create situations where caregivers are vulnerable physically, emotionally, financially and socially. This study examines the experiences of family caregivers living in rural NL through a social justice lens. It is expected to identify the gaps existing in social policy and support for rural family caregivers. It will make a novel contribution to the literature in this regard. Methods: Design: This qualitative study adopted the hermeneutic phenomenology to best describe and interpret rural-based family caregivers’ living experiences and explore the meaning, impact, and the influence of both individual experience and contextual factors shaping these experiences. Data Collection: In-depth interviews with key informants were conducted with 12 participants from various rural communities in NL. A case study was also used to explore an individual’s experience in complex social units consisting of multiple variables of in-depth understanding of the reality. Data Analysis: Thematic analysis guided by the Voice-Centred Relational (VCR) method was employed to explore the relationships and contexts of participants. Emerging Themes: Six major emerging themes were identified, namely, overwhelming caregiving burden on rural family caregivers, long existing financial hardship, separation from family and community, low level of social support and self-reliance coping strategies, and social vulnerability and isolation. Conclusion: Understanding the lived experiences of rural-based family caregivers is critical to inform the policy makers the gap of health and social service in NL. The findings of this study also have implications for family caregivers who are vulnerable in other similar contexts. This study adds innovative insights for policy making and service provision in this regard.

Keywords: family caregivers, policy, relocation, rural

Procedia PDF Downloads 125
896 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 502
895 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 55
894 Assessing Adaptive Capacity to Climate Change and Agricultural Productivity of Farming Households of Makueni County in Kenya

Authors: Lilian Mbinya Muasa

Abstract:

Climate change is inevitable and a global challenge with long term implications to the sustainable development of many countries today. The negative impacts of climate change are creating far reaching social, economic and environmental problems threatening lives and livelihoods of millions of people in the world. Developing countries especially sub-Saharan countries are more vulnerable to climate change due to their weak ecosystem, low adaptive capacity and high dependency on rain fed agriculture. Countries in Sub-Saharan Africa are more vulnerable to climate change impacts due to their weak adaptive capacity and over-reliance on rain fed agriculture. In Kenya, 78% of the rural communities are poor farmers who heavily rely on rain fed agriculture thus are directly affected by climate change impacts.Currently, many parts of Kenya are experiencing successive droughts which are contributing to persistently unstable and declining agricultural productivity especially in semi arid eastern Kenya. As a result, thousands of rural communities repeatedly experience food insecurity which plunge them to an ever over-reliance on relief food from the government and Non-Governmental Organization In addition, they have adopted poverty coping strategies to diversify their income, for instance, deforestation to burn charcoal, sand harvesting and overgrazing which instead contribute to environmental degradation.This research was conducted in Makueni County which is classified as one of the most food insecure counties in Kenya and experiencing acute environmental degradation. The study aimed at analyzing the adaptive capacity to climate change across farming households of Makueni County in Kenya by, 1) analyzing adaptive capacity to climate change and agricultural productivity across farming households, 2) identifying factors that contribute to differences in adaptive capacity across farming households, and 3) understanding the relationship between climate change, agricultural productivity and adaptive capacity. Analytical Hierarchy Process (AHP) was applied to determine adaptive capacity and Total Factor Productivity (TFP) to determine Agricultural productivity per household. Increase in frequency of prolonged droughts and scanty rainfall. Preliminary findings indicate a magnanimous decline in agricultural production in the last 10 years in Makueni County. In addition, there is an over reliance of households on indigenous knowledge which is no longer reliable because of the unpredictability nature of climate change impacts. These findings on adaptive capacity across farming households provide the first step of developing and implementing action-oriented climate change policies in Makueni County and Kenya.

Keywords: adaptive capacity, agricultural productivity, climate change, vulnerability

Procedia PDF Downloads 309
893 Observed Damages to Adobe Masonry Buildings after 2011 Van Earthquake

Authors: Eylem Güzel, Soner Güler, Mustafa Gülen

Abstract:

Masonry is the oldest building materials since ancient times. Adobe, stone, brick are the most widespread materials used in the construction of masonry buildings. Masonry buildings compose of a large part of building stock especially in rural areas and underdeveloped regions of Turkey. The seismic performance of adobe masonry buildings is vulnerable against earthquake effects. In this study, after 2011 Van earthquake with magnitude 7.2 Mw, damages occurred in existing adobe masonry buildings in Van city is investigated. The observed damages and reasons of adobe masonry buildings in design and construction phase are specified and evaluated.

Keywords: adobe masonry buildings, earthquake effects, damages, seismic performance

Procedia PDF Downloads 302
892 A Static and Dynamic Slope Stability Analysis of Sonapur

Authors: Rupam Saikia, Ashim Kanti Dey

Abstract:

Sonapur is an intense hilly region on the border of Assam and Meghalaya lying in North-East India and is very near to a seismic fault named as Dauki besides which makes the region seismically active. Besides, these recently two earthquakes of magnitude 6.7 and 6.9 have struck North-East India in January and April 2016. Also, the slope concerned for this study is adjacent to NH 44 which for a long time has been a sole important connecting link to the states of Manipur and Mizoram along with some parts of Assam and so has been a cause of considerable loss to life and property since past decades as there has been several recorded incidents of landslide, road-blocks, etc. mostly during the rainy season which comes into news. Based on this issue this paper reports a static and dynamic slope stability analysis of Sonapur which has been carried out in MIDAS GTS NX. The slope being highly unreachable due to terrain and thick vegetation in-situ test was not feasible considering the current scope available so disturbed soil sample was collected from the site for the determination of strength parameters. The strength parameters were so determined for varying relative density with further variation in water content. The slopes were analyzed considering plane strain condition for three slope heights of 5 m, 10 m and 20 m which were then further categorized based on slope angles 30, 40, 50, 60, and 70 considering the possible extent of steepness. Initially static analysis under dry state was performed then considering the worst case that can develop during rainy season the slopes were analyzed for fully saturated condition along with partial degree of saturation with an increase in the waterfront. Furthermore, dynamic analysis was performed considering the El-Centro Earthquake which had a magnitude of 6.7 and peak ground acceleration of 0.3569g at 2.14 sec for the slope which were found to be safe during static analysis under both dry and fully saturated condition. Some of the conclusions were slopes with inclination above 40 onwards were found to be highly vulnerable for slopes of height 10 m and above even under dry static condition. Maximum horizontal displacement showed an exponential increase with an increase in inclination from 30 to 70. The vulnerability of the slopes was seen to be further increased during rainy season as even slopes of minimal steepness of 30 for height 20 m was seen to be on the verge of failure. Also, during dynamic analysis slopes safe during static analysis were found to be highly vulnerable. Lastly, as a part of the study a comparative study on Strength Reduction Method (SRM) versus Limit Equilibrium Method (LEM) was also carried out and some of the advantages and disadvantages were figured out.

Keywords: dynamic analysis, factor of safety, slope stability, strength reduction method

Procedia PDF Downloads 247
891 Access of Refugees in Rural Areas to Regular Medication during COVID-19 Era: International Organization for Migration, Jordan Experience

Authors: Rasha Shoumar

Abstract:

Background: Since the onset of the Syria crisis in 2011, Jordan has hosted many Syrian refugees, many of which are residing in urban and rural areas. Vulnerability of refugees has increased due to the COVID-19 pandemic, adding to their already existing challenge in access to medical services, rendering them vulnerable to the complications of untreated medical conditions and amplifying their risk for severe COVID-19 disease. To improve health outcomes and access to health care services in a COVID-19 context, IOM (The International Organization for Migration) provided health services including awareness raising, direct primary health care through mobile teams and referrals to secondary services were extended to the vulnerable populations of refugees. Method: 6 community health volunteers were trained and deployed to different governorates to provide COVID-19 and non-communicable disease awareness and collect data rated to non-communicable disease and access to medical health services. Primary health care services were extended to 7 governorates through a mobile medical team, providing medical management. The collected Data was reviewed and analyzed. Results: 2150 refugees in rural areas were reached out by community health volunteers, out of which 78 received their medications through the Ministry of Health, 121 received their medications through different non-governmental organizations, 665 patients couldn’t afford buying any medications, 1286 patients were occasionally buying their medications when they were able to afford it. 853 patients received medications and follow up through IOM mobile clinics, the most common conditions were hypertension, diabetes, hyperlipidemia, anemia, heart disease, thyroid disease, asthma, seizures, and psychiatric conditions. 709 of these patients had more than 3 of the comorbidities. Multiple cases were referred for secondary and tertiary lifesaving interventions. Conclusion: Non communicable diseases are highly prevalent among refugee population in Jordan, access to medical services have proven to be a challenge in rural areas especially during the COVID-19 era, many of the patients have multiple uncontrolled medical conditions placing them at risk for complications and risk for severe COVID-19 disease. Deployment of mobile clinics to rural areas plays an essential role in managing such medical conditions, thus improving the continuum of health care approach, physical and mental wellbeing of refugees and reducing the risk for severe COVID-19 disease among this group, taking us one step forward toward universal health access.

Keywords: COVID-19, refugees, mobile clinics, primary health care

Procedia PDF Downloads 123
890 Impact of Unconditional Cash Transfer Scheme on the Food Security Status of the Elderly in Ekiti State, Nigeria

Authors: R. O. Babatunde, O. M. Igbalajobi, F. Matambalya

Abstract:

Moderate economic growth in developing and emerging countries has led to improvement in the food consumption and nutrition situation in the last two decades. Nevertheless, about 870 million people, with a quarter of them from Sub-Saharan Africa, are still suffering from hunger worldwide. As part of measures to reduce the widespread poverty and hunger, cash transfer programmes are now being implemented in many countries of the world. While nationwide cash transfer schemes are few in Sub-Saharan Africa generally, the available ones are more concentrated in East and Southern Africa. Much of the available literature on social protection had focused on the poverty impact of cash transfer schemes at the household level, with the larger proportion originating from Latin America. On the contrary, much less empirical studies have been conducted on the poverty impact of cash transfer in Sub-Saharan Africa, let alone on the food security and nutrition impact. To fill this gap in knowledge, this paper examines the impact of cash transfer on food security in Nigeria. As a case study, the paper analysed the Ekiti State Cash Transfer Scheme (ECTS). ECTS is an unconditional transfer scheme which was established in 2011 to directly provide cash transfer to elderly persons aged 65 years and above in Ekiti State of Nigeria. Using survey data collected in 2013, we analysed the impact of the scheme on food availability and dietary diversity of the beneficiary households. Descriptive and Propensity Score Matching (PSM) techniques were used to estimate the Average Treatment Effect (ATE) and Average Treatment Effect on the Treated (ATT) among the beneficiary and control groups. Thereafter, a model to test for the impact of participation in the cash transfer scheme on calorie availability and dietary diversity was estimated. The results indicate that while households in the sample are clearly vulnerable, there were statistically significant differences between the beneficiary and control groups. For instance, monthly expenditure, calorie availability and dietary diversity were significantly larger among the beneficiary and consequently, the prevalence and depth of hunger were lower in the group. Econometric results indicate that the cash transfer has a positive and significant effect on food availability and dietary diversity in the households. Expanding the coverage of the present scheme to cover all eligible households in the country and incorporating cash transfer into a comprehensive hunger reduction policy will make it to have a greater impact at improving food security among the most vulnerable households in the country.

Keywords: calorie availability, cash transfers, dietary diversity, propensity score matching

Procedia PDF Downloads 363
889 Modeling SET Effect on Charge Pump Phase Locked Loop

Authors: Varsha Prasad, S. Sandya

Abstract:

Cosmic Ray effects in microelectronics such as single event effect (SET) and total dose ionization (TID) have been of major concern in space electronics since 1970. Advanced CMOS technologies have demonstrated reduced sensitivity to TID effect. However, charge pump Phase Locked Loop is very much vulnerable to single event transient effect. This paper presents an SET analysis model, where the SET is modeled as a double exponential pulse. The time domain analysis reveals that the settling time of the voltage controlled oscillator (VCO) depends on the SET pulse strength, setting the time constant and the damping factor. The analysis of the proposed SET analysis model is confirmed by the simulation results.

Keywords: charge pump, phase locked loop, SET, VCO

Procedia PDF Downloads 419
888 Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe

Authors: Khaled M. Khan, Armstrong Nhlabatsi

Abstract:

This article attempts to analyse behavioural traits of lone-wolves who struck and killed innocents in six different attacks in Europe in last nine months. The main objective of this study is to develop a profiling template in order to capture commonality of characteristics of these attackers. This study tries to understand the homogeneity of lone-wolves in terms of their social background and state of mind. The commonality among them can possibly be used to build a profiling template that could help detecting vulnerable persons who are prone to be self-radicalised or radicalised by someone else. The result of this study provides us an understanding of their commonality in terms of their state of mind and social characteristics.

Keywords: behavioral pattern, terrorism, profiling, commonality

Procedia PDF Downloads 385
887 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 400
886 The Situation of Transgender Individuals Was Worsened During Covid-19

Authors: Kajal Attri

Abstract:

Introduction: Transgender people are considered third gender in India, although they still face identification issues and alienated from society. Furthermore, they face several challenges, including discrimination in employment, resources, education, and property as a result, most transgender people make a living through begging at traffic lights, trains, and buses; attending auspicious occasions such as childbirth and weddings; and engaging in sex work, which includes both home-based and street-based sex work. During COVID-19, maintaining social distance exacerbates transgender people's circumstances and prevents them from accessing health care services, sexual reassignment surgery, identity-based resources, government security, and financial stability. Nonetheless, the pandemic raised unfavorable attitudes about transgender persons, such as unsupportive family members and trouble forming emotional relationships. This study focuses on how we missed transgender people during COVID-19 to provide better facilities to cope with this situation when they are already the most vulnerable segment of the society. Methodology: The research was conducted using secondary data from published publications and grey literature obtained from four databases: Pubmed, Psychinfo, Science direct, and Google scholar. The literature included total 25 articles that met the inclusion criteria for a review. Result and Discussion: Transgender people, who are considered the most vulnerable sector of society, have already faced several obstacles as a result of the outbreak. The analysis underscores the difficulties that transgender persons faced during COVID-19, such as, They had trouble accessing the government's social security programmes during the lockdown, which provide rations and pensions since they lack the necessary identifying cards. The impact of COVID-19 leaves transgender people at heightened risk of poverty and ill health because they exist on the margins of society, those livelihood base on sex work, begging, and participation on auspicious occasions. They had a significant risk of contracting SARS-CoV2 because they lived in congested areas or did not have permanent shelter, and they were predominantly infected with HIV, cancer, and other non-communicable illnesses. The pandemic raised unfavorable attitudes about transgender persons, such as unsupportive family members and trouble forming emotional relationships. Conclusion: The study comes forward with useful suggestions based on content analysis and information to reduce the existing woes of transgenders during any pandemic like COVID-19.

Keywords: COVID-19, transgender, lockdown, transwomen, stigmatization

Procedia PDF Downloads 59
885 Promoting Environmental Sustainability in Rural Areas with CMUH Green Experiential Education Center

Authors: Yi-Chu Liu, Hsiu-Huei Hung, Li-Hui Yang, Ming-Jyh Chen

Abstract:

introduction: To promote environmental sustainability, the hospital formed a corporate volunteer team in 2016 to build the Green Experiential Education Center. Our green creation center utilizes attic space to achieve sustainability objectives such as energy efficiency and carbon reduction. Other than executing sustainable plans, the center emphasizes experiential education. We invite our community to actively participate in building a sustainable, economically viable environment. Since 2020, the China Medical University Hospital has provided medical care to the Tgbin community in Taichung City's Heping District. The tribe, primarily composed of Atayal people, the elderly comprise 18% of the total population, and these families' per capita income is relatively low compared to Taiwanese citizens elsewhere. Purpose / Methods: With the experiences at the Green Experiential Education Center, CMUH team identifies the following objectives: Create an aquaponic system to supply vulnerable local households with food. Create a solar renewable energy system to meet the electricity needs of vulnerable local households. Promote the purchase of green electricity certificates to reduce the hospital's carbon emissions and generate additional revenue for the local community. Materials and Methods: In March 2020, we visited the community and installed The aquaponic system in January 2021. CMUH spent 150,000NT (approximately 5000US dollars) in March 2021 to build a 100-square-meter aquaponic system. The production of vegetables and fish caught determines the number of vulnerable families that can be supported. The aquaponics system is a kind of Low energy consumption and environmentally friendly production method, and can simultaneously achieve energy saving, water saving, and fertilizer saving .In September 2023, CMUH will complete a solar renewable energy system. The system will cover an area of 308 square meters and costs approximately NT$240,000 (approximately US$8,000). The installation of electricity meters will enable statistical analysis of power generation. And complete the Taiwan National Renewable Energy Certificate application process. The green electricity certificate will be obtained based on the monthly power generation from the solar renewable energy system. Results: I Food availability and access are crucial considering the remote location and aging population. By creating a fish and vegetable symbiosis system, the vegetables and catches produced will enable economically disadvantaged families to lower food costs. In 2021 and 2022, the aquaponic system produced 52 kilograms of vegetables and 75 kilograms of catch. The production ensures the daily needs of 8 disadvantaged families. Conclusions: The hospital serves as a fortress for public health and the ideal setting for corporate social responsibility. China Medical University Hospital and the Green Experiential Education Center work to strengthen ties with rural communities and offer top-notch specialty medical care. We are committed to assisting people in escaping poverty and hunger as part of the 2030 Sustainable Development Goals.

Keywords: environmental education, sustainability, energy conservation, carbon emissions, rural area development

Procedia PDF Downloads 60
884 The Deprivation of Human Rights Experienced by African Children with Disabilities

Authors: Anna Wiltshire, Rebecca Markham

Abstract:

Over the last decade, a growing body of evidence has indicated that children with disabilities are often amongst the most excluded and vulnerable in society. The World Bank estimates that 20% of those living in poverty in developing countries are disabled which means that those with the least bear the greatest burden. Furthermore, children with disabilities in Africa have to face a multitude of difficulties ranging from the physical to the psychological. Misconceptions and cultural beliefs are used to justify violence against, or complete shunning of these individuals and their families. In addition, discrimination can prevent access to both education and health services, further compromising these individuals. All children, irrespective of their disability should be able to enjoy human rights without discrimination, but this is often not the case. This poster explores how and why children with disabilities in Africa are subject to violations of their human rights, and suggests ways of addressing these problems.

Keywords: Africa, children, disability, discrimination, human rights

Procedia PDF Downloads 545
883 Radar-Based Classification of Pedestrian and Dog Using High-Resolution Raw Range-Doppler Signatures

Authors: C. Mayr, J. Periya, A. Kariminezhad

Abstract:

In this paper, we developed a learning framework for the classification of vulnerable road users (VRU) by their range-Doppler signatures. The frequency-modulated continuous-wave (FMCW) radar raw data is first pre-processed to obtain robust object range-Doppler maps per coherent time interval. The complex-valued range-Doppler maps captured from our outdoor measurements are further fed into a convolutional neural network (CNN) to learn the classification. This CNN has gone through a hyperparameter optimization process for improved learning. By learning VRU range-Doppler signatures, the three classes 'pedestrian', 'dog', and 'noise' are classified with an average accuracy of almost 95%. Interestingly, this classification accuracy holds for a combined longitudinal and lateral object trajectories.

Keywords: machine learning, radar, signal processing, autonomous driving

Procedia PDF Downloads 218
882 Dual-use UAVs in Armed Conflicts: Opportunities and Risks for Cyber and Electronic Warfare

Authors: Piret Pernik

Abstract:

Based on strategic, operational, and technical analysis of the ongoing armed conflict in Ukraine, this paper will examine the opportunities and risks of using small commercial drones (dual-use unmanned aerial vehicles, UAV) for military purposes. The paper discusses the opportunities and risks in the information domain, encompassing both cyber and electromagnetic interference and attacks. The paper will draw conclusions on a possible strategic impact to the battlefield outcomes in the modern armed conflicts by the widespread use of dual-use UAVs. This article will contribute to filling the gap in the literature by examining based on empirical data cyberattacks and electromagnetic interference. Today, more than one hundred states and non-state actors possess UAVs ranging from low cost commodity models, widely are dual-use, available and affordable to anyone, to high-cost combat UAVs (UCAV) with lethal kinetic strike capabilities, which can be enhanced with Artificial Intelligence (AI) and Machine Learning (ML). Dual-use UAVs have been used by various actors for intelligence, reconnaissance, surveillance, situational awareness, geolocation, and kinetic targeting. Thus they function as force multipliers enabling kinetic and electronic warfare attacks and provide comparative and asymmetric operational and tactical advances. Some go as far as argue that automated (or semi-automated) systems can change the character of warfare, while others observe that the use of small drones has not changed the balance of power or battlefield outcomes. UAVs give considerable opportunities for commanders, for example, because they can be operated without GPS navigation, makes them less vulnerable and dependent on satellite communications. They can and have been used to conduct cyberattacks, electromagnetic interference, and kinetic attacks. However, they are highly vulnerable to those attacks themselves. So far, strategic studies, literature, and expert commentary have overlooked cybersecurity and electronic interference dimension of the use of dual use UAVs. The studies that link technical analysis of opportunities and risks with strategic battlefield outcomes is missing. It is expected that dual use commercial UAV proliferation in armed and hybrid conflicts will continue and accelerate in the future. Therefore, it is important to understand specific opportunities and risks related to the crowdsourced use of dual-use UAVs, which can have kinetic effects. Technical countermeasures to protect UAVs differ depending on a type of UAV (small, midsize, large, stealth combat), and this paper will offer a unique analysis of small UAVs both from the view of opportunities and risks for commanders and other actors in armed conflict.

Keywords: dual-use technology, cyber attacks, electromagnetic warfare, case studies of cyberattacks in armed conflicts

Procedia PDF Downloads 83
881 The Impact of COVID-19 on Women’s Health in Bangladesh

Authors: Dil Ware Alam, Faiza Zebeen, Sumaya Binte Masud

Abstract:

COVID-19) has impacted the whole world, including Bangladesh. The epidemic has reduced access to health care, particularly for women, creating challenges for an increasingly disadvantaged population. Women's health and well-being in Bangladesh are susceptible to a rise in domestic violence and need to be addressed quickly. The planet has been greatly influenced by Coronavirus disease 2019 (COVID-19), and Bangladesh is no difference. The pandemic has resulted in a decline in the availability of health care, notably for women's health problems, leading to an increase in difficulties for an increasingly marginalized group. Maternity care, maternal health programs, medical interventions, nutritional counseling and mental health care, are not discussed, and women's health and well-being in Bangladesh is vulnerable with a spike in domestic violence and needs to be resolved urgently.

Keywords: Covid-19, mental health, reproductive health, Bangladesh

Procedia PDF Downloads 141
880 A Study on the Effects of Urban Density, Sociodemographic Vulnerability, and Medical Service on the Impact of COVID-19

Authors: Jang-hyun Oh, Kyoung-ho Choi, Jea-sun Lee

Abstract:

The outbreak of the COVID-19 pandemic brought reconsiderations and doubts about urban density as compact cities became epidemic hot spots. Density, though, provides an upside in that medical services required to protect citizens against the spread of disease are concentrated within compact cities, which helps reduce the mortality rate. Sociodemographic characteristics are also a crucial factor in determining the vulnerability of the population, and the purpose of this study is to empirically discover how these three urban factors affect the severity of the epidemic impacts. The study aimed to investigate the influential relationships between urban factors and epidemic impacts and provide answers to whether superb medical service in compact cities can scale down the impacts of COVID-19. SEM (Structural Equation Modeling) was applied as a suitable research method for verifying interrelationships between factors based on theoretical grounds. The study accounted for 144 municipalities in South Korea during periods from the first emergence of COVID-19 to December 31st, 2022. The study collected data related to infection and mortality cases from each municipality, and it holds significance as primary research that enlightens the aspects of epidemic impact concerning urban settings and investigates for the first time the mediated effects of medical service. The result of the evaluation shows that compact cities are most likely to have lower sociodemographic vulnerability and better quality of medical service, while cities with low density contain a higher portion of vulnerable populations and poorer medical services. However, the quality of medical service had no significant influence in reducing neither the infection rate nor the mortality rate. Instead, density acted as the major influencing factor in the infection rate, while sociodemographic vulnerability was the major determinant of the mortality rate. Thus, the findings strongly paraphrase that compact cities, although with high infection rates, tend to have lower mortality rates due to less vulnerability in sociodemographics, Whereas death was more frequent in less dense cities due to higher portions of vulnerable populations such as the elderly and low-income classes. Findings suggest an important lesson for post-pandemic urban planning-intrinsic characteristics of urban settings, such as density and population, must be taken into account to effectively counteract future epidemics and minimize the severity of their impacts. Moreover, the study is expected to contribute as a primary reference material for follow-up studies that further investigate related subjects, including urban medical services during the pandemic.

Keywords: urban planning, sociodemographic vulnerability, medical service, COVID-19, pandemic

Procedia PDF Downloads 41
879 An Improved Many Worlds Quantum Genetic Algorithm

Authors: Li Dan, Zhao Junsuo, Zhang Wenjun

Abstract:

Aiming at the shortcomings of the Quantum Genetic Algorithm such as the multimodal function optimization problems easily falling into the local optimum, and vulnerable to premature convergence due to no closely relationship between individuals, the paper presents an Improved Many Worlds Quantum Genetic Algorithm (IMWQGA). The paper using the concept of Many Worlds; using the derivative way of parallel worlds’ parallel evolution; putting forward the thought which updating the population according to the main body; adopting the transition methods such as parallel transition, backtracking, travel forth. In addition, the algorithm in the paper also proposes the quantum training operator and the combinatorial optimization operator as new operators of quantum genetic algorithm.

Keywords: quantum genetic algorithm, many worlds, quantum training operator, combinatorial optimization operator

Procedia PDF Downloads 719
878 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 263