Search results for: national security strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10167

Search results for: national security strategy

8337 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability

Procedia PDF Downloads 65
8336 Tackling Corruption in Nigeria Using Social Studies and Other Agents of Socialization

Authors: Joshua Garba Dodo

Abstract:

Corruption has become endemic in Nigeria, affecting almost all facets of the society, thereby thwarting the effort of national development. The thrust of this paper, therefore, is to see how corruption can be brought to its barest minimum if not totally eradicated using social studies and other agents of socialization. In doing that, the paper defines the concepts of corruption, social studies, and socialization. Discourse on the causes of corruption and the effect on national development is made. The paper examines the role of social studies, family, and the mass media in tackling corruption. The paper also asserts that if an aggressive campaign is mounted by the mass media as a way of supporting the present government in her effort to solve the corruption problem in the country, it will help in changing the psyche of the citizenry about corruption. Finally, the paper recommends, among others, that families and communities should sanction their sons and daughters involved in corrupt practices if proven by a competent court of law.

Keywords: corruption, social studies, family, mass media, socialization

Procedia PDF Downloads 93
8335 Aerodynamics of Nature Inspired Turbine Blade Using Computational Simulation

Authors: Seung Ki Lee, Richard Kyung

Abstract:

In the airfoil analysis, as the camber is greater, the minimal angle of attack causing the stall and maximum lift force increases. The shape of the turbine blades is similar to the shape of the wings of planes. After major wars, many remarkable blade shapes are made through researches about optimal blade shape. The blade shapes developed by National Advisory Committee for Aeronautics, NACA, is well known. In this paper, using computational and numerical analysis, the NACA airfoils are analyzed. This research shows that the blades vary with their thickness, which thinner blades are expected to be better. There is no significant difference of coefficient of lift due to the difference in thickness, but the coefficient of drag increases as the thickness increases.

Keywords: blades, drag force, national advisory committee for aeronautics airfoils, turbine

Procedia PDF Downloads 226
8334 Coastal Adaptation to Climate Change: A Review of EU Tools, Legislation, National Strategies and Projects in the Mediterranean Basin

Authors: Dimitris Kokkinos, Panagiotis Prinos

Abstract:

In the last three decades, climate change has been studied extensively from scientific community, and its consequences are more than clear all around the world. Most countries have carried out a great effort to reduce global warming rates with the ratification and implementation of several international treaties. Moreover, many of them have already adopted national plans in order to adapt to climate change effects and mitigate human and economic losses. Coastal environments, with their inherent physical sensitivity, will face important challenges as a result of projected changes in climate conditions and hundreds of millions of people will be affected. Coastal zones are of high social and economic value and this research focuses on the Mediterranean basin, which is a densely populated and highly urbanized area. With 40% of its land used for human activity and the inevitability of the impacts of the climate change, it is obvious that some form of adaptation measures will be necessary. In this regard, the EU tools, policies and legislation concerning adaptation to climate change are presented. Additionally, the National Adaptation Strategies of State members of the Mediterranean basin are compared and analyzed concerning the coastal areas, along with an overview of projects and programs results focused on coastal issues at different spatial scales. The purpose of this research is to stress the differences between Mediterranean State members at methodologies implemented, to highlight the possible gaps in co-ordination and to emphasize on research initiatives that EU can build upon moving towards an integrated adaptation planning on a region-wide basis.

Keywords: coastal adaptation, Mediterranean Basin, climate change, coastal environments

Procedia PDF Downloads 308
8333 Introduction to Multi-Agent Deep Deterministic Policy Gradient

Authors: Xu Jie

Abstract:

As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decisionmaking problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security). By modeling the multi-job collaborative cryptographic service scheduling problem as a multiobjective optimized job flow scheduling problem, and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing, and effectively solves the problem of complex resource scheduling in cryptographic services.

Keywords: multi-agent reinforcement learning, non-stationary dynamics, multi-agent systems, cooperative and competitive agents

Procedia PDF Downloads 24
8332 Alvaro Siza’s Design Strategy: An Insight into Critical Regionalism

Authors: Rahmatollah Amirjani

Abstract:

By the emergence of the debate over the failure of Regionalism in the late 1970s, Critical Regional­ism was introduced as a different way to respond to the state of architecture in the post-war era. Critical Regionalism is most often understood as a discourse that not only mediates the language of modern architecture with the local cultures but also revives the relation between architecture and spectator as indexed by capitalism. Since the inception of Critical Regionalism, a large number of architectural practices have emerged around the globe; however, the work of the well-known Portuguese architect, Álvaro Siza, is considered as a unique case amongst works associated with the discourse of Critical Regionalism. This paper intends to respond to a number of questions, including; what are the origins of Critical Regionalism? How does Siza’s design strategy correspond to the thematic of Critical Regionalism? How does Siza recover the relation between object and subject in most of his projects? Using Siza’s housing project for the Malagueira district in Évora, Portugal, this article will attempt to answer these questions, and highlight Alvaro Siza’s design procedure which goes beyond the existing discourse of Critical Regionalism and contributes to our understanding of this practice.

Keywords: Alvaro Siza, critical regionalism, Malagueira housing, placelessness

Procedia PDF Downloads 180
8331 2-Dimensional Kinematic Analysis on Sprint Start with Sprinting Performance of Novice Athletes

Authors: Satpal Yadav, Biswajit Basumatary, Arvind S. Sajwan, Ranjan Chakravarty

Abstract:

The purpose of the study was to assess the effect of 2D kinematical selected variables on sprint start with sprinting performance of novice athletes. Six (3 National and 3 State level) athletes of sports authority of India, Guwahati has been selected for this study. The mean (M) and standard deviation (SD) of sprinters were age (17.44, 1.55), height (1.74m, .84m), weight (62.25 kg, 4.55), arm length (65.00 cm, 3.72) and leg length (96.35 cm, 2.71). Biokin-2D motion analysis system V4.5 can be used for acquiring two-dimensional kinematical data/variables on sprint start with Sprinting Performance. For the purpose of kinematic analysis a standard motion driven camera which frequency of the camera was 60 frame/ second i.e. handy camera of Sony Company were used. The sequence of photographic was taken under controlled condition. The distance of the camera from the athletes was 12 mts away and was fixed at 1.2-meter height. The result was found that National and State level athletes significant difference in there, trajectory knee, trajectory ankle, displacement knee, displacement ankle, linear velocity knee, linear velocity ankle, and linear acceleration ankle whereas insignificant difference was found between National and State level athletes in their linear acceleration knee joint on sprint start with sprinting performance. For all the Statistical test the level of significance was set at p<0.05.

Keywords: 2D kinematic analysis, sprinting performance, novice athletes, sprint start

Procedia PDF Downloads 323
8330 Interpretation of Heritage Revitalization

Authors: Jarot Mahendra

Abstract:

The primary objective of this paper is to provide a view in the interpretation of the revitalization of heritage buildings. This objective is achieved by analyzing the concept of interpretation that is oriented in the perspective of law, urban spatial planning, and stakeholder perspective, and then develops the theoretical framework of interpretation in the cultural resources management through issues of identity, heritage as a process, and authenticity in heritage. The revitalization of heritage buildings with the interpretation of these three issues is that interpretation can be used as a communication process to express the meaning and relation of heritage to the community so as to avoid the conflict that will arise and develop as a result of different perspectives of stakeholders. Using case studies in Indonesia, this study focuses on the revitalization of heritage sites in the National Gallery of Indonesia (GNI). GNI is a cultural institution that uses several historical buildings that have been designated as heritage and have not been designated as a heritage according to the regulations applicable in Indonesia, in carrying out its function as the center of Indonesian art development and art museums. The revitalization of heritage buildings is taken as a step to meet space needs in running the current GNI function. In the revitalization master plan, there are physical interventions on the building of heritage and the removal of some historic buildings which will then be built new buildings at that location. The research matrix was used to map out the main elements of the study (the concept of GNI revitalization, heritage as identity, heritage as a process, and authenticity in the heritage). Expert interviews and document studies are the main tools used in collecting data. Qualitative data is then analyzed through content analysis and template analysis. This study identifies the significance of historic buildings (heritage buildings and buildings not defined as heritage) as an important value of history, architecture, education, and culture. The significance becomes the basis for revisiting the revitalization master plan which is then reviewed according to applicable regulations and the spatial layout of Jakarta. The interpretation that is built is (1) GNI is one of the elements of the embodiment of the National Cultural Center in the context of the region, where there are National Monument, National Museum and National Library in the same area, so the heritage not only gives identity to the past culture but the culture of current community; (2) The heritage should be seen as a dynamic cultural process towards the cultural change of community, where heritage must develop along with the urban development, so that the heritage buildings can remain alive and side by side with modern buildings but still observe the principles of preservation of heritage; (3) The authenticity of heritage should be able to balance the cultural heritage conservation approach with urban development, where authenticity can serve as a 'Value Transmitter' so that authenticity can be used to evaluate, preserve and manage heritage buildings by considering tangible and intangible aspects.

Keywords: authenticity, culture process, identity, interpretation, revitalization

Procedia PDF Downloads 148
8329 Medical and Surgical Nursing Care

Authors: Nassim Salmi

Abstract:

Postoperative mobilization is an important part of fundamental care. Increased mobilization has a positive effect on recovery, but immobilization is still a challenge in postoperative care. Aims: To report how the establishment of a national nursing database was used to measure postoperative mobilization in patients undergoing surgery for ovarian cancer. Mobilization was defined as at least 3 hours out of bed on postoperative day 1, with the goal set at achieving this in 60% of patients. Clinical nurses on 4400 patients with ovarian cancer performed data entry. Findings: 46.7% of patients met the goal for mobilization on the first postoperative day, but variations in duration and type of mobilization were observed. Of those mobilized, 51.8% had been walking in the hallway. A national nursing database creates opportunities to optimize fundamental care. By comparing nursing data with oncological, surgical, and pathology data, it became possible to study mobilization in relation to cancer stage, comorbidity, treatment, and extent of surgery.

Keywords: postoperative care, gynecology, nursing documentation, database

Procedia PDF Downloads 116
8328 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic

Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato

Abstract:

Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.

Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security

Procedia PDF Downloads 369
8327 Need for a National Newborn Screening Programme in India: Pilot Study Data

Authors: Sudheer Moorkoth, Leslie Edward Lewis, Pragna Rao

Abstract:

Newborn screening (NBS) is a part of routine newborn care in many countries worldwide to detect early any rare treatable conditions and inborn errors of metabolism (IEM). India has not started this program yet. In an attempt to understand the challenges in implementing a national newborn screening program in India, we initiated a pilot newborn screening project funded by the Government of Canada. Along with initiating the newborn screening at Kasturba Hospital, Manipal in South India, for screening six disorders (Congenital Hypothyroidism(CH), Congenital Adrenal Hyperplasia (CAH), Galactosemia, Biotinidase deficiency, Glucose-6-Phosphate Dehydrogenase deficiency (G-6PD) and Phenylketonurea), we also studied the awareness of various stakeholders on the newborn screening. In a period of nine months from August 2017 to March 2018 we could screen 1915 newborns (999 male and 916 female). The result showed that there were seven babies screened positive. This interim result points to an incidence rate of 1 in 270 children for these rare disorders collectively. This includes three confirmed cases of CH, two cases of G-6PD deficiency, and one case each for Galctosemia and CAH. A questionnaire based study to understand the awareness among various stakeholders revealed that there is little awareness among parents, adolescents and anganwadi workers (public health worker). The interim data points to the need for a national newborn screening programme in India. There is also an immediate need to undertake large-scale awareness programme to create knowledge on NBS among the various stakeholders.

Keywords: awareness, inborn errors of metabolism (IEM), newborn screening, rare disease

Procedia PDF Downloads 249
8326 Feasibility Study for the Implementation of a Condition-Based Maintenance System in the UH-60 Helicopters

Authors: Santos Cabrera, Halbert Yesid, Moncada Nino, Alvaro Fernando, Rincon Cuta, Yeisson Alexis

Abstract:

The present work evaluates the feasibility of implementing a health and use monitoring system (HUMS), based on vibration analysis as a condition-based maintenance program for the UH60L 'Blackhawk' helicopters. The mixed approach used consists of contributions from national and international experts, the analysis of data extracted from the software (Meridium), the correlation of variables derived from the diagnosis of availability, the development, and application of the HUMS system, the evaluation of the latter through of the use of instruments designed for the collection of information using the DELPHI method and data capture with the device installed in the helicopter studied. The results obtained in the investigation reflect the context of maintenance in aerial operations, a reduction of operation and maintenance costs of over 2%, better use of human resources, improvement in availability (5%), and fulfillment of the aircraft’s security standards, enabling the implementation of the monitoring system (HUMS) in the condition-based maintenance program. New elements are added to the study of maintenance based on condition -specifically, in the determination of viability based on qualitative and quantitative data according to the methodology. The use of condition-based maintenance will allow organizations to adjust and reconfigure their strategic, logistical, and maintenance capabilities, aligning them with their strategic objectives of responding quickly and adequately to changes in the environment and operational requirements.

Keywords: air transportation sustainability, HUMS, maintenance based condition, maintenance blackhawk capability

Procedia PDF Downloads 157
8325 Evolution of Web Development Progress in Modern Information Technology

Authors: Abdul Basit Kiani

Abstract:

Web development, the art of creating and maintaining websites, has witnessed remarkable advancements. The aim is to provide an overview of some of the cutting-edge developments in the field. Firstly, the rise of responsive web design has revolutionized user experiences across devices. With the increasing prevalence of smartphones and tablets, web developers have adapted to ensure seamless browsing experiences, regardless of screen size. This progress has greatly enhanced accessibility and usability, catering to the diverse needs of users worldwide. Additionally, the evolution of web frameworks and libraries has significantly streamlined the development process. Tools such as React, Angular, and Vue.js have empowered developers to build dynamic and interactive web applications with ease. These frameworks not only enhance efficiency but also bolster scalability, allowing for the creation of complex and feature-rich web solutions. Furthermore, the emergence of progressive web applications (PWAs) has bridged the gap between native mobile apps and web development. PWAs leverage modern web technologies to deliver app-like experiences, including offline functionality, push notifications, and seamless installation. This innovation has transformed the way users interact with websites, blurring the boundaries between traditional web and mobile applications. Moreover, the integration of artificial intelligence (AI) and machine learning (ML) has opened new horizons in web development. Chatbots, intelligent recommendation systems, and personalization algorithms have become integral components of modern websites. These AI-powered features enhance user engagement, provide personalized experiences, and streamline customer support processes, revolutionizing the way businesses interact with their audiences. Lastly, the emphasis on web security and privacy has been a pivotal area of progress. With the increasing incidents of cyber threats, web developers have implemented robust security measures to safeguard user data and ensure secure transactions. Innovations such as HTTPS protocol, two-factor authentication, and advanced encryption techniques have bolstered the overall security of web applications, fostering trust and confidence among users. Hence, recent progress in web development has propelled the industry forward, enabling developers to craft innovative and immersive digital experiences. From responsive design to AI integration and enhanced security, the landscape of web development continues to evolve, promising a future filled with endless possibilities.

Keywords: progressive web applications (PWAs), web security, machine learning (ML), web frameworks, advancement responsive web design

Procedia PDF Downloads 54
8324 Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems

Authors: M. Mutemwa

Abstract:

A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC.

Keywords: cybersecurity operation centre, incident response, priority matrix, procedures and policies

Procedia PDF Downloads 153
8323 Relationships between Emotion Regulation Strategies and Well-Being Outcomes among the Elderly and Their Caregivers: A Dyadic Modeling Approach

Authors: Sakkaphat T. Ngamake, Arunya Tuicomepee, Panrapee Suttiwan, Rewadee Watakakosol, Sompoch Iamsupasit

Abstract:

Generally, 'positive' emotion regulation strategies such as cognitive reappraisal have linked to desirable outcomes while 'negative' strategies such as behavioral suppression have linked to undesirable outcomes. These trends have been found in both the elderly and professional practitioners. Hence, this study sought to investigate these trends further by examining the relationship between two dominant emotion regulation strategies in the literature (i.e., cognitive reappraisal and behavioral suppression) and well-being outcomes among the elderly (i.e., successful aging) and their caregivers (i.e., satisfaction with life), using the actor-partner interdependence model. A total of 150 elderly-caregiver dyads participated in the study. The elderly responded to two measures assessing the two emotion regulation strategies and successful aging while their caregivers responded to the same emotion regulation measure and a measure of satisfaction with life. Two criterion variables (i.e., successful aging and satisfaction with life) were specified as latent variables whereas four predictors (i.e., two strategies for the elderly and two strategies for their caregivers) were specified as observed variables in the model. Results have shown that, for the actor effect, the cognitive reappraisal strategy yielded positive relationships with the well-being outcomes for both the elderly and their caregivers. For the partner effect, a positive relationship between caregivers’ cognitive reappraisal strategy and the elderly’s successful aging was observed. The behavioral suppression strategy has not related to any well-being outcomes, within and across individual agents. This study has contributed to the literature by empirically showing that the mental activity of the elderly’s immediate environment such as their family members or close friends could affect their quality of life.

Keywords: emotion regulation, caregiver, older adult, well-being

Procedia PDF Downloads 425
8322 Russian ‘Active Measures’: An Applicable Supporting Tool for Russia`s Foreign Policy Objectives in the 21st Century

Authors: Håkon Riiber

Abstract:

This paper explores the extent to which Russian ‘Active Measures’ play a role in contemporary Russian foreign policy and in what way the legacy of the Soviet Union is still apparent in these practices. The analysis draws on a set of case studies from the 21st century to examine these aspects, showing which ‘Active Measures’ features are old and which are new in the post-Cold War era. The paper highlights that the topic has gained significant academic and political interest in recent years, largely due to the aggressive posture of the Russian Federation on the world stage, exemplified through interventions in Estonia, Georgia, and Ukraine and interference in several democratic elections in the West. However, the paper argues that the long-term impact of these measures may have unintended implications for Russia. While Russia is unlikely to stop using Active Measures, increased awareness of the exploitation of weaknesses, institutions, or other targets may lead to greater security measures and an ability to identify and defend against these activities. The paper contends that Soviet-style ‘Active Measures’ from the Cold War era have been modernized and are now utilized to create an advantageous atmosphere for further exploitation to support contemporary Russian foreign policy. It offers three key points to support this argument: the reenergized legacy of the Cold War era, the use of ‘Active Measures’ in a number of cases in the 21st century, and the applicability of AM to the Russian approach to foreign policy. The analysis reveals that while this is not a new Russian phenomenon, it is still oversimplified and inaccurately understood by the West, which may result in a decreased ability to defend against these activities and limit the unwarranted escalation of the ongoing security situation between the West and Russia. The paper concludes that the legacy of Soviet-era Active Measures continues to influence Russian foreign policy, and modern technological advances have only made them more applicable to the current political climate. Overall, this paper sheds light on the important issue of Russian ‘Active Measures’ and the role they play in contemporary Russian foreign policy. It emphasizes the need for increased awareness, understanding, and security measures to defend against these activities and prevent further escalation of the security situation between the West and Russia.

Keywords: Russian espionage, active measures, disinformation, Russian intelligence

Procedia PDF Downloads 103
8321 Ontological Modeling Approach for Statistical Databases Publication in Linked Open Data

Authors: Bourama Mane, Ibrahima Fall, Mamadou Samba Camara, Alassane Bah

Abstract:

At the level of the National Statistical Institutes, there is a large volume of data which is generally in a format which conditions the method of publication of the information they contain. Each household or business data collection project includes a dissemination platform for its implementation. Thus, these dissemination methods previously used, do not promote rapid access to information and especially does not offer the option of being able to link data for in-depth processing. In this paper, we present an approach to modeling these data to publish them in a format intended for the Semantic Web. Our objective is to be able to publish all this data in a single platform and offer the option to link with other external data sources. An application of the approach will be made on data from major national surveys such as the one on employment, poverty, child labor and the general census of the population of Senegal.

Keywords: Semantic Web, linked open data, database, statistic

Procedia PDF Downloads 175
8320 Inventory Larval Ectoparasites of Tomato Leafminer in National High School of Agriculture, Algeria

Authors: Khadidja Mahdi, Salaheddine Doumandji

Abstract:

Among the natural enemies that reduce populations of the tomato leaf miner studied in experimental plots of National High school of agriculture (ENSA, Algeria, 36° 40’ à 36° 43’ N.; 3° 08’ à 3° 12’ E.), larval ectoparasites. Three larval ectoparasites are reported in this study namely Necrinmus Sp. and two species of indeterminate Chalcidae (Chalcidae Sp. 1 and 2). These species have significantly reduced the effectives of Tuta absoluta. The results for the parasitism of eggs, larval instars and pupae of Tuta absoluta on the open field tomato in the experimental plots of ENSA show high levels of parasite eggs with 25%. With 94.7%, the first larval instar (L1) is the most parasites. The second instar (L2) undergoes the action of parasitoids least 60%. Instars L3 and L4 and pupae remain unharmed.

Keywords: tuta absoluta, larval ectoparasites, tomato, ensa, Algeria

Procedia PDF Downloads 278
8319 Sustainable Urban Resilience and Climate-Proof Urban Planning

Authors: Carmela Mariano

Abstract:

The literature, the scientific and disciplinary debate related to the impacts of climate change on the territory has highlighted, in recent years, the need for climate-proof and resilient tools of urban planning that adopt an integrated and inter-scalar approach for the construction of urban regeneration strategies by the objectives of the European Strategy on adaptation to climate change, the 2030 Agenda for Sustainable Development and the Climate Conference. This article addresses the operational implications of urban climate resilience in urban planning tools as a priority objective of policymakers (government bodies, institutions, etc.) to respond to the risks of climate change-related impacts on the environment. Within the general framework of the research activities carried out by the author, this article provides a critical synthesis of the analysis and evaluation of some case studies from the Italian national context, which enabled, through an inductive method, the assessment of the process of implementing the adaptation to climate change within the regional urban planning frameworks (regional urban laws), specific regional adaptation strategies or local adaptation plans and within the territorial and urban planning tools of a metropolitan or local scale. This study aims to identify theoretical–methodological, and operational references for the innovation and integration of planning tools concerning climate change that allow local planners to test these references in specific territorial contexts to practical adaptation strategies for local action.

Keywords: urban resilience, urban regeneration, climate-proof-planning, urban planning

Procedia PDF Downloads 18
8318 Marketing Planning Strategy to Promote Family Agro-Tourism: A Case Study of Bang Nam Phueng Community Prapradeang District, Samutprakarn Province

Authors: Sasitorn Chetanont, Benjaporn Yamjameung

Abstract:

The objectives of this study are to increase tourism products and to develop family agro-tourism. The research methodology was to analyze internal and external situations according to MP-MF and the MC-STEPS principles. The results of this study highlight following necessary improvements; extend the cycling routes, increase the number of bicycle rental shops, offer a recreation place for the elders, organize a space for the floating market products and increase tourism activities throughout the year. In ‘places or distribution channel’ we discuss the improvement of facilities, specifically the routes to facilitate elder visitors and visitors on wheelchairs and furthermore the arrangement of educational trips to relevant centers in the community. In ‘promotions’, we discuss the implementation of an 'all inclusive package' were the agro-tourism program, health-conscious program and the elderly fun program converge.

Keywords: marketing planning strategy, agro-tourism, promotions, Bang Nam Phueng

Procedia PDF Downloads 307
8317 Unaccompanied Children: An Overview on National and European Law

Authors: Cinzia Valente

Abstract:

Over the last few years, national legislators have been forced to deal with social changes that have had important repercussions in family law and children’s law. This growing focus on minors has provoked important reforms, specifically on issues relating to the welfare and protection of children. My presentation focuses on the issue of migrant children in particular I refer to unaccompanied children, or ‘children on the move’, or separate children or any other term defining migrant minors who cross national borders seeking protection or better opportunities. They arrive often illegally, on the European territory without a responsible adult who take care of them. There is a common assumption that migrants are running away from conflicts, poverty and human rights abuse and they arrive in a foreign country hoping a better life; children without persons who takes care of them encounter some difficulties in their integration in the host country. The migration flows recorded in recent decades towards EU countries, and Italy in particular, have imposed an intense pressure to modernize institutions, services and specific legal frameworks, with the aim of responding adequately to the needs of foreign individuals, as well as ensuring a good level of living standards and facilitating integration, especially for migrant children. The object of my paper is the analysis of the Italian rules, practices and services existing in favor of unaccompanied children (foster care, reunification, acquisition of citizenship and other) in comparison with other European legal systems on the same thematic with a comparative method. Highlighting European standards to find common principles for the best solution to children's problems is the conclusive aim of my presentation.

Keywords: Children , Family Law, Migration , Uniform Law

Procedia PDF Downloads 141
8316 World Agricultural Commodities Prices Dynamics and Volatilities Impacts on Commodities Importation and Food Security in West African Economic and Monetary Union Countries

Authors: Baoubadi Atozou, Koffi Akakpo

Abstract:

Since the decade 2000, the use of foodstuffs such as corn, wheat, and soybeans in biofuel production has been growing sharply in the United States, Canada, and Europe. Thus, prices for these agricultural products are rising in the world market. These cereals are the most important source of calorific energy for West African Economic and Monetary Union (WAEMU) countries members’ population. These countries are highly dependent on imports of most of these products. Thereby, rising prices can have an important impact on import levels and consequently on food security in these countries. This study aims to analyze the interrelationship between the prices of these commodities and their volatilities, and their effects on imports of these agricultural products by each WAEMU ’country member. The Autoregressive Distributed Lag (ARDL) model, the GARCH Multivariate model, and the Granger Causality Test are used in this investigation. The results show that import levels are highly and significantly sensitive to price changes as well as their volatility. In the short term as well as in the long term, there is a significant relationship between the prices of these products. There is a positive relationship in general between price volatility. And these volatilities have negative effects on the level of imports. The market characteristics affect food security in these countries, especially access to food for vulnerable and low-income populations. The policies makers must adopt viable strategies to increase agricultural production and limit their dependence on imports.

Keywords: price volatility, import of agricultural products, food safety, WAEMU

Procedia PDF Downloads 192
8315 A Qualitative Evidence of the Markedness of Code Switching during Commercial Bank Service Encounters in Ìbàdàn Metropolis

Authors: A. Robbin

Abstract:

In a multilingual setting like Nigeria, the success of service encounters is enhanced by the use of a language that ensures the linguistic and persuasive demands of the interlocutors. This study examined motivations for code switching as a negotiation strategy in bank-hall desk service encounters in Ìbàdàn metropolis using Myers-Scotton’s exploration on markedness in language use. The data consisted of transcribed audio recording of bank-hall service encounters, and direct observation of bank interactions in two purposively sampled commercial banks in Ìbàdàn metropolis. The data was subjected to descriptive linguistic analysis using Myers Scotton’s Markedness Model.  Findings reveal that code switching is frequently employed during different stages of service encounter: greeting, transaction and closing to fulfil relational, bargaining and referential functions. Bank staff and customers code switch to make unmarked, marked and explanatory choices. A strategy used to identify with customer’s cultural affiliation, close status gap, and appeal to begrudged customer; or as an explanatory choice with non-literate customers for ease of communication. Bankers select English to maintain customers’ perceptions of prestige which is retained or diverged from depending on their linguistic preference or ability.  Yoruba is seen as an efficient negotiation strategy with both bankers and their customers, making choices within conversation to achieve desired conversational and functional aims.

Keywords: banking, bilingualism, code-switching, markedness, service encounter

Procedia PDF Downloads 206
8314 Developing Medium Term Maintenance Plan For Road Networks

Authors: Helen S. Ghali, Haidy S. Ghali, Salma Ibrahim, Ossama Hosny, Hatem S. Elbehairy

Abstract:

Infrastructure systems are essential assets in any community; accordingly, authorities aim to maximize its life span while minimizing the life cycle cost. This requires studying the asset conditions throughout its operation and forming a cost-efficient maintenance strategy plan. The objective of this study is to develop a highway management system that provides medium-term maintenance plans with the minimum life cycle cost subject to budget constraints. The model is applied to data collected for the highway network in India with the aim to output a 5-year maintenance plan strategy from 2019 till 2023. The main element considered is the surface coarse, either rigid or flexible pavement. The model outputs a 5-year maintenance plan for each segment given the budget constraint while maximizing the new pavement condition rating and minimizing its life cycle cost.

Keywords: infrastructure, asset management, optimization, maintenance plan

Procedia PDF Downloads 218
8313 Treatment Outcome Of Corneal Ulcers Using Levofloxacin Hydrate 1.5% Ophthalmic Solution And Adjuvant Oral Ciprofloxacin, A Treatment Strategy Applicable To Primary Healthcare

Authors: Celine Shi Ying Lee, Jong Jian Lee

Abstract:

Background: Infectious keratitis is one of the leading causes of blindness worldwide. Prompt treatment with effective medication will control the infection early, preventing corneal scarring and visual loss. fluoroquinolones ophthalmic medication is used because of its broad-spectrum properties, potency, good intraocular penetration, and low toxicity. The study aims to evaluate the treatment outcome of corneal ulcers using Levofloxacin 1.5% ophthalmic solution (LVFX) with adjuvant oral ciprofloxacin when indicated and apply this treatment strategy in primary health care as first-line treatment. Methods: Patients with infective corneal ulcer treated in an eye center were recruited. Inclusion criteria includes Corneal infection consistent with bacterial keratitis, single or multiple small corneal ulcers. Treatment regime: LVFX hourly for the first 2 days, 2 hourly from the 3rd day, and 3 hourly on the 5th day of review. Adjuvant oral ciprofloxacin 500mg BD was administered for 5 days if there were multiple corneal ulcers or when the location of the cornea ulcer was central or paracentral. Results: 47 subjects were recruited. There were 16 (34%) males and 31 (66%) females. 40 subjects (85%) were contact lens (CL) related to corneal ulcer, and 7 subjects (15%) were non-contact lens related. 42 subjects (89%) presented with one ulcer, of which 20 of them (48%) needed adjuvant therapy. 5 subjects presented with 2 or 3 ulcers, of which 3 needed adjuvant therapy. A total of 23 subjects (49%) was given adjuvant therapy (oral ciprofloxacin 500mg BD for 5 days).21 of them (91%) were CL related. All subjects recovered fully, and the average duration of treatment was 3.7 days, with 49% of the subjects resolved on the 3rd day, 38% on the 5thday of and 13% on the 7thday. All subjects showed symptoms of relief of pain, light-sensitivity, and redness on the 3rd day with full visual recovery post-treatment. No adverse drug reactions were recorded. Conclusion: Our treatment regime demonstrated good clinical outcome as first-line treatment for corneal ulcers. A corneal ulcer is a common eye condition in Singapore, mainly due to CL wear. Pseudomonas aeruginosa is the most frequent and potentially sight-threatening pathogen involved in CL related corneal ulcer. Coagulase-negative Staphylococci, Staphylococcus aureus, and Streptococcus Pneumoniae were seen in non-CL users. All these bacteria exhibit good sensitivity rates to ciprofloxacin and levofloxacin. It is therefore logical in our study to use LVFX Eyedrops and adjuvant ciprofloxacin oral antibiotics when indicated as first line treatment for most corneal ulcers. Our study of patients, both CL related and non-CL related, have shown good clinical response and full recovery using the above treatment strategy. There was also a full restoration of visual acuity in all the patients. Eye-trained primary Healthcare practitioners can consider adopting this treatment strategy as first line treatment in patients with corneal ulcers. This is relevant during the COVID pandemic, where hospitals are overwhelmed with patients and in regions with limited access to specialist eye care. This strategy would enable early treatment with better clinical outcome.

Keywords: corneal ulcer, levofloxacin hydrate, treatment strategy, ciprofloxacin

Procedia PDF Downloads 175
8312 Control of Stability for PV and Battery Hybrid System in Partial Shading

Authors: Weiying Wang, Qi Li, Huiwen Deng, Weirong Chen

Abstract:

The abrupt light change and uneven illumination will make the PV system get rid of constant output power, which will affect the efficiency of the grid connected inverter as well as the stability of the system. To solve this problem, this paper presents a strategy to control the stability of photovoltaic power system under the condition of partial shading of PV array, leading to constant power output, improving the capacity of resisting interferences. Firstly, a photovoltaic cell model considering the partial shading is established, and the backtracking search algorithm is used as the maximum power point to track algorithm under complex illumination. Then, the energy storage system based on the constant power control strategy is used to achieve constant power output. Finally, the effectiveness and correctness of the proposed control method are verified by the joint simulation of MATLAB/Simulink and RTLAB simulation platform.

Keywords: backtracking search algorithm, constant power control, hybrid system, partial shading, stability

Procedia PDF Downloads 297
8311 An Assessment of Involuntary Migration in India: Understanding Issues and Challenges

Authors: Rajni Singh, Rakesh Mishra, Mukunda Upadhyay

Abstract:

India is among the nations born out of partition that led to one of the greatest forced migrations that marked the past century. The Indian subcontinent got partitioned into two nation-states, namely India and Pakistan. This led to an unexampled mass displacement of people accounting for about 20 million in the subcontinent as a whole. This exemplifies the socio-political version of displacement, but there are other identified reasons leading to human displacement viz., natural calamities, development projects and people-trafficking and smuggling. Although forced migrations are rare in incidence, they are mostly region-specific and a very less percentage of population appears to be affected by it. However, when this percentage is transcripted in terms of volume, the real impact created by such migration can be realized. Forced migration is thus an issue related to the lives of many people and requires to be addressed with proper intervention. Forced or involuntary migration decimates peoples' assets while taking from them their most basic resources and makes them migrate without planning and intention. This in most cases proves to be a burden on the destination resources. Thus, the question related to their security concerns arise profoundly with regard to the protection and safeguards to these migrants who need help at the place of destination. This brings the human security dimension of forced migration into picture. The present study is an analysis of a sample of 1501 persons by NSSO in India (National Sample Survey Organisation), which identifies three reasons for forced migration- natural disaster, social/political problem and displacement by development projects. It was observed that, of the total forced migrants, about 4/5th comprised of the internally displaced persons. However, there was a huge inflow of such migrants to the country from across the borders also, the major contributing countries being Bangladesh, Pakistan, Sri Lanka, Gulf countries and Nepal. Among the three reasons for involuntary migration, social and political problem is the most prominent in displacing huge masses of population; it is also the reason where the share of international migrants to that of internally displaced is higher compared to the other two factors /reasons. Second to political and social problems, natural calamities displaced a high portion of the involuntary migrants. The present paper examines the factors which increase people's vulnerability to forced migration. On perusing the background characteristics of the migrants it was seen that those who were economically weak and socially fragile are more susceptible to migration. Therefore, getting an insight about this fragile group of society is required so that government policies can benefit these in the most efficient and targeted manner.

Keywords: involuntary migration, displacement, natural disaster, social and political problem

Procedia PDF Downloads 354
8310 A Legal Opinion on Mitigation and Adaptation on Air Pollution Strategies for Local Governments in South Africa

Authors: Marjone Van Der Bank, C. M. Van Der Bank

Abstract:

This paper presents an overview of the foundation and evolution of environmental related problems in local governments with specific reference on air pollution in South Africa. Local government has a direct mandate in terms of the Constitution of the Republic of South Africa, 1996 (hereafter, the Constitution). This mandate to protect, fulfil, respect and promote the Bill of Rights by local governments in respect of the powers and functions creates confusion around the role of where a local government fits in, in addressing the problem of climate change in South Africa. A reflection of the evolving legislations, developments, and processes regarding climate change that shaped local government dispensation in South Africa is addressed by the notion of developmental local governments. This paper seeks to examine the advances for mitigation and adaptation regulation of air pollution and application in South Africa. This study involves a qualitative approach that will involve South African national legislation as well as an interpretation of international strategies. A literature review study was conducted to undertake the various aspects of law in order to support the argument undertaken of mitigation and adaptation strategies. The paper presents a detailed discussion of the current legislation and the position as it currently stands, as well as the relevant protections as outlined in the National Environmental Management Act and the National Environmental Management: Air Quality Act. It then proceeds to outline the responsibilities of local governments in South Africa to mitigate and adapt to air pollution strategies.

Keywords: adaptation, climate change, disaster, local governments and mitigation

Procedia PDF Downloads 143
8309 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 150
8308 Parallel Tracking and Mapping of a Fleet of Quad-Rotor

Authors: M. Bazin, I. Bouguir, D. Combe, V. Germain, G. Lassade

Abstract:

The problem of managing a fleet of quad-rotor drones in a completely unknown environment is analyzed in the present paper. This work is following the footsteps of other studies about how should be managed the movements of a swarm of elements that have to stay gathered throughout their activities. In this paper we aim to demonstrate the limitations of a system where absolutely all the calculations and physical movements of our elements are done by one single external element. The strategy of control is an adaptive approach which takes into account the explored environment. This is made possible thanks to a set of command rules which can guide the drones through various missions with defined goal. The result of the mission is independent of the nature of environment and the number of drones in the fleet. This strategy is based on a simultaneous usage of different data: obstacles positions, real-time positions of all drones and relative positions between the different drones. The present work is made with the Robot Operating System and used several open-source projects on localization and usage of drones.

Keywords: cooperative guidance, distributed control, unmanned aerial vehicle, obstacle avoidance

Procedia PDF Downloads 304