Search results for: security risk
6600 The Correlation of Environmental Risk Factors with Malaria at Tasikmalaya District, 2013
Authors: Destriyanti Sugiarti, Ririn A Wulandari
Abstract:
Background: Malaria disease was widespread in many countries, both tropical and sub-tropical. Tasikmalaya is a region that experienced an increase in malaria cases over the last 5 years and highest in 2013, a total of 168 positive cases of malaria. Tasikmalaya region consists of coastal and mountain areas, it has a potential place for Anopheles mosquito breeding, i.e swamp, lagoon, andrice fields.The purpose of this study was to determine the correlation of environmental risk factors with the incidence of malaria in Tasikmalaya. Methods: The design of the study is case control study with 140 samples in 5 sub-district (Cineam, Cikatomas, Cipatujah, Salopa, and Jatiwaras). This study examines the environmental factors that influence the incidence of malaria in Tasikmalaya District in 2013. The research used 14 variables: individual characteristics (education, knowledge, occupation) and environmental risk factors (mobility to endemic areas, use mosquito nets, use of wire gauze at home, use mosquito repellent, repellent use, the presence of a large animal in a cage, breeding place, the presence of larvae, temperature and humidity chamber). Results: Results demonstrated an association between occupation (0.22; 0.10-0.47), the mobility of the population to the endemic areas (37.4; 14.29-98.18) ,the presence of larvae (5.26; 1.41-19.74), and the room temperature with optimum temperature for mosquito breeding is 25-30oC (3.25; 1.62- 6.50). Conclusion: The dominant factor affecting the spread of malaria in Tasikmalaya is the mobility of the population to endemic areas. The results of the study suggest migration survey conducted activity and health promotion for preventive efforts against malaria in malaria-endemic areas, and to encourage people to behave healthy life by freeing environment of mosquito larvae and protect themselves from mosquito bites.Keywords: Environmental risk factors, malaria, correlation, Anopheles
Procedia PDF Downloads 4406599 Spatial Pattern and Predictors of Malaria in Ethiopia: Application of Auto Logistics Spatial Regression
Authors: Melkamu A. Zeru, Yamral M. Warkaw, Aweke A. Mitku, Muluwerk Ayele
Abstract:
Introduction: Malaria is a severe health threat in the World, mainly in Africa. It is the major cause of health problems in which the risk of morbidity and mortality associated with malaria cases are characterized by spatial variations across the county. This study aimed to investigate the spatial patterns and predictors of malaria distribution in Ethiopia. Methods: A weighted sample of 15,239 individuals with rapid diagnosis tests was obtained from the Central Statistical Agency and Ethiopia malaria indicator survey of 2015. Global Moran's I and Moran scatter plots were used in determining the distribution of malaria cases, whereas the local Moran's I statistic was used in identifying exposed areas. In data manipulation, machine learning was used for variable reduction and statistical software R, Stata, and Python were used for data management and analysis. The auto logistics spatial binary regression model was used to investigate the predictors of malaria. Results: The final auto logistics regression model reported that male clients had a positive significant effect on malaria cases as compared to female clients [AOR=2.401, 95 % CI: (2.125 - 2.713)]. The distribution of malaria across the regions was different. The highest incidence of malaria was found in Gambela [AOR=52.55, 95%CI: (40.54-68.12)] followed by Beneshangul [AOR=34.95, 95%CI: (27.159 - 44.963)]. Similarly, individuals in Amhara [AOR=0.243, 95% CI:(0.1950.303],Oromiya[AOR=0.197,95%CI:(0.1580.244)],DireDawa[AOR=0.064,95%CI(0.049-0.082)],AddisAbaba[AOR=0.057,95%CI:(0.044-0.075)], Somali[AOR=0.077,95%CI:(0.059-0.097)], SNNPR[OR=0.329, 95%CI: (0.261- 0.413)] and Harari [AOR=0.256, 95%CI:(0.201 - 0.325)] were less likely to had low incidence of malaria as compared with Tigray. Furthermore, for a one-meter increase in altitude, the odds of a positive rapid diagnostic test (RDT) decrease by 1.6% [AOR = 0.984, 95% CI :( 0.984 - 0.984)]. The use of a shared toilet facility was found as a protective factor for malaria in Ethiopia [AOR=1.671, 95% CI: (1.504 - 1.854)]. The spatial autocorrelation variable changes the constant from AOR = 0.471 for logistic regression to AOR = 0.164 for auto logistics regression. Conclusions: This study found that the incidence of malaria in Ethiopia had a spatial pattern that is associated with socio-economic, demographic, and geographic risk factors. Spatial clustering of malaria cases had occurred in all regions, and the risk of clustering was different across the regions. The risk of malaria was found to be higher for those who live in soil floor-type houses as compared to those who live in cement or ceramics floor type. Similarly, households with thatched, metal and thin, and other roof-type houses have a higher risk of malaria than ceramic tiles roof houses. Moreover, using a protected anti-mosquito net reduced the risk of malaria incidence.Keywords: malaria, Ethiopia, auto logistics, spatial model, spatial clustering
Procedia PDF Downloads 336598 Analysis of Delay Causes in Construction Projects in Saudi Arabia
Authors: Ibrahim Mahamid, A. Al-Ghonamy, M. Aichouni
Abstract:
This study aims at identifying the risk matrix for delay causes in construction projects in Saudi Arabia from consultants’ viewpoint. A questionnaire survey was undertaken of 51 consultants working on construction projects in the Northern Province of Saudi Arabia. 35 delay causes were identified through a literature review. The study concluded that the top delay causes in construction projects in Saudi Arabia from consultants’ perspective are: bid award for lowest price, changes in material types and specifications during construction, contract management, duration of contract period, fluctuation of prices of materials, frequent changes in design, improper planning, inflationary pressure, lack of adequate manpower, long period of design and time of implementation, payments delay, poor labor productivity, and rework.Keywords: delays, construction, consultants, contributors, risk map
Procedia PDF Downloads 5396597 Organization of the Purchasing Function for Innovation
Authors: Jasna Prester, Ivana Rašić Bakarić, Božidar Matijević
Abstract:
Various prominent scholars and substantial practitioner-oriented literature on innovation orientation have shown positive effects on firm performance. There is a myriad of factors that influence and enhance innovation but it has been found in the literature that new product innovations accounted for an average of 14 percent of sales revenues for all firms. If there is one thing that has changed in innovation management during the last decade, it is the growing reliance on external partners. As a consequence, a new task for purchasing arises, as firms need to understand which suppliers actually do have high potential contributing to the innovativeness of the firm and which do not. Purchasing function in an organization is extremely important as it deals on an average of 50% or more of a firm's expenditures. In the nineties the purchasing department was largely seen as a transaction-oriented, clerical function but today purchasing integration provides a formal interface mechanism between purchasing and other firm functions that services other functions within the company. Purchasing function has to be organized differently to enable firm innovation potential. However, innovations are inherently risky. There are behavioral risk (that some partner will take advantage of the other party), technological risk in terms of complexity of products and processes of manufacturing and incoming materials and finally market risks, which in fact judge the value of the innovation. These risks are investigated in this work since it has been found in the literature that the higher the technological risk, higher will be the centralization of the purchasing function as an interface with other supply chain members. Most researches on organization of purchasing function were done by case study analysis of innovative firms. This work actually tends to prove or discard results found in the literature based on case study method. A large data set of 1493 companies, from 25 countries collected in the GMRG 4 survey served as a basis for analysis.Keywords: purchasing function organization, innovation, technological risk, GMRG 4 survey
Procedia PDF Downloads 4816596 Defining and Measuring the Success of the Hospitality-Based Social Enterprise Ringelblum Café
Authors: Nitzan Winograd, Nada Kakabadse
Abstract:
This study examines whether the hospitality-based social enterprise Ringelblum Café is achieving its stated social goals of developing a sense of self-efficacy among at-risk youth who work in this enterprise and raising levels of recruitment to the Israel Defence Forces (IDF) and National Service (NS) among these young adults. Ringelblum Café was founded in 2009 in Be'er-Sheva in order to provide employment solutions for at-risk youth in the southern district of Israel. Each year, 10 at-risk young adults aged 16–18 are referred to the programme by various welfare agencies. The training programme is approximately a year in duration and includes professional training in the art of cooking. Each young adult is also supported by a social worker. This study is based on the participation of 31 youths who graduated from the Ringelblum Café’s training programme. A convenience sampling model was used with the assistance of the programme's social worker. This study is quantitative in its approach. Data was collected by means of three separate self-reported questionnaires: a personal information questionnaire collected general demographics data; a self-efficacy questionnaire consisted of two parts: general self-efficacy and social self-efficacy; and an IDS/NS recruitment questionnaire. The study uses the theory of change in order to find out whether at-risk youth in the Ringelblum Café programme are taught a profession with future prospects, as well as whether they develop a sense of self-efficacy and raise their chances of recruitment into the IDF/NS. The study found that the sense of self-efficacy of the graduates is relatively high. In addition, there was a significant difference between the importance of recruitment to the IDF/NS among these youth prior to the beginning of the programme and after its completion, indicating that the training programme had a positive effect on motivation for recruitment to the IDF/NS. The study also found that the percentage of recruits to the IDF/NS among youth who graduated from the training programme were not significantly higher than the general recruitment figures in Israel. In conclusion, Ringelblum Café is making sound progress towards achieving its social goals regarding recruitment to the IDF/NS. Moreover, the sense of self-efficacy among the graduates is relatively high, and it can be assumed that the training programme has a positive effect on these young adults, although there is no clear connection between the two. This study is among a few that have been conducted in the field of hospitality-based social enterprises in Israel and can serve as a basis for further research. Moreover, the study results may help improve the perception of at-risk youth and their contribution to society and could increase awareness of the growing trend of social enterprises promoting social goals.Keywords: at-risk youth, Israel Defence Forces (IDF), national service, recruitment, self-efficacy, social enterprise
Procedia PDF Downloads 2146595 Malignancy in Venous Thromboembolism
Authors: Naser Shagerdi Esmaeli, Mohsen Hamidpour
Abstract:
Purposes: The activation of coagulation in patients with cancer contributes significantly to morbidity and mortality rates and may play a fundamental role in the host response to growing tumor’s. Patients with cancer are clearly at high risk for the development of venous thromboembolism (VTE), particularly during chemotherapy and surgery. This situation is aggravated by the use of venous access catheters and possibly growth factors. Methods: Data derived from large, randomized, controlled trials have been used to determine the true incidence of this complication of cancer and its treatment. The incidence based on the analyses of these randomized controlled trials varies from 1% for limited stage patients with breast cancer treated with tamoxifen to 60% for patients with any type of cancer who are subjected to orthopedic surgery and do not receive prophylactic therapy. Results: In view of the morbidity and mortality attributable to VTE in cancer, widespread utilization of prophylactic anticoagulation therapy, which has proven safe and effective in a variety of situations, should be considered. While migratory thrombophlebitis is a clear indicator of an underlying neoplasm, the risk of cancer in patients with the more typical form of VTE has been the subject of intense debate over recent years. Conclusion: Some investigators have suggested that the relative risk of being diagnosed with occult cancer within six months of an episode of VTE (particularly recurrent VTE) could be up to 10-fold. However, the cost-effectiveness of aggressive screening for cancer in patients with VTE has not yet been defined adequately.Keywords: venous thromboembolism, malignancy, cancer, tumor, heparin
Procedia PDF Downloads 936594 Health Promotion Programs for Fifteen Years Decreased Loneliness and Increased Happiness for Elementary School Children in Yuzawa Town, Japan
Authors: Takeo Shibata, Arihito Endo, Chika Hiraga, Akemi Kunimatsu, Yoko Shimizu
Abstract:
Introduction: A health promotion program, Yuzawa family health plan, was initiated in 2002. It has been held for fifteen years. Yuzawa Town is famous with hot springs and ski resorts. We evaluated the changes in mental status in elementary school children. Methods: questionnaires survey had been held every five years. 196 questionnaires were corrected (94 boys and 102 girls). Changes for their anxieties, loneliness, confiding, problem-solving, risk breaching, communications, happiness, and life satisfaction were evaluated by chi-square test. Results: The rate of loneliness and life dissatisfactions decreased. The rates of happiness, confiding in grandparents, and risk breaching, increased. Especially, happiness rates increased for boys, loneliness rate decreased for girls, confiding in grandparents and risk breaching rate increased for girls. Conclusion: Our health promotion programs could increase mental health status in elementary school children.Keywords: health promotion, mental status, elementary school, loneliness, happiness
Procedia PDF Downloads 2746593 The Lethal Autonomy and Military Targeting Process
Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk
Abstract:
The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)
Procedia PDF Downloads 4276592 Blockchain in Saudi E-Government: A Systematic Literature Review
Authors: Haitham Assiri, Priyadarsi Nanda
Abstract:
The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.Keywords: blockchain, data integrity, e-government, security threats
Procedia PDF Downloads 2486591 Food Security in Germany: Inclusion of the Private Sector through Law Reform Faces Challenges
Authors: Agnetha Schuchardt, Jennifer Hartmann, Laura Schulte, Roman Peperhove, Lars Gerhold
Abstract:
If critical infrastructures fail, even for a short period of time, it can have significant negative consequences for the affected population. This is especially true for the food sector that is strongly interlinked with other sectors like the power supply. A blackout could lead to several cities being without food supply for numerous days, simply because cash register systems do no longer work properly. Following the public opinion, securing the food supply in emergencies is considered a task of the state, however, in the German context, the key players are private enterprises and private households. Both are not aware of their responsibility and both cannot be forced to take any preventive measures prior to an emergency. This problem became evident to officials and politicians so that the law covering food security was revised in order to include private stakeholders into mitigation processes. The paper will present a scientific review of governmental and regulatory literature. The focus is the inclusion of the food industry through a law reform and the challenges that still exist. Together with legal experts, an analysis of regulations will be presented that explains the development of the law reform concerning food security and emergency storage in Germany. The main findings are that the existing public food emergency storage is out-dated, insufficient and too expensive. The state is required to protect food as a critical infrastructure but does not have the capacities to live up to this role. Through a law reform in 2017, new structures should to established. The innovation was to include the private sector into the civil defense concept since it has the required knowledge and experience. But the food industry is still reluctant. Preventive measures do not serve economic purposes – on the contrary, they cost money. The paper will discuss respective examples like equipping supermarkets with emergency power supply or self-sufficient cash register systems and why the state is not willing to cover the costs of these measures, but neither is the economy. The biggest problem with the new law is that private enterprises can only be forced to support food security if the state of emergency has occurred already and not one minute earlier. The paper will cover two main results: the literature review and an expert workshop that will be conducted in summer 2018 with stakeholders from different parts of the food supply chain as well as officials of the public food emergency concept. The results from this participative process will be presented and recommendations will be offered that show how the private economy could be better included into a modern food emergency concept (e. g. tax reductions for stockpiling).Keywords: critical infrastructure, disaster control, emergency food storage, food security, private economy, resilience
Procedia PDF Downloads 1856590 PUF-Based Lightweight Iot Secure Authentication Chip Design
Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He
Abstract:
This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.Keywords: PUF, IoT, authentication, secure communication, encryption, XOR
Procedia PDF Downloads 1406589 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy
Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi
Abstract:
Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.Keywords: terrorism, economy, Boko Haram, Nigeria
Procedia PDF Downloads 2586588 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce
Authors: Neelima Rashmi Lakra
Abstract:
India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.Keywords: public sectors, social justice, social security schemes, trade union movement
Procedia PDF Downloads 4506587 ChaQra: A Cellular Unit of the Indian Quantum Network
Authors: Shashank Gupta, Iteash Agarwal, Vijayalaxmi Mogiligidda, Rajesh Kumar Krishnan, Sruthi Chennuri, Deepika Aggarwal, Anwesha Hoodati, Sheroy Cooper, Ranjan, Mohammad Bilal Sheik, Bhavya K. M., Manasa Hegde, M. Naveen Krishna, Amit Kumar Chauhan, Mallikarjun Korrapati, Sumit Singh, J. B. Singh, Sunil Sud, Sunil Gupta, Sidhartha Pant, Sankar, Neha Agrawal, Ashish Ranjan, Piyush Mohapatra, Roopak T., Arsh Ahmad, Nanjunda M., Dilip Singh
Abstract:
Major research interests on quantum key distribution (QKD) are primarily focussed on increasing 1. point-to-point transmission distance (1000 Km), 2. secure key rate (Mbps), 3. security of quantum layer (device-independence). It is great to push the boundaries on these fronts, but these isolated approaches are neither scalable nor cost-effective due to the requirements of specialised hardware and different infrastructure. Current and future QKD network requires addressing different sets of challenges apart from distance, key rate, and quantum security. In this regard, we present ChaQra -a sub-quantum network with core features as 1) Crypto agility (integration in the already deployed telecommunication fibres), 2) Software defined networking (SDN paradigm for routing different nodes), 3) reliability (addressing denial-of-service with hybrid quantum safe cryptography), 4) upgradability (modules upgradation based on scientific and technological advancements), 5) Beyond QKD (using QKD network for distributed computing, multi-party computation etc). Our results demonstrate a clear path to create and accelerate quantum secure Indian subcontinent under the national quantum mission.Keywords: quantum network, quantum key distribution, quantum security, quantum information
Procedia PDF Downloads 536586 Association between Polygenic Risk of Alzheimer's Dementia, Brain MRI and Cognition in UK Biobank
Authors: Rachana Tank, Donald. M. Lyall, Kristin Flegal, Joey Ward, Jonathan Cavanagh
Abstract:
Alzheimer’s research UK estimates by 2050, 2 million individuals will be living with Late Onset Alzheimer’s disease (LOAD). However, individuals experience considerable cognitive deficits and brain pathology over decades before reaching clinically diagnosable LOAD and studies have utilised gene candidate studies such as genome wide association studies (GWAS) and polygenic risk (PGR) scores to identify high risk individuals and potential pathways. This investigation aims to determine whether high genetic risk of LOAD is associated with worse brain MRI and cognitive performance in healthy older adults within the UK Biobank cohort. Previous studies investigating associations of PGR for LOAD and measures of MRI or cognitive functioning have focused on specific aspects of hippocampal structure, in relatively small sample sizes and with poor ‘controlling’ for confounders such as smoking. Both the sample size of this study and the discovery GWAS sample are bigger than previous studies to our knowledge. Genetic interaction between loci showing largest effects in GWAS have not been extensively studied and it is known that APOE e4 poses the largest genetic risk of LOAD with potential gene-gene and gene-environment interactions of e4, for this reason we also analyse genetic interactions of PGR with the APOE e4 genotype. High genetic loading based on a polygenic risk score of 21 SNPs for LOAD is associated with worse brain MRI and cognitive outcomes in healthy individuals within the UK Biobank cohort. Summary statistics from Kunkle et al., GWAS meta-analyses (case: n=30,344, control: n=52,427) will be used to create polygenic risk scores based on 21 SNPs and analyses will be carried out in N=37,000 participants in the UK Biobank. This will be the largest study to date investigating PGR of LOAD in relation to MRI. MRI outcome measures include WM tracts, structural volumes. Cognitive function measures include reaction time, pairs matching, trail making, digit symbol substitution and prospective memory. Interaction of the APOE e4 alleles and PGR will be analysed by including APOE status as an interaction term coded as either 0, 1 or 2 e4 alleles. Models will be adjusted partially for adjusted for age, BMI, sex, genotyping chip, smoking, depression and social deprivation. Preliminary results suggest PGR score for LOAD is associated with decreased hippocampal volumes including hippocampal body (standardised beta = -0.04, P = 0.022) and tail (standardised beta = -0.037, P = 0.030), but not with hippocampal head. There were also associations of genetic risk with decreased cognitive performance including fluid intelligence (standardised beta = -0.08, P<0.01) and reaction time (standardised beta = 2.04, P<0.01). No genetic interactions were found between APOE e4 dose and PGR score for MRI or cognitive measures. The generalisability of these results is limited by selection bias within the UK Biobank as participants are less likely to be obese, smoke, be socioeconomically deprived and have fewer self-reported health conditions when compared to the general population. Lack of a unified approach or standardised method for calculating genetic risk scores may also be a limitation of these analyses. Further discussion and results are pending.Keywords: Alzheimer's dementia, cognition, polygenic risk, MRI
Procedia PDF Downloads 1126585 Quantification of Size Segregated Particulate Matter Deposition in Human Respiratory Tract and Health Risk to Residents of Glass City
Authors: Kalpana Rajouriya, Ajay Taneja
Abstract:
The objective of the present study is to investigate the regional and lobar deposition of size-segregated PM in respiratory tract of human body. PM in different fractions is monitored using the Grimm portable environmental dust monitor during winter season in Firozabad; a Glass city of India. PM10 concentration (200.817g/m³) was 4.46 and 2.0 times higher than the limits prescribed by WHO (45g/m⁻³) and NAAQS (100g/m⁻³) government agencies. PM2.5 concentration (83.538 g/m3) was 5.56 and 1.39 times higher from WHO (15g/m-3) and NAAQS (60g/m⁻³) limits. Results inferred that PM10 and PM2.5 was highest deposited in head region (0.3477-0.5622 & 0.366-0.4704) followed by pulmonary region, especially in the 9-21year old persons. The variation in deposition percentage in our study is mainly due to the airway geometry, PM size, and its deposition mechanisms. The coarse fraction, due to its large size, cannot follow the airway path and mostly gets deposited by inertial impaction in the head region and its bifurcations. The present study results inferred that Coarse and fine PM deposition was highly visualized in 9 (8.45610⁻⁴ g, 2.91110⁻⁴g) year and 3 (1.49610⁻⁴ g, 8.59310⁻⁵g) month age category. So, the 9year children and 3month infants category have high level of health risk.Keywords: particulate matter, MPPD model, regional deposition, lobar deposition, health risk
Procedia PDF Downloads 606584 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1106583 Geotechnical-Environmental Risk Assessment in Iranian Healthcare Centers
Authors: Maryam Siyami
Abstract:
Nowadays, one of the major environmental challenges is hospital waste, which, due to the presence of hazardous, toxic, and infectious agents, is of particular concern. The expansion of cities and population growth has significantly accelerated the establishment of various healthcare institutions. In this paper, the geotechnical-environmental risks in healthcare centers have been examined. The Iranian Leopold Matrix method was used to analyze the data. According to the study results, the greatest impact was related to socio-economic, environmental factors, particularly waste and wastewater management. Additionally, the most significant geotechnical-environmental risks at hospital were hospital hazardous waste, chemicals, and waste disposal. In conclusion, the most beneficial geotechnical-environmental measures were determined to be wastewater collection, waste collection, and recycling.Keywords: risk, geotechnics, environment, Leopold Matrix
Procedia PDF Downloads 196582 Injury Prediction for Soccer Players Using Machine Learning
Authors: Amiel Satvedi, Richard Pyne
Abstract:
Injuries in professional sports occur on a regular basis. Some may be minor, while others can cause huge impact on a player's career and earning potential. In soccer, there is a high risk of players picking up injuries during game time. This research work seeks to help soccer players reduce the risk of getting injured by predicting the likelihood of injury while playing in the near future and then providing recommendations for intervention. The injury prediction tool will use a soccer player's number of minutes played on the field, number of appearances, distance covered and performance data for the current and previous seasons as variables to conduct statistical analysis and provide injury predictive results using a machine learning linear regression model.Keywords: injury predictor, soccer injury prevention, machine learning in soccer, big data in soccer
Procedia PDF Downloads 1806581 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 136580 Seismic Directionality Effects on In-Structure Response Spectra in Seismic Probabilistic Risk Assessment
Authors: Sittipong Jarernprasert, Enrique Bazan-Zurita, Paul C. Rizzo
Abstract:
Currently, seismic probabilistic risk assessments (SPRA) for nuclear facilities use In-Structure Response Spectra (ISRS) in the calculation of fragilities for systems and components. ISRS are calculated via dynamic analyses of the host building subjected to two orthogonal components of horizontal ground motion. Each component is defined as the median motion in any horizontal direction. Structural engineers applied the components along selected X and Y Cartesian axes. The ISRS at different locations in the building are also calculated in the X and Y directions. The choice of the directions of X and Y are not specified by the ground motion model with respect to geographic coordinates, and are rather arbitrarily selected by the structural engineer. Normally, X and Y coincide with the “principal” axes of the building, in the understanding that this practice is generally conservative. For SPRA purposes, however, it is desirable to remove any conservatism in the estimates of median ISRS. This paper examines the effects of the direction of horizontal seismic motion on the ISRS on typical nuclear structure. We also evaluate the variability of ISRS calculated along different horizontal directions. Our results indicate that some central measures of the ISRS provide robust estimates that are practically independent of the selection of the directions of the horizontal Cartesian axes.Keywords: seismic, directionality, in-structure response spectra, probabilistic risk assessment
Procedia PDF Downloads 4096579 Data-Driven Insights Into Juvenile Recidivism: Leveraging Machine Learning for Rehabilitation Strategies
Authors: Saiakhil Chilaka
Abstract:
Juvenile recidivism presents a significant challenge to the criminal justice system, impacting both the individuals involved and broader societal safety. This study aims to identify the key factors influencing recidivism and successful rehabilitation outcomes by utilizing a dataset of over 25,000 individuals from the NIJ Recidivism Challenge. We employed machine learning techniques, particularly Random Forest Classification, combined with SHAP (SHapley Additive exPlanations) for model interpretability. Our findings indicate that supervision risk score, percent days employed, and education level are critical factors affecting recidivism, with higher levels of supervision, successful employment, and education contributing to lower recidivism rates. Conversely, Gang Affiliation emerged as a significant risk factor for reoffending. The model achieved an accuracy of 68.8%, highlighting its utility in identifying high-risk individuals and informing targeted interventions. These results suggest that a comprehensive approach involving personalized supervision, vocational training, educational support, and anti-gang initiatives can significantly reduce recidivism and enhance rehabilitation outcomes for juveniles, providing critical insights for policymakers and juvenile justice practitioners.Keywords: juvenile, justice system, data analysis, SHAP
Procedia PDF Downloads 206578 Machine Learning Algorithms for Rocket Propulsion
Authors: Rômulo Eustáquio Martins de Souza, Paulo Alexandre Rodrigues de Vasconcelos Figueiredo
Abstract:
In recent years, there has been a surge in interest in applying artificial intelligence techniques, particularly machine learning algorithms. Machine learning is a data-analysis technique that automates the creation of analytical models, making it especially useful for designing complex situations. As a result, this technology aids in reducing human intervention while producing accurate results. This methodology is also extensively used in aerospace engineering since this is a field that encompasses several high-complexity operations, such as rocket propulsion. Rocket propulsion is a high-risk operation in which engine failure could result in the loss of life. As a result, it is critical to use computational methods capable of precisely representing the spacecraft's analytical model to guarantee its security and operation. Thus, this paper describes the use of machine learning algorithms for rocket propulsion to aid the realization that this technique is an efficient way to deal with challenging and restrictive aerospace engineering activities. The paper focuses on three machine-learning-aided rocket propulsion applications: set-point control of an expander-bleed rocket engine, supersonic retro-propulsion of a small-scale rocket, and leak detection and isolation on rocket engine data. This paper describes the data-driven methods used for each implementation in depth and presents the obtained results.Keywords: data analysis, modeling, machine learning, aerospace, rocket propulsion
Procedia PDF Downloads 1136577 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team
Procedia PDF Downloads 1546576 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking
Authors: Haowei Chen, Kaiqi Xiong
Abstract:
This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis
Procedia PDF Downloads 986575 Factors Affecting Sense of Community in Residential Communities Case Study: Residential Communities in Tehran, Iran
Authors: Parvin Foroughifar
Abstract:
The concept of sense of community refers to residents’ sense of attachment and commitment to the other residents in a residential community. It is implicitly indicative of the mental image of a physical environment in which the residents enjoy strong social ties. Sense of community, a crucial factor in improving quality of life and social welfare, leads to life satisfaction in a residential community. Despite the important functions of such a notion, few empirical studies, to the best of the authors' knowledge, have been so far carried out in Iran to investigate the effective factors in sharpening the sense of community in residential communities. This survey research examined sense of community in 360 above 20-year old residents of three residential communities in Tehran, Iran using cluster sampling and questionnaire. The study yielded the result that variables of local social ties, social control and trust, sense of security, length of residence, use of public spaces, and mixed land use have a significant relationship with sense of community.Keywords: sense of community, local social ties, sense of security, public space, residential community, Tehran
Procedia PDF Downloads 1876574 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network
Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono
Abstract:
There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.Keywords: Bayesian network, decision analysis, national security system, text mining
Procedia PDF Downloads 3906573 Risk Factors Associated with Ectoprotozoa Infestation of Wild and Farmed Cyprinids
Authors: M. A. Peribanez, G. Illan, I. De Blas, A. Muniesa, I. Ruiz-Zarzuela
Abstract:
Intensive aquaculture is commonly associated with increased incidence of parasites. However, in Spain, the recent intensification of cyprinid production has not led to knowledge of the parasites that develop in the aquaculture facilities, the factors that affect their development and spread and the transmission between wild and cultivated fish species. The present study focuses on the knowledge of environmental factors, as well as host dependent factors, and their possible influence as risk factors in the incidence and intensity of parasitic infections. This work was conducted in the Duero River Basin, NW Spain. A total of 114 tenches (Tinca tinca) were caught in a fish farm and 667 specimens belonging to six species of cyprinid, not tench, in five rivers. An exhaustive search and microscopic identification of protozoa on skin and gills were carried out. Physical, chemical, and biological parameters of water samples from the capture points were determined. Only two ectoprotozoa were identified, Ichthyophthirius multifiliis and Tripartiella sp. In I. multifiliis, a high intensity of infection (more than 40 parasites on the body surface and more than 80 on gills) was determined in farmed tench (14%) and in Iberian barbel (Luciobarbus bocagei) (91%) and Duero nase (Pseudochondrostoma duriense) (71%) of middle stretches of rivers. The prevalence was similar between farmed tenches and cyprinids of middle courses. Tripartiella sp. was only found in barbels (prevalence in middle stretches, 0.7%) and in farmed tenches (63%), this species resulting in a high risk factor (odds ratio, OR= 1143) in the presence of the ciliate. There were no differences between the two species relative to the intensity of parasitization. Some of the physical, chemical and microbiological water quality parameters appear to be risk factors in the presence of I. multifiliis, with maximum OR of 8. Nevertheless, in Tripartiella sp., the risk is multiplied by 720 when the pH value exceeds 8.4, if we consider the total of the data, and it is increased more than 500 times if we only consider the values recorded in the fish farm (529 by nitrates > 3 mg/l; 530 by total coliforms > 100 CFU/100 ml). However, the high prevalence and risk of infection by I. multifiliis and Tripartiella sp. in fish farms should be related to environmental factors that dependent upon sampling point rather than in direct influence of the physical-chemical and biological parameters of the water. The high pH value recorded in the fish farm (9.62 ± 0.76) is the only parameter that we consider may have a substantial direct influence. Chronic exposure to alkaline pH levels can be a chronic stress generator, predisposing to parasitization by Tripartiella sp. In conclusion, often minor changes in ecosystem conditions, both natural and man-made, can modify the host-parasite relationship, resulting in an increase in the prevalence and intensity of parasitic infections in populations of cyprinids, sometimes causing disease outbreaks.Keywords: cyprinids, fish, parasites, protozoa, risk factors
Procedia PDF Downloads 1116572 Feasibility of an Extreme Wind Risk Assessment Software for Industrial Applications
Authors: Francesco Pandolfi, Georgios Baltzopoulos, Iunio Iervolino
Abstract:
The impact of extreme winds on industrial assets and the built environment is gaining increasing attention from stakeholders, including the corporate insurance industry. This has led to a progressively more in-depth study of building vulnerability and fragility to wind. Wind vulnerability models are used in probabilistic risk assessment to relate a loss metric to an intensity measure of the natural event, usually a gust or a mean wind speed. In fact, vulnerability models can be integrated with the wind hazard, which consists of associating a probability to each intensity level in a time interval (e.g., by means of return periods) to provide an assessment of future losses due to extreme wind. This has also given impulse to the world- and regional-scale wind hazard studies.Another approach often adopted for the probabilistic description of building vulnerability to the wind is the use of fragility functions, which provide the conditional probability that selected building components will exceed certain damage states, given wind intensity. In fact, in wind engineering literature, it is more common to find structural system- or component-level fragility functions rather than wind vulnerability models for an entire building. Loss assessment based on component fragilities requires some logical combination rules that define the building’s damage state given the damage state of each component and the availability of a consequence model that provides the losses associated with each damage state. When risk calculations are based on numerical simulation of a structure’s behavior during extreme wind scenarios, the interaction of component fragilities is intertwined with the computational procedure. However, simulation-based approaches are usually computationally demanding and case-specific. In this context, the present work introduces the ExtReMe wind risk assESsment prototype Software, ERMESS, which is being developed at the University of Naples Federico II. ERMESS is a wind risk assessment tool for insurance applications to industrial facilities, collecting a wide assortment of available wind vulnerability models and fragility functions to facilitate their incorporation into risk calculations based on in-built or user-defined wind hazard data. This software implements an alternative method for building-specific risk assessment based on existing component-level fragility functions and on a number of simplifying assumptions for their interactions. The applicability of this alternative procedure is explored by means of an illustrative proof-of-concept example, which considers four main building components, namely: the roof covering, roof structure, envelope wall and envelope openings. The application shows that, despite the simplifying assumptions, the procedure can yield risk evaluations that are comparable to those obtained via more rigorous building-level simulation-based methods, at least in the considered example. The advantage of this approach is shown to lie in the fact that a database of building component fragility curves can be put to use for the development of new wind vulnerability models to cover building typologies not yet adequately covered by existing works and whose rigorous development is usually beyond the budget of portfolio-related industrial applications.Keywords: component wind fragility, probabilistic risk assessment, vulnerability model, wind-induced losses
Procedia PDF Downloads 1806571 Water Quality, Risk, Management and Distribution in Abeokuta, Ogun State
Authors: Ayedun Hassan, Ayadi Odunayo Peter
Abstract:
The ancient city of Abeokuta has been supplied with pipe borne water since 1911, yet, a continuous increase in population and unplanned city expansion makes water a very precious and scarce commodity. The government reserved areas (GRA’s) are well planned, and public water supply is available; however, the sub-urban areas consist of scattered structures with individuals trying to source water by digging wells and boreholes. The geology of the city consists of basement rock which makes digging wells and boreholes very difficult. The present study was conducted to assess the risk arising from the consumption of toxic elements in the groundwater of Abeokuta, Ogun State, Nigeria. Forty-five groundwater samples were collected from nine different areas of Abeokuta and analyzed for physicochemical parameters and toxic elements. The physicochemical parameters were determined using standard methods, while the toxic elements were determined using Inductively Coupled Plasma-Mass Spectrometer (ICP/MS). Ninety-six percent (96%) of the water sample has pH < 6.5, and 11% has conductivity > 250 µSCm⁻¹ limits in drinking water as recommended by WHO. Seven percent (7%) of the samples have Pb concentration >10 µgL⁻¹ while 75% have Al concentration >200 µgL⁻¹ recommended by WHO. The order for risk of cancer from different area of Abeokuta are Cd²⁺ > As³⁺ > Pb²⁺ > Cr⁶⁺ for Funaab, Camp and Obantoko; As³⁺ > Cd²⁺ > Pb²⁺ > Cr⁶⁺ for Ita Osin, Isale Igbein, Ake and Itoku; Cd²⁺ >As > Cr⁶⁺ > Pb²⁺ for Totoro; Pb²⁺ > Cd²⁺ > As³⁺ > Cr⁶⁺ for Idiaba. The order of non-cancer hazard index (HI) calculated for groundwater of Abeokuta City are Cd²⁺ > As³⁺ > Mn²⁺ > Pb²⁺ > Ni²⁺ and were all greater than one, which implies susceptibility to other illnesses. The sources of these elements are the rock and inappropriate waste disposal method, which leached the elements into the groundwater. A combination of sources from food will accumulate these elements in the human body system. Treatment to remove Al and Pb is necessary, while the method of water distribution should be reviewed to ensure access to potable water by the residents.Keywords: Abeokuta, groundwater, Nigeria, risk
Procedia PDF Downloads 93