Search results for: security personnel
1467 Exploring Factors Affecting Electricity Production in Malaysia
Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet
Abstract:
Ability to supply reliable and secure electricity has been one of the crucial components of economic development for any country. Forecasting of electricity production is therefore very important for accurate investment planning of generation power plants. In this study, we aim to examine and analyze the factors that affect electricity generation. Multiple regression models were used to find the relationship between various variables and electricity production. The models will simultaneously determine the effects of the variables on electricity generation. Many variables influencing electricity generation, i.e. natural gas (NG), coal (CO), fuel oil (FO), renewable energy (RE), gross domestic product (GDP) and fuel prices (FP), were examined for Malaysia. The results demonstrate that NG, CO, and FO were the main factors influencing electricity generation growth. This study then identified a number of policy implications resulting from the empirical results.Keywords: energy policy, energy security, electricity production, Malaysia, the regression model
Procedia PDF Downloads 1641466 College Faculty Perceptions of Instructional Strategies That Are Effective for Students with Dyslexia
Authors: Samantha R. Dutra
Abstract:
There are many issues that students face in college, such as academic-based struggles, financial issues, family responsibilities, and vocational problems. Students with dyslexia struggle even more with these problems compared to other students. This qualitative study examines faculty perceptions of instructing students with dyslexia. This study is important to the human services and post-secondary educational fields due to the increase in disabled students enrolled in college. This study is also substantial because of the reported bias faced by students with dyslexia and their academic failure. When students with LDs such as dyslexia experience bias, discrimination, and isolation, they are more apt to not seek accommodations, lack communication with faculty, and are more likely to drop out or fail. College students with dyslexia often take longer to complete their post-secondary education and are more likely to withdraw or drop out without earning a degree. Faculty attitudes and academic cultures are major barriers to the success and use of accommodations as well as modified instruction for students with disabilities, which leads to student success. Faculty members are often uneducated or misinformed regarding students with dyslexia. More importantly, many faculty members are unaware of the many ethical and legal implications that they face regarding accommodating students with dyslexia. Instructor expectations can generally be defined as the understanding and perceptions of students regarding their academic success. Skewed instructor expectations can affect how instructors interact with their students and can also affect student success. This is true for students with dyslexia in that instructors may have lower and biased expectations of these students and, therefore, directly impact students’ academic successes and failures. It is vital to understand how instructor attitudes affect the academic achievement of dyslexic students. This study will examine faculty perceptions of instructing students with dyslexia and faculty attitudes towards accommodations and institutional support. The literature concludes that students with dyslexia have many deficits and several learning needs. Furthermore, these are the students with the highest dropout and failure rates, as well as the lowest retention rates. Disabled students generally have many reasons why accommodations and supports just do not help. Some research suggests that accommodations do help students and show positive outcomes. Many improvements need to be made between student support service personnel, faculty, and administrators regarding providing access and adequate supports for students with dyslexia. As the research also suggests, providing more efficient and effective accommodations may increase positive student as well as faculty attitudes in college, and may improve student outcomes overall.Keywords: dyslexia, faculty perception, higher education, learning disability
Procedia PDF Downloads 1391465 Healthcare Data Mining Innovations
Authors: Eugenia Jilinguirian
Abstract:
In the healthcare industry, data mining is essential since it transforms the field by collecting useful data from large datasets. Data mining is the process of applying advanced analytical methods to large patient records and medical histories in order to identify patterns, correlations, and trends. Healthcare professionals can improve diagnosis accuracy, uncover hidden linkages, and predict disease outcomes by carefully examining these statistics. Additionally, data mining supports personalized medicine by personalizing treatment according to the unique attributes of each patient. This proactive strategy helps allocate resources more efficiently, enhances patient care, and streamlines operations. However, to effectively apply data mining, however, and ensure the use of private healthcare information, issues like data privacy and security must be carefully considered. Data mining continues to be vital for searching for more effective, efficient, and individualized healthcare solutions as technology evolves.Keywords: data mining, healthcare, big data, individualised healthcare, healthcare solutions, database
Procedia PDF Downloads 661464 Effects of Using a Recurrent Adverse Drug Reaction Prevention Program on Safe Use of Medicine among Patients Receiving Services at the Accident and Emergency Department of Songkhla Hospital Thailand
Authors: Thippharat Wongsilarat, Parichat tuntilanon, Chonlakan Prataksitorn
Abstract:
Recurrent adverse drug reactions are harmful to patients with mild to fatal illnesses, and affect not only patients but also their relatives, and organizations. To compare safe use of medicine among patients before and after using the recurrent adverse drug reaction prevention program . Quasi-experimental research with the target population of 598 patients with drug allergy history. Data were collected through an observation form tested for its validity by three experts (IOC = 0.87), and analyzed with a descriptive statistic (percentage). The research was conducted jointly with a multidisciplinary team to analyze and determine the weak points and strong points in the recurrent adverse drug reaction prevention system during the past three years, and 546, 329, and 498 incidences, respectively, were found. Of these, 379, 279, and 302 incidences, or 69.4; 84.80; and 60.64 percent of the patients with drug allergy history, respectively, were found to have caused by incomplete warning system. In addition, differences in practice in caring for patients with drug allergy history were found that did not cover all the steps of the patient care process, especially a lack of repeated checking, and a lack of communication between the multidisciplinary team members. Therefore, the recurrent adverse drug reaction prevention program was developed with complete warning points in the information technology system, the repeated checking step, and communication among related multidisciplinary team members starting from the hospital identity card room, patient history recording officers, nurses, physicians who prescribe the drugs, and pharmacists. Including in the system were surveillance, nursing, recording, and linking the data to referring units. There were also training concerning adverse drug reactions by pharmacists, monthly meetings to explain the process to practice personnel, creating safety culture, random checking of practice, motivational encouragement, supervising, controlling, following up, and evaluating the practice. The rate of prescribing drugs to which patients were allergic per 1,000 prescriptions was 0.08, and the incidence rate of recurrent drug reaction per 1,000 prescriptions was 0. Surveillance of recurrent adverse drug reactions covering all service providing points can ensure safe use of medicine for patients.Keywords: recurrent drug, adverse reaction, safety, use of medicine
Procedia PDF Downloads 4561463 The Using of Smart Power Concepts in Military Targeting Process
Authors: Serdal AKYUZ
Abstract:
The smart power is the use of soft and hard power together in consideration of existing circumstances. Soft power can be defined as the capability of changing perception of any target mass by employing policies based on legality. The hard power, generally, uses military and economic instruments which are the concrete indicator of general power comprehension. More than providing a balance between soft and hard power, smart power creates a proactive combination by assessing existing resources. Military targeting process (MTP), as stated in smart power methodology, benefits from a wide scope of lethal and non-lethal weapons to reach intended end state. The Smart powers components can be used in military targeting process similar to using of lethal or non-lethal weapons. This paper investigates the current use of Smart power concept, MTP and presents a new approach to MTP from smart power concept point of view.Keywords: future security environment, hard power, military targeting process, soft power, smart power
Procedia PDF Downloads 4761462 A Cloud-Based Federated Identity Management in Europe
Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas
Abstract:
Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).Keywords: cybersecurity, identity federation, trust, user authentication
Procedia PDF Downloads 1661461 Mobile Agents-Based Framework for Dynamic Resource Allocation in Cloud Computing
Authors: Safia Rabaaoui, Héla Hachicha, Ezzeddine Zagrouba
Abstract:
Nowadays, cloud computing is becoming the more popular technology to various companies and consumers, which benefit from its increased efficiency, cost optimization, data security, unlimited storage capacity, etc. One of the biggest challenges of cloud computing is resource allocation. Its efficiency directly influences the performance of the whole cloud environment. Finding an effective method to address these critical issues and increase cloud performance was necessary. This paper proposes a mobile agents-based framework for dynamic resource allocation in cloud computing to minimize both the cost of using virtual machines and the makespan. Furthermore, its impact on the best response time and power consumption has been studied. The simulation showed that our method gave better results than here.Keywords: cloud computing, multi-agent system, mobile agent, dynamic resource allocation, cost, makespan
Procedia PDF Downloads 1031460 Perceptions on Development of the Deaf in Higher Education Level: The Case of Special Education Students in Tiaong, Quezon, Philippines
Authors: Ashley Venerable, Rosario Tatlonghari
Abstract:
This study identified how college deaf students of Bartimaeus Center for Alternative Learning in Tiaong, Quezon, Philippines view development using visual communication techniques and generating themes from responses. Complete enumeration was employed. Guided by Constructivist Theory of Perception, past experiences and stored information influenced perception. These themes of development emerged: social development; pleasant environment; interpersonal relationships; availability of resources; employment; infrastructure development; values; and peace and security. Using the National Economic and Development Authority development indicators, findings showed the deaf students’ views on development were similar from the mainstream views. Responses also became more meaningful through visual communication techniques.Keywords: deaf, development, perception, development indicators, visual communication
Procedia PDF Downloads 4311459 Analyze Long-Term Shoreline Change at Yi-Lan Coast, Taiwan Using Multiple Sources
Authors: Geng-Gui Wang, Chia-Hao Chang, Jee-Cheng Wu
Abstract:
A shoreline is a line where a body of water and the shore meet. It provides economic and social security to coastal habitations. However, shorelines face multiple threats due to both natural processes and man-made effects because of disasters, rapid urbanization, industrialization, and sand deposition and erosion, etc. In this study, we analyzed multi-temporal satellite images of the Yilan coast, Taiwan from 1978 to 2016, using the United States Geological Survey (USGS) Digital Shoreline Analysis System (DSAS), weather information (as rainfall records and typhoon routes), and man-made construction project data to explore the causes of shoreline changes. The results showed that the shoreline at Yilan coast is greatly influenced by typhoons and anthropogenic interventions.Keywords: shoreline change, multi-temporal satellite, digital shoreline analysis system, DSAS, Yi-Lan coast
Procedia PDF Downloads 1631458 Italian Sign Language and Deafness in a North-Italian Border Region: Results of Research on the Linguistic Needs of Teachers and Students
Authors: Maria Tagarelli De Monte
Abstract:
In 2021, the passage of the law recognizing Italian Sign Language (LIS) as the language of the Italian deaf minority was the input for including this visual-gestural language in the curricula of interpreters and translators choosing the academic setting for their training. Yet, a gap remains concerning LIS education of teachers and communication assistants as referring figures for people who are deaf or hard of hearing in mainstream education. As well documented in the related scientific literature, deaf children often experience severe difficulties with the languages spoken in the country where they grow up, manifesting in all levels of literacy competence. In the research introduced here, the experience of deaf students (and their teachers) attending schools is explored in areas that are characterized by strong native bilingualism, such as Friuli-Venezia Giulia (FVG), facing Italian Northeast borders. This region is peculiar as the native population may be bilingual Italian and Friulian (50% of the local population), German, and/or Slovenian. The research involved all schools of all levels in Friuli to understand the relationship between the language skills expressed by teachers and those shown by deaf learners with a background in sign language. In addition to collecting specific information on the degree of preparation of teachers in deaf-related matters and LIS, the research has allowed to highlight the role, often poorly considered, covered by the communication assistants who work alongside deaf students. On several occasions, teachers and assistants were unanimous in affirming the importance of mutual collaboration and adequate consideration of the educational-rehabilitative history of the deaf child and her family. The research was based on a mixed method of structured questionnaires and semi-structured interviews with the referring teachers. As a result, a varied and complex framework emerged, showing an asymmetry in preparing personnel dedicated to the deaf learner. Considering how Italian education has long invested in creating an inclusive and accessible school system (i.e. with the "Ten Theses for Democratic Language Education"), a constructive analysis will complete the discussion in an attempt to understand how linguistic (and modal) differences can become levers of inclusion.Keywords: FVG, LIS, linguistic needs, deafness, teacher education, bilingual bimodal children, communication assistants, inclusion model
Procedia PDF Downloads 471457 IoT: State-of-the-Art and Future Directions
Authors: Bashir Abdu Muzakkari, Aisha Umar Sulaiman, Mohamed Afendee Muhamad, Sanah Abdullahi Muaz
Abstract:
The field of the Internet of Things (IoT) is rapidly expanding and has the potential to completely change how we work, live, and interact with the world. The Internet of Things (IoT) is the term used to describe a network of networked physical objects, including machinery, vehicles, and buildings, which are equipped with electronics, software, sensors, and network connectivity. This review paper aims to provide a comprehensive overview of the current state of IoT, including its definition, key components, development history, and current applications. The paper will also discuss the challenges and opportunities presented by IoT, as well as its potential impact on various industries, such as healthcare, agriculture, and transportation. In addition, this paper will highlight the ethical and security concerns associated with IoT and the need for effective solutions to address these challenges. The paper concludes by highlighting the prospects of IoT and the directions for future research in this field.Keywords: internet of things, IoT, sensors, network
Procedia PDF Downloads 1741456 Diversity and Use of Agroforestry Yards of Family Farmers of Ponte Alta – Gama, Federal District, Brazil
Authors: Kever Bruno Paradelo Gomes, Rosana Carvalho Martins
Abstract:
The home gardens areas are production systems, which are located near the homes and are quite common in the tropics. They consist of agricultural and forest species and may also involve the raising of small animals to produce food for subsistence as well as income generation, with a special focus on the conservation of biodiversity. Home gardens are diverse Agroforestry systems with multiple uses, among many, food security, income aid, traditional medicine. The work was carried out on rural properties of the family farmers of the Ponte Alta Rural Nucleus, Gama Administrative Region, in the city of Brasília, Federal District- Brazil. The present research is characterized methodologically as a quantitative, exploratory and descriptive nature. The instruments used in this research were: bibliographic survey and semi-structured questionnaire. The data collection was performed through the application of a semi-structured questionnaire, containing questions that referred to the perception and behavior of the interviewed producer on the subject under analysis. In each question, the respondent explained his knowledge about sustainability, agroecological practices, environmental legislation, conservation methods, forest and medicinal species, ago social and socioeconomic characteristics, use and purpose of agroforestry and technical assistance. The sample represented 55.62% of the universe of the study. We interviewed 99 people aged 18-83 years, with a mean age of 49 years. The low level of education, coupled with the lack of training and guidance for small family farmers in the Ponte Alta Rural Nucleus, is one of the limitations to the development of practices oriented towards sustainable and agroecological agriculture in the nucleus. It is observed that 50.5% of the interviewed people landed with agroforestry yards less than 20 years ago, and only 16.17% of them are older than 35 years. In identifying agriculture as the main activity of most of the rural properties studied, attention is drawn to the cultivation of medicinal plants, fruits and crops as the most extracted products. However, it is verified that the crops in the backyards have the exclusive purpose of family consumption, which could be complemented with the marketing of the surplus, as well as with the aggregation of value to the cultivated products. Initiatives such as this may contribute to the increase in family income and to the motivation and value of the crop in agroecological gardens. We conclude that home gardens of Ponte Alta are highly diverse thus contributing to local biodiversity conservation of are managed by women to ensure food security and allows income generation. The tradition of existing knowledge on the use and management of the diversity of resources used in agroforestry yards is of paramount importance for the development of sustainable alternative practices.Keywords: agriculture, agroforestry system, rural development, sustainability
Procedia PDF Downloads 1411455 A Machine Learning Approach to Detecting Evasive PDF Malware
Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran
Abstract:
The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.Keywords: PDF, PDF malware, decision tree classifier, random forest classifier
Procedia PDF Downloads 911454 Carbapenem Usage in Medical Wards: An Antibiotic Stewardship Feedback Project
Authors: Choon Seong Ng, P. Petrick, C. L. Lau
Abstract:
Background: Carbapenem-resistant isolates have been increasingly reported recently. Carbapenem stewardship is designed to optimize its usage particularly among medical wards with high prevalence of carbapenem prescriptions to combat such emerging resistance. Carbapenem stewardship programmes (CSP) can reduce antibiotic use but clinical outcome of such measures needs further evaluation. We examined this in a prospective manner using feedback mechanism. Methods: Our single-center prospective cohort study involved all carbapenem prescriptions across the medical wards (including medical patients admitted to intensive care unit) in a tertiary university hospital setting. The impact of such stewardship was analysed according to the accepted and the rejected groups. The primary endpoint was safety. Safety measure applied in this study was the death at 1 month. Secondary endpoints included length of hospitalisation and readmission. Results: Over the 19 months’ period, input from 144 carbapenem prescriptions was analysed on the basis of acceptance of our CSP recommendations on the use of carbapenems. Recommendations made were as follows : de-escalation of carbapenem; stopping the carbapenem; use for a short duration of 5-7 days; required prolonged duration in the case of carbapenem-sensitive Extended Spectrum Beta-Lactamases bacteremia; dose adjustment; and surgical intervention for removal of septic foci. De-escalation, shorten duration of carbapenem and carbapenem cessation comprised 79% of the recommendations. Acceptance rate was 57%. Those who accepted CSP recommendations had no increase in mortality (p = 0.92), had a shorter length of hospital stay (LOS) and had cost-saving. Infection-related deaths were found to be higher among those in the rejected group. Moreover, three rejected cases (6%) among all non-indicated cases (n = 50) were found to have developed carbapenem-resistant isolates. Lastly, Pitt’s bacteremia score appeared to be a key element affecting the carbapenem prescription’s behaviour in this trial. Conclusions: Carbapenem stewardship program in the medical wards not only saves money, but most importantly it is safe and does not harm the patients with added benefits of reducing the length of hospital stay. However, more time is needed to engage the primary clinical teams by formal clinical presentation and immediate personal feedback by senior Infectious Disease (ID) personnel to increase its acceptance.Keywords: audit and feedback, carbapenem stewardship, medical wards, university hospital
Procedia PDF Downloads 2041453 Income Inequality and Its Effects on Household Livelihoods in Parker Paint Community, Liberia
Authors: Robertson Freeman
Abstract:
The prime objective of this research is to examine income inequality and its effects on household livelihoods in Parker Paint. Many researchers failed to address the potential threat of income inequality on diverse household livelihood indicators, including health, food, housing, transport and many others. They examine and generalize the effects of income differentials on household livelihoods by addressing one indicator of livelihood security. This research fills the loopholes of previous research by examining the effects of income inequality and how it affects the livelihoods of households, taking into consideration livelihood indicators including health, food security, and transport. The researcher employed the mixed research method to analyze the distribution of income and solicit opinions of household heads on the effects of their monthly income on their livelihoods. Age and sex structure, household composition, type of employment and educational status influence income inequality. The level of income, Lorenz curve and the Gini coefficient was mutually employed to calculate and determine the level of income inequality. One hundred eighty-two representing 96% of household heads are employed while 8, representing 4%, are unemployed. However, out of a total number of 182 employed, representing 96%, 27 people representing 14%, are employed in the formal private sector, while 110, representing 58%, are employed in the private informal sector. Monthly average income, savings, investments and unexpected circumstances affect the livelihood of households. Infrastructural development and wellbeing should be pursued by reducing expenditure earmarked in other sectors and channeling the funds towards the provision of household needs. One of the potent tools for consolidating household livelihoods is to initiate livelihood empowerment programs. Government and private sector agencies should establish more health insurance schemes, providing mosquito nets, immunization services, public transport, as well as embarking on feeding programs, especially in the remote areas of Parker paint. To climax the research findings, self-employment, entrepreneurship and the general private sector employment is a transparent double-edged sword. If employed in the private sector, there is the likelihood to increase one’s income. However, this also induces the income gap between the rich and poor since many people are exploited by affluence, thereby relegating the poor from the wealth hierarchy. Age and sex structure, as well as type of employment, should not be overlooked since they all play fundamental roles in influencing income inequality. Savings and investments seem to play a positive role in reducing income inequality. However, savings and investment in this research affect livelihoods negatively. It behooves mankind to strive and work hard to the best of ability in earning sufficient income and embracing measures to retain his financial strength. In so doing, people will be able to provide basic household needs, celebrate the reduction in unemployment and dependence and finally ensure sustainable livelihoods.Keywords: income, inequality, livelihood, pakerpaint
Procedia PDF Downloads 1241452 Three Star Hotels in Sukhumvit Area of Bangkok and the Potential to Be in Tourism Industry Joining the ASEAN Community
Authors: Benjaporn Yaemjamuang, Sasitorn Jetanont
Abstract:
The three star hotels in Sukhumvit area of Bangkok and the potential to be in the tourism industry joining the ASEAN Community were studied. The findings revealed that the representative samples satisfy the potential of hotel services at a high level in all aspects. The level of service satisfaction by gender is not different. On the other hand, for different ethnic origins, ages, occupations, levels of education, the satisfaction on the services varies in significance level of 0.05. Factors associated with satisfaction in the services of the hotel include a potential location and environment. It was also found that satisfaction with the service aspects are related as follows: services (r = .810), food (r = .807), booking service (r = .768), room condition (r = .762) and security (r =.756) which is aligned with the coefficient .826.Keywords: three star hotel, ASEAN community, potential in tourism industry, Bangkok
Procedia PDF Downloads 3021451 Intellectual Property in Digital Environment
Authors: Balamurugan L.
Abstract:
Artificial intelligence (AI) and its applications in Intellectual Property Rights (IPR) has been significantly growing in recent years. In last couple of years, AI tools for Patent Research and Patent Analytics have been well-stabilized in terms of accuracy of references and representation of identified patent insights. However, AI tools for Patent Prosecution and Patent Litigation are still in the nascent stage and there may be a significant potential if such market is explored further. Our research is primarily focused on identifying potential whitespaces and schematic algorithms to automate the Patent Prosecution and Patent Litigation Process of the Intellectual Property. The schematic algorithms may assist leading AI tool developers, to explore such opportunities in the field of Intellectual Property. Our research is also focused on identification of pitfalls of the AI. For example, Information Security and its impact in IPR, and Potential remediations to sustain the IPR in the digital environment.Keywords: artificial intelligence, patent analytics, patent drafting, patent litigation, patent prosecution, patent research
Procedia PDF Downloads 671450 Study of the Landslide and Stability of Open Pit Quarry: Case of Open Pite Quarry of Chouf Amar M'sila, Algeria
Authors: Saadoun Abd Errazak, Hafssaoui Abdallah, Fredj Mohamed
Abstract:
Mining operations open induce risks of instability that can cause landslides and collapse at the bleachers slope. These risks may occur both during and after the operation phase. The magnitude of these risks depends on the mechanical and physical characteristics of the rock mass, the geometrical dimensions of ore bodies, their spatial arrangement, and the state of the operated area. If security and technology measures are not taken into account for this purpose, the environment will be affected. The main objective of this work is to assess these risks by analytical and numerical methods. The study is based on the geological, hydrogeological and geotechnical rock mass of the open pit quarry of Chouf Amar M'sila. The results obtained have allowed us to obtain an acceptable factor of safety and stability study of the open pit.Keywords: stability, land sliding, numerical modeling, safety factor, open-pit quarry
Procedia PDF Downloads 3751449 A Review on Assessment on the Level of Development of Macedonia and Iran Organic Agriculture as Compared to Nigeria
Authors: Yusuf Ahmad Sani, Adamu Alhaji Yakubu, Alhaji Abdullahi Jamilu, Joel Omeke, Ibrahim Jumare Sambo
Abstract:
With the rising global threat of food security, cancer, and related diseases (carcinogenic) because of increased usage of inorganic substances in agricultural food production, the Ministry of Food Agriculture and Livestock of the Republic of Turkey organized an International Workshop on Organic Agriculture between 8 – 12th December 2014 at the International Agricultural Research and Training Center, Izmir. About 21 countries, including Nigeria, were invited to attend the training workshop. Several topics on organic agriculture were presented by renowned scholars, ranging from regulation, certification, crop, animal, seed production, pest and disease management, soil composting, and marketing of organic agricultural products, among others. This paper purposely selected two countries (Macedonia and Iran) out of the 21 countries to assess their level of development in terms of organic agriculture as compared to Nigeria. Macedonia, with a population of only 2.1 million people as of 2014, started organic agriculture in 2005 with only 266ha of land and has grown significantly to over 5,000ha in 2010, covering such crops as cereals (62%), forage (20%) fruit orchard (7%), vineyards (5%), vegetables (4%), oil seed and industrial crops (1%) each. Others are organic beekeeping from 110 hives to over 15,000 certified colonies. As part of government commitment, the level of government subsidy for organic products was 30% compared to the direct support for conventional agricultural products. About 19 by-laws were introduced on organic agricultural production that was fully consistent with European Union regulations. The republic of Iran, on the other hand, embarked on organic agriculture for the fact, that the country recorded the highest rate of cancer disease in the world, with over 30,000 people dying every year and 297 people diagnosed every day. However, the host country, Turkey, is well advanced in organic agricultural production and now being the largest exporter of organic products to Europe and other parts of the globe. A technical trip to one of the villages that are under the government scheme on organic agriculture reveals that organic agriculture was based on market-demand-driven and the support of the government was very visible, linking the farmers with private companies that provide inputs to them while the companies purchase the products at harvest with high premium price. However, in Nigeria, research on organic agriculture was very recent, and there was very scanty information on organic agriculture due to poor documentation and very low awareness, even among the elites. The paper, therefore, recommends that the government should provide funds to NARIs to conduct research on organic agriculture and to establish clear government policy and good pre-conditions for sustainable organic agricultural production in the country.Keywords: organic agriculture, food security, food safety, food nutrition
Procedia PDF Downloads 501448 Minority Rights in Islamic Law (Sharia) and International Law Protection Mechanisms in the Region Kurdistan of Iraq
Authors: Ardawan Mustafa Ismail, Rebaz Sdiq Ismail
Abstract:
The subject of minorities takes an exceptional importance at all levels, around the world, especially those whose population is composed of many nationalities, and this subject became a very affective part in every country for its security, entity and stability, such as the nationality, religion or culture, as a result of internal factors and external influences, and at the same time it became clear that enslaving minorities had become a matter of reality. Which made the rights of minorities one of the legal, political and geographical issues, many attempts emerged that specialists and non-specialists have given the minorities ’problems their realistic solutions away from theorizing and assumption. On this chosen topic, there are many researches that are written in general places, but… It is believed did not see any in-depth studies dealing with the protection of minority rights of the Region of Kurdistan/ Iraq, because in the Region of Kurdistan/ Iraq there are many minorities living in this area, such as: Muslims, Yazidi, Assyrian, Christian, Chaldeans, and others.Keywords: minority, international law, protection, Kurdistan, people
Procedia PDF Downloads 371447 Scalable Performance Testing: Facilitating The Assessment Of Application Performance Under Substantial Loads And Mitigating The Risk Of System Failures
Authors: Solanki Ravirajsinh
Abstract:
In the software testing life cycle, failing to conduct thorough performance testing can result in significant losses for an organization due to application crashes and improper behavior under high user loads in production. Simulating large volumes of requests, such as 5 million within 5-10 minutes, is challenging without a scalable performance testing framework. Leveraging cloud services to implement a performance testing framework makes it feasible to handle 5-10 million requests in just 5-10 minutes, helping organizations ensure their applications perform reliably under peak conditions. Implementing a scalable performance testing framework using cloud services and tools like JMeter, EC2 instances (Virtual machine), cloud logs (Monitor errors and logs), EFS (File storage system), and security groups offers several key benefits for organizations. Creating performance test framework using this approach helps optimize resource utilization, effective benchmarking, increased reliability, cost savings by resolving performance issues before the application is released. In performance testing, a master-slave framework facilitates distributed testing across multiple EC2 instances to emulate many concurrent users and efficiently handle high loads. The master node orchestrates the test execution by coordinating with multiple slave nodes to distribute the workload. Slave nodes execute the test scripts provided by the master node, with each node handling a portion of the overall user load and generating requests to the target application or service. By leveraging JMeter's master-slave framework in conjunction with cloud services like EC2 instances, EFS, CloudWatch logs, security groups, and command-line tools, organizations can achieve superior scalability and flexibility in their performance testing efforts. In this master-slave framework, JMeter must be installed on both the master and each slave EC2 instance. The master EC2 instance functions as the "brain," while the slave instances operate as the "body parts." The master directs each slave to execute a specified number of requests. Upon completion of the execution, the slave instances transmit their results back to the master. The master then consolidates these results into a comprehensive report detailing metrics such as the number of requests sent, encountered errors, network latency, response times, server capacity, throughput, and bandwidth. Leveraging cloud services, the framework benefits from automatic scaling based on the volume of requests. Notably, integrating cloud services allows organizations to handle more than 5-10 million requests within 5 minutes, depending on the server capacity of the hosted website or application.Keywords: identify crashes of application under heavy load, JMeter with cloud Services, Scalable performance testing, JMeter master and slave using cloud Services
Procedia PDF Downloads 271446 The Historical Framework of International Crime in International Criminal Law
Authors: Tahraoui Boualem
Abstract:
Researching the historical framework of international crime means examining the historical facts that have contributed to uncovering this serious crime affecting international interests, and the law by which the study of the subject of international crime is determined is international criminal law, which is a branch of public international law. In this context, the historical study of international crime means recognizing the existence of an international community governed by international law, which makes us acknowledge that ancient societies lacked such stable and recurring international relations. Therefore, an attempt to monitor international crime in those ancient societies is only to demonstrate a historical fact that those societies have known some features of this crime, and have contributed in one way or another to the development of international criminal law without defining its concept or legal nature. The international community has affirmed the principle of establishing peace, achieving security, and respecting human rights. As a basis for friendly relations between the people of the international community and in case of prejudice, such as the aggressors breaching the obligations imposed on them, whether in time of peace or war.Keywords: historical framework, of international crime, peace or war., international law
Procedia PDF Downloads 1001445 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis
Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng
Abstract:
Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.Keywords: attribution trace, probabilistic relevance, network attack, attacker identification
Procedia PDF Downloads 3661444 The Effect of Early Skin-To-Skin Contact with Fathers on Their Supporting Breastfeeding
Authors: Shu-Ling Wang
Abstract:
Background: Multiple studies showed early skin-to-skin contact (SSC) with mothers was beneficial to newborns such as breastfeeding and maternal childcare. In cases of newborns unable to have early SSC with mothers, fathers’ involvement could let early SSC continue without interruption. However, few studies had explored the effects of early SSC by fathers in comparison to early SSC with mothers. Paternal involvement of early SSC should be equally important in term of childcare and breastfeeding. The purpose of this study was to evaluate the efficacy of early SSC by fathers in particular in their support of breastfeeding. Methods: A quasi-experimental design was employed by the study. One hundred and forty-four father-infant pairs had participated the study, in which infants were assigned either to SSC with their fathers (n = 72) or to routine care (n = 72) as the control group. The study was conducted at a regional hospital in northern Taiwan. Participants included parents of both vaginal delivery (VD) and caesarean section birth (CS) infants. To be eligible for inclusion, infants must be over 37-week gestational ages. Data were collected twice: as pretest upon admission and as posttest with online questionnaire during first, second, and third postpartum months. The questionnaire included items for Breastfeeding Social Support, methods of feeding, and the mother-infant 24-hour rooming-in rate. The efficacy of early SSC with fathers was evaluated using the generalized estimating equation (GEE) modeling. Research Result: The primary finding was that SSC with fathers had positive impact on fathers’ support of breastfeeding. Analysis of the online questionnaire indicated that early SSC with fathers improved the support of breastfeeding than the control group (VD: t = -4.98, p < .001; CS: t = -2.37, p = .02). Analysis of mother-infant 24-hour rooming-in rate showed that SSC with fathers after CS had a positive impact on the rooming-in rate (χ² = 5.79, p = .02); however, with VD the difference between early SSC with fathers and the control group was insignificant (χ² = .23, p = .63). Analysis of the rate of exclusive breastfeeding indicated that early SSC with fathers had a higher rate than the control group during first three postpartum months for both delivery methods (VD: χ² = 12.51, p < .001 on 1st postpartum month, χ² = 8.13, p < .05 on 2nd postpartum month, χ² = 4.43, p < .05 on 3rd postpartum month; CS: χ² = 6.92, p < .05 on 1st postpartum month, χ² = 7.41, p < .05 on 2nd postpartum month, χ² = 6.24, p < .05 on 3rd postpartum month). No significant difference was found on the rate of exclusive breastfeeding with both methods of delivery between two groups during hospitalization. (VD: χ² =2 .00, p = .16; CS: χ² = .73, p = .39). Conclusion: Implementing early SSC with fathers has many benefits to both parents. The result of this study showed increasing fathers’ support of breastfeeding. This encourages our nursing personnel to focus the needs of father during breastfeeding, therefore further enhancing the quality of parental care, the rate and duration of breastfeeding.Keywords: breastfeeding, skin-to-skin contact, support of breastfeeding, rooming-in
Procedia PDF Downloads 2151443 Psychosocial Processes and Strategies behind Islamic Deradicalisation: A Scoping Review
Authors: Carvalho M. Catia, Pinto R. Isabel, Azevedo F. Luis, Guerreiro, T. Alexandre, Barbosa R. Mariana, Pinto S. Marta
Abstract:
Due to the loss of territory, foreign terrorist fighters who have joined Islamic State are returning to their home countries. In order to counter this threat to international security, it is important to implement deradicalisation programmes, through strategies and processes that can reverse radicalisation. The objectives of this scoping review - which is underway - are to provide a comprehensive overview of the programmes being implemented, its main characteristics, the main motives and processes leading to deradicalisation, and to identify the key findings and the existing gaps in the literature. The methodology to be implemented in this scoping review follows the guidelines proposed by Arksey and O’Malley and by The Joanna Briggs Institute. The main results will be the development of a synthesis map of the deradicalisation programmes existing in the world, its main features, and recommendations to policy-makers and professionals.Keywords: deradicalisation strategies, psychosocial processes, radicalisation, terrorism
Procedia PDF Downloads 3891442 Hybrid Obfuscation Technique for Reverse Engineering Problem
Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro
Abstract:
Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.Keywords: intellectual property, obfuscation, software security, reverse engineering
Procedia PDF Downloads 1461441 The Importance of Fire Safety in Egypt
Authors: Omar Shakra
Abstract:
This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients.Keywords: fire, system, protection, fire hydrants, security, alarms
Procedia PDF Downloads 1091440 Sexual Diversity Training for Hong Kong Teachers Preliminary Themes Identified from Qualitative Interviews
Authors: Diana K. Kwok
Abstract:
Despite the fact that Hong Kong government aims to develop an inclusive society, sexual minority students continue to encounter sexual prejudice without legal protection. They also have difficulties accessing relevant services from mental health and educational professionals, who do not receive systematic training to work with sexual minority students. Informed by the literature on sexual prejudice, heterosexual hegemony, genderism, as well as code of practice for frontline practitioners, the authors explored self-perceived knowledge of teachers and sexual minorities on sexuality and sexual prejudice, and how they perceive prejudice towards sexual minorities in Chinese cultural context. Semi-structure qualitative interviews were carried out with 31 school personnel informants (school teachers and counseling team members) and 25 sexual minority informants on their understanding of sexuality knowledge, their perception of sexual prejudice within school context in Hong Kong, as well as their suggested themes on teachers training on sexual prejudice reduction. This presentation specifically focuses on transcripts from sexual minority informants. Data analysis was carried out through NVivo, and followed the procedures spelt out in the qualitative research literature. Trustworthiness of the study was addressed through various strategies. Preliminary themes emerged from transcript content analysis: 1) A gap of knowledge between sexual minority informants and teachers; 2) Perception on sexual prejudice within cultural context; 3) Heterosexual hegemony and genderism within school system; 4) Needs for mandatory training: contents and strategies. The sexual minority informants found that teachers they encountered were predominantly adopted concepts of binary sex and dichotomous gender. Informants also indicated that the teachings of Confucianism cultural values, religiosity in Hong Kong might well be important cultural forces contributing to sexual prejudice manifested in school context. Although human rights and social justice concepts were embedded in professional code of practice of teachers and school helping professionals, informants found that teachers they encountered may face a dilemma when supporting sexual minority students navigating heterosexual hegemony and genderism in, as a consequence of their personal, institutional, cultural and religious backgrounds. Acknowledgments: The sexual prejudice project was funded by the Hong Kong Research Grant Council (ECS28401614), 2015 to 2017.Keywords: sexual prejudice, Chinese teachers, Chinese sexual minorities, teacher training
Procedia PDF Downloads 2821439 Technology Impact on the Challenge between Human Rights and Cyber Terrorism
Authors: Abanoub Zare Zakaria Herzalla
Abstract:
The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 481438 Overview of Wireless Body Area Networks
Authors: Rashi Jain
Abstract:
The Wireless Body Area Networks (WBANs) is an emerging interdisciplinary area where small sensors are placed on/within the human body. These sensors monitor the physiological activities and vital statistics of the body. The data from these sensors is aggregated and communicated to a remote doctor for immediate attention or to a database for records. On 6 Feb 2012, the IEEE 802.15.6 task group approved the standard for Body Area Network (BAN) technologies. The standard proposes the physical and MAC layer for the WBANs. The work provides an introduction to WBANs and overview of the physical and MAC layers of the standard. The physical layer specifications have been covered. A comparison of different protocols used at MAC layer is drawn. An introduction to the network layer and security aspects of the WBANs is made. The WBANs suffer certain limitations such as regulation of frequency bands, minimizing the effect of transmission and reception of electromagnetic signals on the human body, maintaining the energy efficiency among others. This has slowed down their implementation.Keywords: vehicular networks, sensors, MicroController 8085, LTE
Procedia PDF Downloads 259