Search results for: private security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4462

Search results for: private security

2392 Breast Cancer Early Recognition, New Methods of Screening, and Analysis

Authors: Sahar Heidary

Abstract:

Breast cancer is a main public common obstacle global. Additionally, it is the second top reason for tumor death across women. Considering breast cancer cure choices can aid private doctors in precaution for their patients through future cancer treatment. This article reviews usual management centered on stage, histology, and biomarkers. The growth of breast cancer is a multi-stage procedure including numerous cell kinds and its inhibition residues stimulating in the universe. Timely identification of breast cancer is one of the finest methods to stop this illness. Entirely chief therapeutic administrations mention screening mammography for women aged 40 years and older. Breast cancer metastasis interpretations for the mainstream of deaths from breast cancer. The discovery of breast cancer metastasis at the initial step is essential for managing and estimate of breast cancer development. Developing methods consuming the exploration of flowing cancer cells illustrate talented outcomes in forecasting and classifying the initial steps of breast cancer metastasis in patients. In public, mammography residues are the key screening implement though the efficiency of medical breast checks and self-checkup is less. Innovative screening methods are doubtful to exchange mammography in the close upcoming for screening the overall people.

Keywords: breast cancer, screening, metastasis, methods

Procedia PDF Downloads 174
2391 Determination of International Jurisdiction of Courts over Disputes Arising from Electronic Consumer Contracts

Authors: Aslihan Coban

Abstract:

As a result of the rapid development of information communication technology, especially the internet, consumers have become an active party in commerce and in law. Consequently, the protection of consumers in cross-border contracts has become increasingly important. This paper is confined to the international jurisdiction of courts over disputes arising from electronic consumer contracts according to the ‘5718 Turkish Act on Private International Law and Civil Procedure’ and the ‘1215/2012 Council Regulation On Jurisdiction and The Recognition and Enforcement Of Judgments In Civil and Commercial Matters’ (Hereafter ‘Brussels I Regulation’). The international jurisdiction of courts for consumer contracts is recognized under both acts above-mentioned; however, there exist some differences between the said legal regulations. Firstly, while there is a specific provision for electronic consumer contracts in Brussels I Regulation, there is no specific provision in the Turkish Act. Secondly, under the Turkish Act, habitual residence, domicile, and workplace of the other party who is not a consumer are all accepted as jurisdiction elements; while domicile is the only jurisdiction element in Brussels I Regulation. Thirdly, the ability to make jurisdiction agreements in disputes arising from electronic consumer contracts is a controversial issue under the Turkish Act while it is explicitly regulated under Brussels I Regulation that such jurisdiction agreements can be concluded by complying with certain conditions.

Keywords: Brussels I Regulation, electronic consumer contracts, jurisdiction, jurisdiction agreement

Procedia PDF Downloads 162
2390 Examining Terrorism through a Constructivist Framework: Case Study of the Islamic State

Authors: Shivani Yadav

Abstract:

The Study of terrorism lends itself to the constructivist framework as constructivism focuses on the importance of ideas and norms in shaping interests and identities. Constructivism is pertinent to understand the phenomenon of a terrorist organization like the Islamic State (IS), which opportunistically utilizes radical ideas and norms to shape its ‘politics of identity’. This ‘identity’, which is at the helm of preferences and interests of actors, in turn, shapes actions. The paper argues that an effective counter-terrorism policy must recognize the importance of ideas in order to counter the threat arising from acts of radicalism and terrorism. Traditional theories of international relations, with an emphasis on state-centric security problematic, exhibit several limitations and problems in interpreting the phenomena of terrorism. With the changing global order, these theories have failed to adapt to the changing dimensions of terrorism, especially ‘newer’ actors like the Islamic State (IS). The paper observes that IS distinguishes itself from other terrorist organizations in the way that it recruits and spreads its propaganda. Not only are its methods different, but also its tools (like social media) are new. Traditionally, too, force alone has rarely been sufficient to counter terrorism, but it seems especially impossible to completely root out an organization like IS. Time is ripe to change the discourse around terrorism and counter-terrorism strategies. The counter-terrorism measures adopted by states, which primarily focus on mitigating threats to the national security of the state, are preoccupied with statist objectives of the continuance of state institutions and maintenance of order. This limitation prevents these theories from addressing the questions of justice and the ‘human’ aspects of ideas and identity. These counter-terrorism strategies adopt a problem-solving approach that attempts to treat the symptoms without diagnosing the disease. Hence, these restrictive strategies fail to look beyond calculated retaliation against violent actions in order to address the underlying causes of discontent pertaining to ‘why’ actors turn violent in the first place. What traditional theories also overlook is that overt acts of violence may have several causal factors behind them, some of which are rooted in the structural state system. Exploring these root causes through the constructivist framework helps to decipher the process of ‘construction of terror’ and to move beyond the ‘what’ in theorization in order to describe ‘why’, ‘how’ and ‘when’ terrorism occurs. Study of terrorism would much benefit from a constructivist analysis in order to explore non-military options while countering the ideology propagated by the IS.

Keywords: constructivism, counter terrorism, Islamic State, politics of identity

Procedia PDF Downloads 189
2389 Shopping Centers and Public Transport: Study of the Shopping Centres Trips of Algiers City

Authors: Bakhrouri Sarah

Abstract:

The city of Algiers constitutes the first commercial pole of the country; 56.3% of its economic entities come from the commercial sector. Shopping centers are the new form of commerce that has emerged in the city since the 2000s. They are considered to be commercial and leisure poles and major generators of travel. However, shopping centers in the capital Algiers are poorly served by public transport, and their choice of location is mainly conditioned by the availability of land; accessibility by public transport does not appear to be an important criterion in the choice of their location. As a result, travel to and from these commercial centers is mainly by car, which breaks with the sustainability objectives of national transportation policy. Our study attempts to examine the impact of public transport accessibility of shopping centers on consumers' travel behaviour. The main objective of this research is to determine the link between the accessibility of these facilities, the use of private cars, and public transport modes. To this end, we analyze the choice of travel mode of consumers and the different factors that determine it by focusing on the influence of accessibility. The results showed a considerable influence of the accessibility on the travel behavior of the consumer in Algiers, so it is recommended to improve the accessibility of shopping centers by public transport in order to contribute to a modal shift.

Keywords: accessibility, shopping centers trips, public transportation, Algiers

Procedia PDF Downloads 101
2388 Relationship between Smartphone Addiction and Academic Performance among University Students

Authors: Arooba Azam Khan

Abstract:

The present study aims to focus on the relationship between smartphone addiction and academic performance of students along with social networking sites, overuse of smartphone, GPA’s and time management skills as their sub-variables. In this world of technology, the smartphone becomes a vital part of everyone’s life. The addiction of smartphones has both negative and positive impact on young people (students). Students keep themselves busy with smartphones without noticing that smartphone addiction is creating a negative impact on their social, academic, and personal lives. A quantitative approach was used to collect data through questionnaire from 360 students of two private universities in Pakistan in summer 2017. The target age group was 19-24 studying in Bachelors programmes. Data were analyzed by using SPSS (version 20), linear correlation and regression tests were applied. Results reveal that there is a negative relationship between smartphone addiction and academic performance. Moreover, it has been proved that students with good time management skills achieve high grades/GPA’s than those who have poor time management skills. From the findings, the researcher suggests that students should spend their time wisely and use their smartphones for educational purpose. However, students need training and close monitoring to get benefits out of smartphones use.

Keywords: smartphone addiction, academic performance, time management skills, quantitative research

Procedia PDF Downloads 163
2387 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map

Authors: Hongmin Deng, Qionghua Wang

Abstract:

A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).

Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID

Procedia PDF Downloads 402
2386 Assessing Student Attitudes toward Graded Readers, MReader and the MReader Challenge

Authors: Catherine Cheetam, Alan Harper, Melody Elliott, Mika Ito

Abstract:

This paper describes a pilot study conducted with English as a foreign language (EFL) students at a private university in Japan who used graded readers and the MReader website in class or independently to enhance their English reading skills. Each semester students who read 100,000 words with MReader quizzes passed enter into the ‘MReader Challenge,’ a reading contest that recognizes students for their achievement. The study focused specifically on the attitudes of thirty-six EFL students who successfully completed the Challenge in the 2015 spring semester using graded readers and MReader, and their motivation to continue using English in the future. The attitudes of these students were measured using their responses to statements on a Likert scaled survey. Follow-up semi-structured interviews were conducted with eleven students to gain additional insight into their opinions. The results from this study suggest that reading graded readers in general promoted intrinsic motivation among a majority of the participants. This study is preliminary and needs to be expanded and continued to assess the lasting impact of the extensive reading program. Limitations and future directions of the study are also summarized and discussed.

Keywords: attitudes, extensive, intrinsic, methodolgies, motivation, reading

Procedia PDF Downloads 210
2385 Food Processing Role in Ensuring Food and Health Security

Authors: Muhammad Haseeb

Abstract:

It is crucial to have a balanced approach to food's energy and nutritional content in a world with limited resources. The preservation of the environment is vital, and both the agrifood-making and food service sectors will be requested to use fewer resources to produce a wider range of existing foods and develop imaginative foods that are physiologically appropriate for a better sense of good health, have long shelf lives and are conveniently transportable. Delivering healthy diets that satisfy consumer expectations from robust and sustainable agrifood systems is necessary in a world that is changing and where natural resources are running out. Across the whole food supply chain, an integrated multi-sectoral approach is needed to alleviate global food and nutrition insecurity.

Keywords: health, food, nutrition, supply chain

Procedia PDF Downloads 25
2384 Problems of Innovation Development of Wireless Data Transfer Branch in the Cellular Market of Kazakhstan

Authors: Yessengeldy Kuanyshpayev

Abstract:

Now in some countries of the world the cellular market is on the point of saturation, in others - positive dynamics of development kept on. The reasons for it are also different, but there are united by their general susceptibility to innovation changes, if they are really innovative. If to take as an example the cellular market of Kazakhstan it is defined by the low percent of smart phones at consumers, the low population density, undercapacity of the 3G channel, and absence of universal access to the LTE technology that limits dynamical growth of this branch. These moments are aggravated by failures of starting commercial projects by private companies which prevent to be implemented and widely adopted to a new product among consumers. The object of the research is possible integration of wireless and program technologies at which introduction the idea can regenerate in an innovation. The analysis of existing projects in the market and the possible union of the technologies through a prism of theoretical bases of innovative activity shows that efficiency of the company by development and introduction of innovations is possible only thanks to strict observance of all terms and conditions of the innovative process which main term is profit. Despite that fact that on a global scale the innovativeness issue of companies is very popular, there are no research about possibility of innovative breaks in the field of wireless access to the Internet in the cellular market of Kazakhstan.

Keywords: innovation, the effectiveness of company, commercialization, cellular market

Procedia PDF Downloads 394
2383 The Importance of Efficient and Sustainable Water Resources Management and the Role of Artificial Intelligence in Preventing Forced Migration

Authors: Fateme Aysin Anka, Farzad Kiani

Abstract:

Forced migration is a situation in which people are forced to leave their homes against their will due to political conflicts, wars and conflicts, natural disasters, climate change, economic crises, or other emergencies. This type of migration takes place under conditions where people cannot lead a sustainable life due to reasons such as security, shelter and meeting their basic needs. This type of migration may occur in connection with different factors that affect people's living conditions. In addition to these general and widespread reasons, water security and resources will be one that is starting now and will be encountered more and more in the future. Forced migration may occur due to insufficient or depleted water resources in the areas where people live. In this case, people's living conditions become unsustainable, and they may have to go elsewhere, as they cannot obtain their basic needs, such as drinking water, water used for agriculture and industry. To cope with these situations, it is important to minimize the causes, as international organizations and societies must provide assistance (for example, humanitarian aid, shelter, medical support and education) and protection to address (or mitigate) this problem. From the international perspective, plans such as the Green New Deal (GND) and the European Green Deal (EGD) draw attention to the need for people to live equally in a cleaner and greener world. Especially recently, with the advancement of technology, science and methods have become more efficient. In this regard, in this article, a multidisciplinary case model is presented by reinforcing the water problem with an engineering approach within the framework of the social dimension. It is worth emphasizing that this problem is largely linked to climate change and the lack of a sustainable water management perspective. As a matter of fact, the United Nations Development Agency (UNDA) draws attention to this problem in its universally accepted sustainable development goals. Therefore, an artificial intelligence-based approach has been applied to solve this problem by focusing on the water management problem. The most general but also important aspect in the management of water resources is its correct consumption. In this context, the artificial intelligence-based system undertakes tasks such as water demand forecasting and distribution management, emergency and crisis management, water pollution detection and prevention, and maintenance and repair control and forecasting.

Keywords: water resource management, forced migration, multidisciplinary studies, artificial intelligence

Procedia PDF Downloads 87
2382 Reasons for Study of Evening Class Students, Faculty of Industrial Technology, Suan Sunandha Rajabhat University

Authors: Luedech Girdwichai, Ratchasak Sannok, Jeeranan Wueamprakhon

Abstract:

This research aims to study reasons for study of Evening Class Students, Faculty of Industrial Technology, Suan Sunandha Rajabhat University. Population is special program students of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University enrolled in academic year B.E. 2012. Data were collected in February 2013 from 98 students. Tool used in this research was questionnaire. Data were analyzed by statistics: percentage, mean, and standard deviation, using a computer program. The results revealed that: 1. Most of the special program students have monthly income between 10,001–20,000 Baht. Majority of the students were private company employees, working in operational level. They were mainly single and the commuting distance to the university is between 10-30 kilometers. 2. Reasons for enrolling of special program students of the Faculty of Industrial Technology, namely, career, self advancement, personal reasons and support from others received high scores. 3. Problems identified such as facilities, services, learning media and the content of the course received average scores.

Keywords: reasons, evening class students, Faculty of Industrial Technology, Suan Sunandha Rajabhat University

Procedia PDF Downloads 320
2381 The Fight against Terrorist Radicalization: A French Perspective

Authors: Julia Burchett

Abstract:

After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.

Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism

Procedia PDF Downloads 431
2380 Analyzing Soviet and Post-Soviet Contemporary Russian Foreign Policy by Applying the Theory of Political Realism

Authors: Simon Tsipis

Abstract:

In this study, we propose to analyze Russian foreign policy conduct by applying the theory of Political Realism and the qualitative comparative method of analysis. We find that the paradigm of Political Realism supplies us with significant insights into the sources of contemporary Russian foreign policy conduct since the power factor was and remains an integral element in Russian foreign policies, especially when we apply comparative analysis and compare it with the behavior of its Soviet predecessor. Through the lens of the Realist theory, a handful of Russian foreign policy-making becomes clearer and much more comprehensible.

Keywords: realism, Russia, cold war, Soviet Union, European security

Procedia PDF Downloads 119
2379 Grief and Repenting: The Engaging Remembrance in Thomas Hardy’s ‘Poems of 1912-13’

Authors: Chih-Chun Tang

Abstract:

Nostalgia, to some people, may seem foolhardy in a way. However, nostalgia is a completely and intensely private but social, collective emotion. It has continuing consequence and outgrowth for our lives as social actions. It leads people to hunt and explore remembrance of persons and places of our past in an effort to confer meaning of persons and places of present. In the ‘Poems of 1912-13’ Thomas Hardy, a British poet, composed a series of poems after the unexpected death of his long-disaffected wife, Emma. The series interprets the cognitive and emotional concussion of Emma’s death on Hardy, concerning his mind and real visit to the landscape in Cornwall, England. Both spaces perform the author’s innermost in thought to his late wife and to the landscape. They present an apparent counterpart of the poet and his afflicted conscience. After Emma had died, Hardy carried her recollections alive by roaming about in the real visit and whimsical land (space) they once had drifted and meandered. This paper highlights the nostalgias and feds that seem endlessly to crop up.

Keywords: Thomas Hardy, remembrance, psychological, poems 1912-13, Fred Davis, nostalgia

Procedia PDF Downloads 273
2378 Ethical Enhancement Strategies for Development of Mass Media Profession Conducted for the Ethical Promotion of Undergraduate Students in Communication Science

Authors: Supranee Wattanasin

Abstract:

This research study was a qualitative documentary research by using an in-depth interview with many experts in the field who has both knowledge and experience to provide information to create a strategic plan to enhance the students’ ethics. The findings revealed that there were five areas that require an attention. The five areas included honesty, accurate fact, human right, speed, and responsibility. The development of the strategic plan to enhance the ethics for students who major in communication arts can be concluded as follows. First, the government, private, and religion sectors need to come up together and set up the activities to promote the ethical standard in schools, universities, and organizations. Second, it is important to cultivate the knowledge that ethics is important of the professional jobs, especially in the mass communication and media. Third, the Philosophy of Sufficiency Economy should be brought to explain to students in order for them to have some immunity to the negative attitude such as drinking alcohol, gambling, cut classes, and cheating at exams. Fourth, experts in the field of ethics should be found to provide more knowledge to students and allow students to participate in activities that will increase their experience and knowledge of the real world problem.

Keywords: communication arts, ethics, mass communication, media, strategy

Procedia PDF Downloads 337
2377 CMT4G: Rare Form of Charcot-Marie-Tooth Disease in Slovak Roma Patient

Authors: Dana Gabriková, Martin Mistrík, Jarmila Bernasovská, Iveta Tóthová, Jana Kisková

Abstract:

The Roma (Gypsies) is a transnational minority with a high degree of consanguineous marriages. Similar to other genetically isolated founder populations, the Roma harbor a number of unique or rare genetic disorders. This paper discusses about a rare form of Charcot-Marie-Tooth disease – type 4G (CMT4G), also called Hereditary Motor and Sensory Neuropathy type Russe, an autosomal recessive disease caused by mutation private to Roma characterized by abnormally increased density of non-myelinated axons. CMT4G was originally found in Bulgarian Roma and in 2009 two putative causative mutations in the HK1 gene were identified. Since then, several cases were reported in Roma families mainly from Bulgaria and Spain. Here we present a Slovak Roma family in which CMT4G was diagnosed on the basis of clinical examination and genetic testing. This case is a further proof of the role of the HK1 gene in pathogenesis of the disease. It confirms that mutation in the HK1 gene is a common cause of autosomal recessive CMT disease in Roma and should be considered as a common part of a diagnostic procedure.

Keywords: gypsies, HK1, HSMN-Russe, rare disease

Procedia PDF Downloads 389
2376 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 149
2375 Assessing Remote and Hybrid Education Amidst the COVID-19 Pandemic: Insights and Innovations from Secondary School Educators

Authors: Azzeddine Atibi, Khadija El Kababi, Salim Ahmed, Mohamed Radid

Abstract:

The principal objective of this study is to undertake a comprehensive comparative analysis of distance learning and blended learning modalities, with a particular emphasis on evaluating their effectiveness during the confinement period mandated by the COVID-19 pandemic. This investigation is rooted in the firsthand experiences of educators at the high school and secondary levels within both private and public educational institutions. To acquire the requisite data, we meticulously designed and distributed a survey to these educators, soliciting detailed narratives of their professional experiences throughout this challenging period. The survey aims to elucidate the specific difficulties encountered by teachers, as well as to highlight the innovative pedagogical strategies they devised in response to these challenges. By synthesizing the insights garnered from this survey, our goal is to foster an exchange of experiences among educators and to generate informed recommendations that will inform future educational reforms. Ultimately, this study aspires to contribute to the ongoing discourse on optimizing educational practices in the face of unprecedented disruptions.

Keywords: distance learning, blended learning, covid 19, secondary/ high school, teachingperformance, evaluation

Procedia PDF Downloads 34
2374 The Role of Midwives in Promoting Childbearing in Respect to the Law of Population Youth in Iran

Authors: Parvin Abedi, Poorandokht Afshari

Abstract:

Introduction: In 2022, the Youth Law of the Population was notified to all organizations, including the Iranian Ministry of Health. Some of the articles of this law are about the role of midwives in health and treatment to promote childbearing. In this regard, articles number 45, 48, 49, and 50 are related to midwifery work that will be reviewed in this article. Methods: In this review, the law of population youth was reviewed. In this regard, the statistics of midwives working in the treatment and health sector were collected and analyzed according to the population youth law. Results: Nearly 47 000 midwives are working in the public and private sectors of the country and in the healthcare sector; according to Article 49, which states that there should be one midwife for every two parturient women, about 12,000 midwives are needed in the treatment department and about 8,000 midwives are needed in the health department. In Article 50 it is mentioned to modify tariffs and efficiency in order to increase natural childbirth, and in this field, insurance organizations should have sufficient cooperation with payments. The tariff for midwifery services has been increased, but it is not enough for the stressful job of midwifery. The labor incentive for delivery by midwives is also low. Conclusion: Midwives are one of the fundamental pillars of the law of the population, and without increasing the motivation of midwives, it is not possible to increase the rate of natural childbirth and make childbirth pleasant.

Keywords: law of the population, midwife, motivation, childbearing

Procedia PDF Downloads 45
2373 Multilevel Gray Scale Image Encryption through 2D Cellular Automata

Authors: Rupali Bhardwaj

Abstract:

Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.

Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient

Procedia PDF Downloads 380
2372 Assessment of Rural Youth Adoption of Cassava Production Technologies in Southwestern Nigeria

Authors: J. O. Ayinde, S. O. Olatunji

Abstract:

This study assessed rural youth adoption of cassava production technologies in Southwestern, Nigeria. Specifically, it examine the level of awareness and adoption of cassava production technologies by rural youth, determined the extent of usage of cassava production technologies available to the rural youth, examined constrains to the adoption of cassava production technologies by youth and suggested possible solutions. Multistage sampling procedure was adopted for the study. In the first stage, two states were purposively selected in southwest, Nigeria which are Osun and Oyo states due to high level of cassava production and access to cassava production technology in the areas. In the second stage, purposive sampling technique was used to select two local governments each from the states selected which are Ibarapa central (Igbo-Ora) and Ibarapa East (Eruwa) Local Government Areas (LGAs) in Oyo state; and Ife North (Ipetumodu) and Ede South (Oke Ireesi) LGAs in Osun State. In the third stage, proportionate sampling technique was used to randomly select five, four, six and four communities from the selected LGAs respectively representing 20 percent of the rural communities in them, in all 19 communities were selected. In the fourth stage, Snow ball sampling technique was used to select about 7 rural youths in each community selected to make a total of 133 respondents. Validated structured interview schedule was used to elicit information from the respondents. The data collected were analyzed using both descriptive and inferential statistics to summarize and test the hypotheses of the study. The results show that the average age of rural youths participating in cassava production in the study area is 29 ± 2.6 years and 60 percent aged between 30 and 35 years. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). The result also reveals that the average size of farm land of the respondents is 2.5 ± 0.3 hectares. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). Also, extent of usage of the technologies (r = 0.363, p ≤ 0.01) shows significant relationship with level of adoption of the technologies. Household size (b = 0.183; P ≤ 0.01) and membership of social organizations were significant at 0.01 (b = 0.331; P ≤ 0.01) while age was significant at 0.10 (b = 0.097; P ≤ 0.05). On the other hand 0.01, years of residence (b = - 0.063; P ≤ 0.01) and income (b = - 0.204; P ≤ 0.01) had negative values and implies that a unit increase in each of these variables would decrease extent of usage of the Cassava production technologies. It was concluded that the extent of usage of the technologies in the communities will affect the rate of adoption positively and this will change the negative perception of youths on cassava production thereby ensure food security in the study area.

Keywords: assessment, rural youths’, Cassava production technologies, agricultural production, food security

Procedia PDF Downloads 208
2371 A Chronological and Comparative Examination of Traditional American Post-Secondary Institutions of Higher Learning Delivery of Instruction for College Students with Autism Spectrum Disorders

Authors: Shannon Melideo

Abstract:

Post-secondary schools that provide specialized instruction for college students with special needs have been in existence for some time in the United States of America. Whether students experience learning disabilities, visual impairments, physical limitations, Autism Spectrum Disorders or any other issue that impacts their learning are able to attend universities that intentionally cater to their needs. While this selection of post-secondary education may be preferred by some students, other have sought a different experience. Over the last ten years, the number of students with Autism Spectrum Disorders (ASD) attending traditional universities in the United States of America has increased significantly. Students with ASD tend to select smaller, private institutions that appear to offer more personal attention and services. This paper will examine how traditional American universities are preparing for this relatively new group of students in their college classrooms. This paper will provide a brief historical timeline of access to university instruction for students with Autism Spectrum Disorders, and how and if students with ASD are received in colleges around the globe, and best research supported practices for success.

Keywords: autism spectrum disorders, access to learning, university instruction, accommodations

Procedia PDF Downloads 176
2370 Water and Sanitation Challenges: A Case of King Sabatha Dalindyebo Municipality

Authors: Masibulele Fiko, Sanjay Balkara, Beauty Makiwane, Samson Asoba

Abstract:

Several municipalities in the Eastern Cape Province of South Africa suffer from severe infrastructure dilapidation and a backlog in repairs and replacement. This scourge is most critical in black dominated areas, such as the rural communities and townships. Several critical service delivery activities have been impaired consequent to the deteriorating facilities and a lot of human endeavors impacted adversely. As such, this study investigated the water and sanitation challenges in King Sabatha Dalindyebo municipality, Eastern Cape Province of South Africa. Questionnaires were distributed to the communities and interviews were conducted with the communities’ leaders. The Participants mentioned that their main sources of water supply were a dam, streams, springs and wells; and the distances to the water sources were thought to be too long and women were often attacked and sometimes raped. South African local authorities are facing problems of insufficient funds to meet their daily operations. The municipality should provide street taps. The alternative way for government to supply financial aid to local authorities is to introduce the private sector in the service rendering process.

Keywords: communities, sanitation, managers, municipality

Procedia PDF Downloads 125
2369 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 164
2368 Reactive Power Cost Evaluation with FACTS Devices in Restructured Power System

Authors: A. S. Walkey, N. P. Patidar

Abstract:

It is not always economical to provide reactive power using synchronous alternators. The cost of reactive power can be minimized by optimal placing of FACTS devices in power systems. In this paper a Particle Swarm Optimization- Sequential Quadratic Programming (PSO-SQP) algorithm is applied to minimize the cost of reactive power generation along with real power generation to alleviate the bus voltage violations. The effectiveness of proposed approach tested on IEEE-14 bus systems. In this paper in addition to synchronous generators, an opportunity of FACTS devices are also proposed to procure the reactive power demands in the power system.

Keywords: reactive power, reactive power cost, voltage security margins, capability curve, FACTS devices

Procedia PDF Downloads 507
2367 An Integrated DANP-PROMETHEE II Approach for Air Traffic Controllers’ Workload Stress Problem

Authors: Jennifer Loar, Jason Montefalcon, Kissy Mae Alimpangog, Miriam Bongo

Abstract:

The demanding, professional roles that air traffic controllers (ATC) play in air transport operation provided the main motivation of this paper. As the controllers’ workload stress becomes more complex due to various stressors, the challenge to overcome these in the pursuit of improving the efficiency of controllers and safety level of aircrafts has been relevant. Therefore, in order to determine the main stressors and surface the best alternative, two widely-known multi-criteria decision-making (MCDM) methods, DANP and PROMETHEE II, are applied. The proposed method is demonstrated in a case study at Mactan Civil Aviation Authority of the Philippines (CAAP). The results showed that the main stressors are high air traffic volume, extraneous traffic, unforeseen events, limitations and reliability of equipment, noise/distracter, micro climate, bad posture, relations with supervisors and colleagues, private life conditions/relationships, and emotional conditions. In the outranking of alternatives, compartmentalization is believed to be the most preferred alternative to overcome controllers’ workload stress. This implies that compartmentalization can best be applied to reduce controller workload stress.

Keywords: air traffic controller, DANP, MCDM, PROMETHEE II, workload stress

Procedia PDF Downloads 272
2366 REDD+ and Conservation: Challenges and Opportunities of the Landscape Governance Approach

Authors: Richard Mbatu

Abstract:

Implementation of the Reducing Emissions from Deforestation and forest Degradation (REDD+) program will not only lead to significant net gains in greenhouse gas reduction but also gains in biodiversity conservation. However, the looming paradigm shift in the program in the form of the proposed landscape governance approach could change this inclination. The concern lies with the fact that pursue of carbon credits by governments and private entities under the proposed landscape approach could encourage obstinate land use behaviors that are detrimental to the cause of biodiversity conservation and ecosystem services. Yet, the landscape approach could also stimulate governments to develop and implement land use management policies for climate change adaptation and mitigation. Using two potential areas of land use under the proposed landscape approach – carbon farming in grasslands and carbon farming in plantations – this paper provides a balanced analytical review of conservation challenges and opportunities for forest governance and beyond under the proposed landscape approach to REDD+. The paper argues that such a balanced view will enable policymakers and other stakeholders to better present their arguments in their efforts to shape the course of the REDD+ program in the post-Paris Agreement era.

Keywords: biodiversity conservation, REDD+, forest governance, grasslands, landscape approach, plantations

Procedia PDF Downloads 368
2365 Health Expenditure and Household Age Composition in India: Consequences for Health System Development

Authors: Milind Bharambe, Chander Shekhar

Abstract:

India is a vast country with its 1.21 billion population at the dawn of new decade, which accounts for one sixth of the global human capital in the world today. It is well known that health expenditure in India is dominated by private spending. This is an unfortunate consequence of India’s development because of large positive externality associated with health spending, which make health a merit good. This paper has used data from NSSO and Indian Government’s spending on health as reported by Ministry of Health and Family Welfare. Understanding of the dynamism of age-structure of the population would greatly optimize the expenditure on health care services. A country with good public health indicators is bound to possess good human capital which is an asset to the economic growth and indicator of development status of country. The paper tries to present the linkages between the health expenditure incurred by different states at various levels of demographic transition levels and the efficiency in utilization of health expenditure. It also looks into the way in which allocative efficiency health services can be improved. Paper tries to explore the per capita spending on health and how the demographic transition taking place in different states of India affect the required quantity and quality of health services.

Keywords: age structure, demographic transition, health expenditure, morbidity

Procedia PDF Downloads 405
2364 Investigating the Contemporary Architecture Education Challenges in India

Authors: Vriddhi Prasad

Abstract:

The paper briefly outlines the nature of contemporary Architecture Education in India and its present challenges with theoretically feasible solutions. It explores in detail the arduous position of architecture education owing to, privatization of higher education institutes in India, every changing demand of the technology driven industry and discipline, along with regional and cultural resources that should be explored academically for the enrichment of graduates. With the government's education policy of supporting privatization, a comprehensive role for the regulating body of Architecture Education becomes imperative. The paper provides key insights through empirical research into the nature of these roles and the areas which need attention in light of the problems. With the aid of critically acclaimed education model like Design Build, contextual retrofits for Indian institutes can be stressed for inclusion in the curriculum. The pairing of a private institute and public industry/research body and vice versa can lead to pro-economic and pro-social research environment. These reforms if stressed by an autonomous nationwide regulating body rather than the state will lead to uniformity and flexibility of curriculum which promotes the creation of fresh graduates who are adaptable to the changing needs.

Keywords: architecture education, building information modelling, design build, pedagogy

Procedia PDF Downloads 226
2363 Resiliency, Peer and Parental Support as Determinants of Adolescents' Social Adjustment among Secondary Students in Ilorin, Kwara State

Authors: Titilola Adebowale

Abstract:

Some factors are responsible for the social adjustment among the adolescents. The study investigated resiliency, peer and parental support as factors that could determine social adjustment among adolescents in Ilorin, Kwara state. The study adopted descriptive survey research design. A sample size of 300 SS1 & SS2 students from ten secondary schools, six public and four private schools were randomly selected within Ilorin Metropolis. Self-structured questionnaire that was validated and the reliability ensured was used to collect data from the respondents. Four hypotheses were postulated and tested at 0.05 level of significance. Data collected was analysed using Pearson Product Moment Correlation (PPMC) and Regression Analysis. The findings revealed that there was a positive relationship between resiliency and social adjustment: r (298) = .402, p<0.01, r2 = .162; that there was a positive relationship between peer support and social adjustment: r (298) = .570, p<0.01, r2 = .325; that there was a positive relationship between parental support and social adjustment: r (298) = .451, p<0.01, r2 = .203; also reveals significant joint contribution of the independent variables (resilience, peer support, parental support) to the prediction of social adjustment: F (3,296) = 55.587, P<0.01. Various recommendations were given which includes the roles of government, agencies, individuals, parents, teachers, religious and marriage institutions.

Keywords: resiliency, peer support, parental support, adolescents, social adjustment

Procedia PDF Downloads 178