Search results for: public order and security act
18443 Integrated Risk Management in The Supply Chain of Essential Medicines in Zambia
Authors: Mario M. J. Musonda
Abstract:
Access to health care is a human right, which includes having timely access to affordable and quality essential medicines at the right place and in sufficient quantity. However, inefficient public sector supply chain management contributes to constant shortages of essential medicines at health facilities. Literature review involved a desktop study of published research studies and reports on risk management, supply chain management of essential medicines and their integration to increase the efficiency of the latter. The research was conducted on a sample population of offices under Ministry of Health Headquarters, Lusaka Provincial and District Offices, selected health facilities in Lusaka, Medical Stores Limited, Zambia Medicines Regulatory Authority and Cooperating Partners. Individuals involved in study were selected judgmentally by their functions under selection and quantification, regulation, procurement, storage, distribution, quality assurance, and dispensing of essential medicines. Structured interviews and discussions were held with selected experts and self-administered questionnaires were distributed. Collected and analysed data of 35 returned and usable questionnaires from the 50 distributed. The highest prioritised risks were; inadequate and inconsistent fund disbursements, weak information management systems, weak quality management systems and insufficient resources (HR and infrastructure) among others. The results for this research can be used to increase the efficiency of the public sector supply chain of essential medicines and other pharmaceuticals. The results of the study showed that there is need to implement effective risk management systems by participating institutions and organisations to increase the efficiency of the entire supply chain in order to avoid and/or reduce shortages of essential medicines at health facilities.Keywords: essential medicine, risk assessment, risk management, supply chain, supply chain risk management
Procedia PDF Downloads 44618442 Natural Hazards and Their Costs in Albanian Part of Ohrid Graben
Authors: Mentor Sulollari
Abstract:
Albania, according to (UNU-EHS) United Nations University, Institute for Environment and Human Security studies for 2015, is listed as the number one country in Europe for the possibility to be caught by natural catastrophes. This is conditioned by unstudied human activity, which has seriously damaged the environment. Albanian part of Ohrid graben that lies in Southeast of Albania, is endangered by landslides and floods, as a result of uncontrolled urban development and low level of investment in infrastructure, rugged terrain in its western part and capricious climate caused by global warming. To be dealt with natural disasters, which cause casualties and material damage, it is important to study them in order to anticipate and reduce damages in future. As part of this study is the construction of natural hazards map, which show us where they are distributed, and which are the vulnerable areas. This article will also be dealing with socio-economic and environmental costs of those events and what are the measures to be taken to reduce them.Keywords: flooding, landslides, natural catastrophes mapping, Pogradec, lake Ohrid, Albanian part of Ohrid graben
Procedia PDF Downloads 30018441 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 8818440 Optimality of Shapley Value Mechanism under Sybil Strategies
Authors: Bruno Mazorra Roig
Abstract:
In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.Keywords: game theory, mechanism design, cost sharing, false-name proofness
Procedia PDF Downloads 6818439 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System
Authors: Stephen Wheat
Abstract:
Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.Keywords: mobile app management, governance, distribution, information security
Procedia PDF Downloads 30218438 Ads on Social Issues: A Tool for Improving Critical Thinking Skills in a Foreign Language Classroom
Authors: Fonseca Jully, Chia Maribel, Rodríguez Ilba
Abstract:
This paper is a qualitative research report. A group of students form a public university in a small town in Colombia participated in this study which aimed at describing to what extend the use of social ads, published on the internet, helped to develop their critical thinking skills. Students’ productions, field notes, video recordings and direct observation were the instruments and techniques used by the researches in order to gather the data which was analyzed under the principles of grounded theory and triangulation. The implementation of social ads into the classroom evidenced a noticeable improvement in students’ ability to interpret and argue social issues, as well as, their self-improvement in oral and written production in English, as a foreign language.Keywords: Ads, critical argumentation, critical thinking, social issues
Procedia PDF Downloads 34018437 Popular Modern Devotional Prints: The Construction of Identity between the Visual and Viewer in Public Interaction Spaces
Authors: Muhammad Asghar, Muhammad Ali, Farwah Batool
Abstract:
Despite the general belief in Islam that figural representations should be avoided, particularly propagated by the Deobandis, a religious group influenced by Salafi and Wahhabi ideas, nevertheless the public interaction spaces such as Shops and offices are decorated with popular, mass-produced, modern devotional prints. This study seeks to focus on popular visual culture, its display in public interaction places such as shops and discusses how people establish relationships with images. The method adopted was basically ethnographic: to describe as precisely and completely as possible the phenomena to be studied, using the language and conceptual categories of the interlocutors themselves. This study has been enriched by ethnographic field research conducted during the months from October to December 2015 in the major cities of Punjab and their brief forays and surroundings where we explored how seeing upon images performs religious identity within the public space. The study examines the pattern of aesthetics and taste in the shops of especially common people whose sensibilities have not been refined or influenced by being exposed to any narrative or fine arts. Furthermore, it is our intention to question the general beliefs and opinions in the context of popular practices, the way in which people relate to these prints. The interpretations and analyses presented in this study illuminate how people create meaning through the display of such items of material culture in the immediate settings of their spaces. This study also seeks to demonstrate how popular Islam is practiced, transformed and understood through the display of popular representations of popular figures of piety like Sufi saints or their shrines are important to many believers and thus occupy important places in their shops. The findings are supported with empirical evidence and based on interviews with the shopkeepers, owners and office employees. Looking upon those popular modern devotional prints keeps people’s reverence of the personages alive. Because of their sacred themes they affect a relationship between the saint and the beholders as well as serve to symbolize and reinforce their belief since they become powerful loci of emotional attachment. Collectively such devotional prints satisfy a local taste to help people establish contact with God through the saints’ intercession in order to receive protection and benediction, and help in spiritual, mental and material problems. By putting all these facets of belief together we gain an insight into both the subjective and cognizant role that icons’ of saints play in the lives of believers. Their veneration through ingeniously contrived modern means of production makes a significant contribution to an understanding of how such imagery promotes a powerful belief in Sufi saints, which ultimately gives indications of how popular Islam is practiced and understood at its gross roots level.Keywords: ethnographic field research, popular visual culture, protected space, religious identity
Procedia PDF Downloads 22818436 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius
Abstract:
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal
Procedia PDF Downloads 49018435 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 15018434 Barrier to Implementing Public-Private Mix Approach for Tuberculosis Case Management in Nepal
Authors: R. K. Yadav, S. Baral, H. R. Paudel, R. Basnet
Abstract:
The Public-Private Mix (PPM) approach is a strategic initiative that involves engaging all private and public healthcare providers in the fight against tuberculosis using international healthcare standards. For tuberculosis control in Nepal, the PPM approach could be a milestone. This study aimed to explore the barriers to a public-private mix approach in the management of tuberculosis cases in Nepal. A total of 20 respondents participated in the study. Barriers to PPM were identified in the following three themes: 1) Obstacles related to TB case detection, 2) Obstacles related to patients, and 3) Obstacles related to the healthcare system. PPM implementation was challenged by following subthemes that included staff turnover, low private sector participation in workshops, a lack of training, poor recording and reporting, insufficient joint monitoring and supervision, poor financial benefit, lack of coordination and collaboration, and non-supportive TB-related policies and strategies. The study concludes that numerous barriers exist in the way of effective implementation of the PPM approach, including TB cases detection barriers such as knowledge of TB diagnosis and treatment, HW attitude, workload, patient-related barriers such as knowledge of TB, self-medication practice, stigma and discrimination, financial status, and health system-related barriers such as staff turnover and poor engagement of the private sector in workshops, training, recording, and re-evaluation. Government stakeholders must work together with private sector stakeholders to perform joint monitoring and supervision. Private practitioners should receive training and orientation, and presumptive TB patients should be given adequate time and counseling as well as motivation to visit a government health facility.Keywords: barrier, tuberculosis, case finding, PPM, nepal
Procedia PDF Downloads 11218433 Predicting Destination Station Based on Public Transit Passenger Profiling
Authors: Xuyang Song, Jun Yin
Abstract:
The smart card has been an extremely universal tool in public transit. It collects a large amount of data on buses, urban railway transit, and ferries and provides possibilities for passenger profiling. This paper combines offline analysis of passenger profiling and real-time prediction to propose a method that can accurately predict the destination station in real-time when passengers tag on. Firstly, this article constructs a static database of user travel characteristics after identifying passenger travel patterns based on the Density-Based Spatial Clustering of Applications with Noise (DBSCAN). The dual travel passenger habits are identified: OD travel habits and D station travel habits. Then a rapid real-time prediction algorithm based on Transit Passenger Profiling is proposed, which can predict the destination of in-board passengers. This article combines offline learning with online prediction, providing a technical foundation for real-time passenger flow prediction, monitoring and simulation, and short-term passenger behavior and demand prediction. This technology facilitates the efficient and real-time acquisition of passengers' travel destinations and demand. The last, an actual case was simulated and demonstrated feasibility and efficiency.Keywords: travel behavior, destination prediction, public transit, passenger profiling
Procedia PDF Downloads 2118432 Factors Affecting Citizens’ Behavioural Intention to Use E-voter Registration and Verification System Towards the Electoral Process in Nigeria
Authors: Aishatu Shuaibu
Abstract:
It is expected that electronic voter registration and verification in Nigeria will enhance the integrity of elections, which is vital for democratic development; it is also expected to enhance efficiency, transparency, and security. However, the reasons for citizens' intentions with respect to behavioral use of such platforms have not been studied in the literature much. This paper, therefore, intends to look into significant characteristics affecting the acceptance and use of e-voter technology among Nigerian residents. Data will be collected using a structured questionnaire from several local government areas (LGAs) around Nigeria to evaluate the influence of demographic characteristics, technology usability, security perceptions, and governmental education on the intention to implement e-voter systems. The results will offer vital insights into the barriers and drivers of voter technology acceptance, aiding in policy suggestions to enhance voter registration and verification processes within Nigeria's electoral framework. This study is designed to aid electoral stakeholders in devising successful strategies for encouraging the broad deployment of e-voter systems in Nigeria.Keywords: e-governance, e-voting, e-democracy, INEC, Nigeria
Procedia PDF Downloads 2618431 Prediction of Terrorist Activities in Nigeria using Bayesian Neural Network with Heterogeneous Transfer Functions
Authors: Tayo P. Ogundunmade, Adedayo A. Adepoju
Abstract:
Terrorist attacks in liberal democracies bring about a few pessimistic results, for example, sabotaged public support in the governments they target, disturbing the peace of a protected environment underwritten by the state, and a limitation of individuals from adding to the advancement of the country, among others. Hence, seeking for techniques to understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities is the topmost priority of the government in every country. This research aim is to develop an efficient deep learning-based predictive model for the prediction of future terrorist activities in Nigeria, addressing low-quality prediction accuracy problems associated with the existing solution methods. The proposed predictive AI-based model as a counterterrorism tool will be useful by governments and law enforcement agencies to protect the lives of individuals in society and to improve the quality of life in general. A Heterogeneous Bayesian Neural Network (HETBNN) model was derived with Gaussian error normal distribution. Three primary transfer functions (HOTTFs), as well as two derived transfer functions (HETTFs) arising from the convolution of the HOTTFs, are namely; Symmetric Saturated Linear transfer function (SATLINS ), Hyperbolic Tangent transfer function (TANH), Hyperbolic Tangent sigmoid transfer function (TANSIG), Symmetric Saturated Linear and Hyperbolic Tangent transfer function (SATLINS-TANH) and Symmetric Saturated Linear and Hyperbolic Tangent Sigmoid transfer function (SATLINS-TANSIG). Data on the Terrorist activities in Nigeria gathered through questionnaires for the purpose of this study were used. Mean Square Error (MSE), Mean Absolute Error (MAE) and Test Error are the forecast prediction criteria. The results showed that the HETFs performed better in terms of prediction and factors associated with terrorist activities in Nigeria were determined. The proposed predictive deep learning-based model will be useful to governments and law enforcement agencies as an effective counterterrorism mechanism to understand the parameters of terrorism and to design strategies to deal with terrorism before an incident actually happens and potentially causes the loss of precious lives. The proposed predictive AI-based model will reduce the chances of terrorist activities and is particularly helpful for security agencies to predict future terrorist activities.Keywords: activation functions, Bayesian neural network, mean square error, test error, terrorism
Procedia PDF Downloads 16818430 Using Composite Flour in Bread Making: Cassava and Wheat Flour
Authors: Aishatu Ibrahim, Ijeoma Chinyere Ukonu
Abstract:
The study set out to produce bread using composite cassava flour. The main objective of the work is to determine the possibility of using composite cassava flour in bread production and to find out whether it is acceptable in the hospitality industry and by the general public. The research questions were formed and analyzed. A sample size of 10 professional catering judges was used in the department of hospitality management/food science and technology. Relevant literature was received. Data collected was analyzed using mean deviation. Product A which is 20% cassava flour and 80% wheat flour product, and D which is 100% wheat flour product were competing with high acceptability. It was observed that the composite cassava dough needed to be allowed to proof for a longer period. Lastly, the researcher recommends that the caterers should be encouraged to use composite cassava flour in the production of bread in order to reduce cost.Keywords: bread, cassava, flour, wheat
Procedia PDF Downloads 34218429 The Role of Marketing in the Promotion of the Istanbul Brand
Authors: Ipek Krom, Nurdan Tumbek Tekeoglu
Abstract:
In our globalizing world increased competition between cities have resulted in expanding investments in marketing activities. In order to promote tourism and reinvestments, the cities have been using marketing activities to create more attractive sites and make use of their resources more efficiently. In becoming a branded city marketing activities play a major role in building brand value, which in turn results in the attraction of newcomers, revisits, settlements, reinvestments and the development of the city. This paper focuses on the Istanbul brand, which carries an important role in the promotion of Turkey as being its cultural, economic and financial center. As one of the most historical and appealing metropolitans in the world with remains of ancient civilizations, Istanbul has attracted 11 million 843 thousand tourists in 2014. Increasing number of marketing activities developed by numerous actors of private and public sector are among the reasons why tourists prefer Istanbul. Among these reasons we can list the increasing number of hotels, developed infrastructure and better transportation, modern shopping malls, international festivals, exportation of Turkish TV series, gastronomy investments, congress tourism, health tourism, student exchange programs, expatriation opportunities, recreational activities and new tourism destinations. In this paper we explore the marketing activities in Istanbul in order to make the city of the most visited metropolitans in the world. Decision making people in the tourism sector have been interviewed to provide better insight to the addressed topics.Keywords: brand cities, marketing, tourism in istanbul, tourism marketing
Procedia PDF Downloads 33418428 Deployment of Armed Soldiers in European Cities as a Source of Insecurity among Czech Population
Authors: Blanka Havlickova
Abstract:
In the last ten years, there are growing numbers of troops with machine guns serving on streets of European cities. We can see them around government buildings, major transport hubs, synagogues, galleries and main tourist landmarks. As the main purpose of armed soldier’s presence in European cities authorities declare the prevention of terrorist attacks and psychological support for tourists and domestic population. The main objective of the following study is to find out whether the deployment of armed soldiers in European cities has a calming and reassuring effect on Czech citizens (if the presence at armed soldiers make the Czech population feel more secure) or rather becomes a stress factor (the presence of soldiers standing guard in full military fatigues recalls serious criminality and terrorist attacks which are reflected in the fears and insecurity of Czech population). The initial hypothesis of this study is connected with the priming theory, the idea that when we are exposed to an image (armed soldier), it makes us unconsciously focus on a topic connected with this image (terrorism). This paper is based on a quantitative public survey, which was carried out in the form of electronic questioning among the citizens of the Czech Republic. Respondents answered 14 questions about two European cities – London and Paris. Besides general questions investigating the respondents' awareness of these cities, some of the questions focused on the fear that the respondents had when picturing themselves leaving next Monday for the given city (London or Paris). The questions asking about respondent´s travel fears and concerns were accompanied by different photos. When answering the question about fear some respondents have been presented with a photo of Westminster Palace and the Eiffel with ordinary citizens while other respondents have been presented with a picture of the Westminster Palace, the and Eiffel's tower not only with ordinary citizens, but also with one soldier holding a machine gun. The main goal of this paper is to analyse and compare data about concerns for these two groups of respondents (presented with different pictures) and find out if and how an armed soldier with a machine gun in front of the Westminster Palace or the Eiffel Tower affects the public's concerns about visiting the site. In other words, the aim of this paper is to confirm or rebut the hypothesis that the look at a soldier with a machine gun in front of the Eiffel Tower or the Westminster Palace automatically triggers the association with a terrorist attack leading to an increase in fear and insecurity among Czech population.Keywords: terrorism, security measures, priming, risk perception
Procedia PDF Downloads 25218427 Making a Resilient Livable City: Explorations of Smart Management Mechanism for Aging Society’s Disaster Prevention
Authors: Wei-Kuang Liu, Ya-Hsu Chiang
Abstract:
In the coming of an aging society, the issues of living quality, health care, and social security for the elderly have been gradually taken seriously. In order to maintain favorable living condition, urban societies are also facing the challenge of disasters caused by extreme climate change. However, in the practice of disaster prevention, elderly people are always weak due to their physiological conditions. That is to say, in the planning of resilient urbanism, the aging society is relatively in need of more care. Thus, this research aims to map areas where have high-density elderly population and fragile environmental condition in Taiwan, and to understand the actual situation of disaster prevention management in these areas, so as to provide suggestions for the development of intellectual resilient urban management. The research takes the cities of Taoyuan and Taichung as examples for explorations. According to GIS mapping of areas with high aging index, high-density population and high flooding potential, the communities of Sihai and Fuyuan in Taoyuan and the communities of Taichang and Nanshih in Taichung are highlighted. In these communities, it can be found that there are more elderly population and less labor population with high-density living condition. In addition, they are located in the areas where they have experienced severe flooding in the recent past. Based on a series of interviews with community organizations, there is only one community out of the four using flood information mobile app and Line messages for the management of disaster prevention, and the others still rely on the traditional approaches that manage the works of disaster prevention by their community security patrol teams and community volunteers. The interview outcome shows that most elderly people are not interested in learning the use of intellectual devices. Therefore, this research suggests to keep doing the GIS mapping of areas with high aging index, high-density population and high flooding potential for grasping the high-risk communities and to help develop smart monitor and forecast systems for disaster prevention practice in these areas. Based on case-study explorations, the research also advises that it is important to develop easy-to-use bottom-up and two-way immediate communication mechanism for the management of aging society’s disaster prevention.Keywords: aging society, disaster prevention, GIS, resilient, Taiwan
Procedia PDF Downloads 11818426 Developing Urban Design and Planning Approach to Enhance the Efficiency of Infrastructure and Public Transportation in Order to Reduce GHG Emissions
Authors: A. Rostampouryasouri, A. Maghoul, S. Tahersima
Abstract:
The rapid growth of urbanization and the subsequent increase in population in cities have resulted in the destruction of the environment to cater to the needs of citizens. The industrialization of urban life has led to the production of pollutants, which has significantly contributed to the rise of air pollution. Infrastructure can have both positive and negative effects on air pollution. The effects of infrastructure on air pollution are complex and depend on various factors such as the type of infrastructure, location, and context. This study examines the effects of infrastructure on air pollution, drawing on a range of empirical evidence from Iran and China. Our paper focus for analyzing the data is on the following concepts: 1. Urban design and planning principles and practices 2. Infrastructure efficiency and optimization strategies 3. Public transportation systems and their environmental impact 4. GHG emissions reduction strategies in urban areas 5. Case studies and best practices in sustainable urban development This paper employs a mixed methodology approach with a focus on developmental and applicative purposes. The mixed methods approach combines both quantitative and qualitative research methods to provide a more comprehensive understanding of the research topic. A group of 20 architectural specialists and experts who are proficient in the field of research, design, and implementation of green architecture projects were interviewed in a systematic and purposeful manner. The research method was based on content analysis using MAXQDA2020 software. The findings suggest that policymakers and urban planners should consider the potential impacts of infrastructure on air pollution and take measures to mitigate negative effects while maximizing positive ones. This includes adopting a nature-based approach to urban planning and infrastructure development, investing in information infrastructure, and promoting modern logistic transport infrastructure.Keywords: GHG emissions, infrastructure efficiency, urban development, urban design
Procedia PDF Downloads 8318425 The Reach, Influence, and Acceptance of International Media Institutions in Local Language Broadcasting in Africa: A Case Study of VOA, DW, and BBC Amharic Services in Ethiopia
Authors: Aster Misganaw
Abstract:
This study investigates the reach, influence, and credibility of international broadcasters—specifically Voice of America (VOA), Deutsche Welle (DW), and British Broadcasting Corporation (BBC)—among Ethiopian audiences, comparing these perceptions to local media sources. Utilizing a mixed-methods approach that included quantitative surveys and qualitative interviews, the research reveals that the majority of respondents engage regularly with international broadcasters, with younger audiences showing a marked preference. Findings indicate that most of the participants perceive these international sources as more credible than local media, largely due to concerns over government influence on local reporting. Furthermore, the study finds that the majority of respondents believe international broadcasters significantly shape their understanding of both domestic and international issues, highlighting their critical role in public discourse. To enhance their relevance, it is recommended that international broadcasters incorporate more localized content while local media must work to improve their credibility and independence to better serve the Ethiopian public. This research contributes to the understanding of media consumption dynamics in Ethiopia, emphasizing the interplay between local and international narratives in shaping public opinion.Keywords: international media, BBC, Deutsche Welle, Ethiopian media, Voice of America, audience
Procedia PDF Downloads 1818424 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries
Authors: Karolin Bauer, Anna Brinkmann
Abstract:
Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster
Procedia PDF Downloads 33918423 Death Anxiety and Well-being in Doctors during COVID-19: The Explanatory and Boosting Roles of Depression and Work Locality
Authors: Mamoona Mushtaq, Komal Meher
Abstract:
The COVID-19 pandemic, a global public health crisis, has triggered anxiety and fear of death in the public, particularly among health professionals. This study aimed to assess the direct and mediated associations between death anxiety, sleep quality, and subjective well-being in doctors working during the pandemic. Another aim was tested to analyze the interactive role of workplace locality in these associations. An indirect-effect model was tested on a sample of 244 doctors working during the pandemic. Findings revealed that the association between death anxiety and subjective well-being was mediated through depression. The theoretical and practical implications of the findings are discussed.Keywords: death anxiety, depression, subjective well-being, working locality
Procedia PDF Downloads 14218422 Modeling the Saltatory Conduction in Myelinated Axons by Order Reduction
Authors: Ruxandra Barbulescu, Daniel Ioan, Gabriela Ciuprina
Abstract:
The saltatory conduction is the way the action potential is transmitted along a myelinated axon. The potential diffuses along the myelinated compartments and it is regenerated in the Ranvier nodes due to the ion channels allowing the flow across the membrane. For an efficient simulation of populations of neurons, it is important to use reduced order models both for myelinated compartments and for Ranvier nodes and to have control over their accuracy and inner parameters. The paper presents a reduced order model of this neural system which allows an efficient simulation method for the saltatory conduction in myelinated axons. This model is obtained by concatenating reduced order linear models of 1D myelinated compartments and nonlinear 0D models of Ranvier nodes. The models for the myelinated compartments are selected from a series of spatially distributed models developed and hierarchized according to their modeling errors. The extracted model described by a nonlinear PDE of hyperbolic type is able to reproduce the saltatory conduction with acceptable accuracy and takes into account the finite propagation speed of potential. Finally, this model is again reduced in order to make it suitable for the inclusion in large-scale neural circuits.Keywords: action potential, myelinated segments, nonlinear models, Ranvier nodes, reduced order models, saltatory conduction
Procedia PDF Downloads 16418421 Stakeholder Engagement to Address Urban Health Systems Gaps for Migrants
Authors: A. Chandra, M. Arthur, L. Mize, A. Pomeroy-Stevens
Abstract:
Background: Lower and middle-income countries (LMICs) in Asia face rapid urbanization resulting in both economic opportunities (the urban advantage) and emerging health challenges. Urban health risks are magnified in informal settlements and include infectious disease outbreaks, inadequate access to health services, and poor air quality. Over the coming years, urban spaces in Asia will face accelerating public health risks related to migration, climate change, and environmental health. These challenges are complex and require multi-sectoral and multi-stakeholder solutions. The Building Health Cities (BHC) program is funded by the United States Agency for International Development (USAID) to work with smart city initiatives in the Asia region. BHC approaches urban health challenges by addressing policies, planning, and services through a health equity lens, with a particular focus on informal settlements and migrant communities. The program works to develop data-driven decision-making, build inclusivity through stakeholder engagement, and facilitate the uptake of appropriate technology. Methodology: The BHC program has partnered with the smart city initiatives of Indore in India, Makassar in Indonesia, and Da Nang in Vietnam. Implementing partners support municipalities to improve health delivery and equity using two key approaches: political economy analysis and participatory systems mapping. Political economy analyses evaluate barriers to collective action, including corruption, security, accountability, and incentives. Systems mapping evaluates community health challenges using a cross-sectoral approach, analyzing the impact of economic, environmental, transport, security, health system, and built environment factors. The mapping exercise draws on the experience and expertise of a diverse cohort of stakeholders, including government officials, municipal service providers, and civil society organizations. Results: Systems mapping and political economy analyses identified significant barriers for health care in migrant populations. In Makassar, migrants are unable to obtain the necessary card that entitles them to subsidized health services. This finding is being used to engage with municipal governments to mitigate the barriers that limit migrant enrollment in the public social health insurance scheme. In Indore, the project identified poor drainage of storm and wastewater in migrant settlements as a cause of poor health. Unsafe and inadequate infrastructure placed residents of these settlements at risk for both waterborne diseases and injuries. The program also evaluated the capacity of urban primary health centers serving migrant communities, identifying challenges related to their hours of service and shortages of health workers. In Da Nang, the systems mapping process has only recently begun, with the formal partnership launched in December 2019. Conclusion: This paper explores lessons learned from BHC’s systems mapping, political economy analyses, and stakeholder engagement approaches. The paper shares progress related to the health of migrants in informal settlements. Case studies feature barriers identified and mitigating steps, including governance actions, taken by local stakeholders in partner cities. The paper includes an update on ongoing progress from Indore and Makassar and experience from the first six months of program implementation from Da Nang.Keywords: informal settlements, migration, stakeholder engagement mapping, urban health
Procedia PDF Downloads 12118420 Factors Influencing Intention to Engage in Long-term Care Services among Nursing Aide Trainees and the General Public
Authors: Ju-Chun Chien
Abstract:
Rapid aging and depopulation could lead to serious problems, including workforce shortages and health expenditure costs. The current and predicted future LTC workforce shortages could be a real threat to Taiwan’s society. By means of comparison of data from 144 nursing aide trainees and 727 general public, the main purpose of the present study was to determine whether there were any notable differences between the two groups toward engaging in LTC services. Moreover, this study focused on recognizing the attributes of the general public who had the willingness to take LTC jobs but continue to ride the fence. A self-developed questionnaire was designed based on Ajzen’s Theory of Planned Behavior model. After conducting exploratory factor analysis (EFA) and reliability analysis, the questionnaire was a reliable and valid instrument for both nursing aide trainees and the general public. The main results were as follows: Firstly, nearly 70% of nursing aide trainees showed interest in LTC jobs. Most of them were middle-aged female (M = 46.85, SD = 9.31), had a high school diploma or lower, had unrelated work experience in healthcare, and were mostly unemployed. The most common reason for attending the LTC training program was to gain skills in a particular field. The second most common reason was to obtain the license. The third and fourth reasons were to be interested in caring for people and to increase income. The three major reasons that might push them to leave LTC jobs were physical exhaustion, payment is bad, and being looked down on. Secondly, the variables that best-predicted nursing aide trainees’ intention to engage in LTC services were having personal willingness, perceived behavior control, with high school diploma or lower, and supported from family and friends. Finally, only 11.80% of the general public reported having interest in LTC jobs (the disapproval rating was 50% for the general public). In comparison to nursing aide trainees who showed interest in LTC settings, 64.8% of the new workforce for LTC among the general public was male and had an associate degree, 54.8% had relevant healthcare experience, 67.1% was currently employed, and they were younger (M = 32.19, SD = 13.19) and unmarried (66.3%). Furthermore, the most commonly reason for the new workforce to engage in LTC jobs were to gain skills in a particular field. The second priority was to be interested in caring for people. The third and fourth most reasons were to give back to society and to increase income, respectively. The top five most commonly reasons for the new workforce to quitting LTC jobs were listed as follows: physical exhaustion, being looked down on, excessive working hours, payment is bad, and excessive job stress.Keywords: long-term care services, nursing aide trainees, Taiwanese people, theory of planned behavior
Procedia PDF Downloads 16018419 Oral Health of Tobacco Chewers: A Cross-Sectional Study in Karachi, Pakistan
Authors: Warsi A. Ibrahim, Qureshi A. Ambrina, Younus M. Anjum
Abstract:
Introduction: Oral lesions related to commercially available Smokeless Tobacco (ST), such as, Pan, Gutka, Mahwa, Naswar is considered a serious challenge for dental health care providers in Pakistan. Majority of labored Pakistani population consume ST, where public transporters and drivers are no exception. It was necessary to identify individuals of this particular population group and screen their oral health and early signs of pre-cancerous lesions so that appropriate preventive measures could be taken to reduce the burden on health providers. Aim of Study: To estimate Prevalence of ST consumption and perception of use, and to evaluate Oral Health status among public drivers of Karachi. Material & methods: A cross-sectional study survey was conducted over duration of 2 months, through convenient sampling. Sample size (n=615) of public drivers (age > 18 years) all over Karachi was gathered. A structured proforma was used to record socio-demographics, addiction profile, perception of use and oral health status (oral lesions, oral sub-mucosal fibrosis and dental caries) of study participants. Data was entered and analyzed using SPSS version 16.0 using descriptive statistics only. Results: Prevalence of ST consumption among the study participants was figured to 92.5%. Out of these almost 70% suffered from one or the other form of oral lesion(s). Four major types of ST consumption were observed out of which 60 % of oral lesion were related to Gutka chewers showing early signs of oral cancer. In addition, occurrence of Oral sub-mucosal fibrosis (OSF) was found to be significantly high around 54.8%. Overall dental caries status was also high, showing on an average 5 teeth of an individual were decayed, missing or filled deviating from WHO normal criteria (mean < 3). It was thus proven from the study that public drivers relied on oral tobacco consumption because it helps them ‘Improve consciousness’ (p-value: < 0.01; using chi-square test). Multivariate analysis showed that there were higher prevalence of smokeless tobacco among highway drivers versus local drivers (A.O.R: 2.82 [0.83-9.61], p-value: < 0.01) Conclusion: Smokeless tobacco (ST) consumption has a direct effect on oral health. However, the type of ST, the duration of consumption are factors which are directly related to the severity. Moreover, Gutka may be considered as having most lethal effects on oral health which may lead to oral cancer and affect individual’s quality of life. Specific preventive programs must be undertaken to reduce the consumption of Gutka among public transporters and drivers.Keywords: smokeless tobacco, oral lesions, drivers, public transporters
Procedia PDF Downloads 31018418 Internalising Islamic Principles of Theocracy as a Pedestal for Good Governance in Nigeria
Authors: Busari Moshood Olanyi
Abstract:
Good governance remains the expectation of every political party in power, especially in this democratic dispensation of the Nigerian Nation. The need to ensure that the citizenry enjoys the dividends of democracy as often promised during various electioneering campaigns is envisioned to be the motif for different agendas and political slogans by different administrations. Unfortunately, different political agendas towards the security of lives and properties, halting the pillage of the economy by corrupt public officials and creation of employment opportunities for the youths, have a record of setback in the history of political leadership and governance in Nigeria. Therefore, the paper examined the principles of Islamic theocracy in its advocacy for a paradigm shift in the Nigerian political system, with a view to engendering good governance. Islamic political terms such as Shūrā (mutual consultation), ‘Adālah (equality and justice), Khilāfah (succession and stewardship) Majlis ash-Shūrā (consultative forum) and Muḥāsabah (accountability) were espoused as sacrosanct to implementing Islamic theocracy as an alternative system of government in Nigeria. The paper concluded by being flexible on the nomenclature of the suggested political system, considering the multi-religious nature of the country as a political entity. Among other recommendations, infusion of politics into our moral/religious system and not the other way round was considered a good step in the direction of a political paradigm shift for ensuring good governance and guaranteeing its sustainability in Nigeria.Keywords: Nigerian nation, democracy, good governance, Islamic theocracy, paradigm shift
Procedia PDF Downloads 14818417 Banking and Accounting Analysis Researches Effect on Environment
Authors: Marina Magdy Naguib Karas
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 5218416 Expert System: Debugging Using MD5 Process Firewall
Authors: C. U. Om Kumar, S. Kishore, A. Geetha
Abstract:
An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization
Procedia PDF Downloads 42818415 Strategic Communication in Turkish Independence War
Authors: Özkan Özgenç, Serdar Hacisalihoğlu, Murat Yanik
Abstract:
History has shown that quantitative and qualitative supremacy in terms of military and economic power has been inadequate to reach the desired results. In addition, public support has been a crucial requirement for the success of the any struggle. As a leader seeking ways for the independence of the country, Ataturk comprehended that the only solution was possible with the help of public will and determination. Ataturk needed an impeccable communication strategy to combine efforts by establishing a united notion and action; to convince the world and Turkish nation of the legitimacy and sacredness of Independence struggle; and to show the resolution and determination of Turkish nation against the invaders. To emancipate the Turkish nation, Ataturk shaped the nation's emotions, ideas, and behaviors by using the most appropriate tools at the best time and place since the start of Independence War in May 19, 1919.Keywords: Atatürk, Turkish independence struggle, strategic communication, independence war
Procedia PDF Downloads 29618414 Providing a Road Pricing and Toll Allocation Method for Toll Roads
Authors: Ali Babaei
Abstract:
There is a worldwide growing tendency toward construction of infrastructures with the possibility of private sector participation instead of free exploitation of public infrastructures. The construction and development of roads through private sector participation is performed by different countries because of appropriate results and benefits such as compensation of public budget deficit in road construction and maintenance and responding to traffic growth (demand). Toll is the most definite form of budget provision in road development. There are two issues in the toll rate assignment: A. costing of transport, B. Cost allocation and distribution of cost between different types of vehicles as each vehicle pay its own share. There can be different goals in toll collection and its extent is variable according to the strategy of toll collection. Costing principles in different countries are based on inclusion of the whole transport and not peculiar to the toll roads. For example, fuel tax policy functions where the road network users pay transportation cost (not just users of toll road). Whereas transportation infrastructures in Iran are free, these methods are not applicable. In Iran, different toll freeways have built by public investment and government provides participation in the road construction through encouragement of financial institutions. In this paper, the existing policies about the toll roads are studied and then the appropriate method of costing and cost allocation to different vehicles is introduced.Keywords: toll allocation, road pricing, transportation, financial and industrial systems
Procedia PDF Downloads 366