Search results for: immigrant child protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3889

Search results for: immigrant child protection

1669 Investigation on the Performance of Biodiesel and Natural Gas-Fuelled Diesel Engines for Shipboard Application

Authors: Kelvin Datonye Bob-Manuel

Abstract:

The shipping industry has begun to seriously look at ways of reducing fossil fuel consumption so that current reserves can last longer and operate their ships in a more environmentally friendly way. The concept of Green Shipping or Sustainable Shipping with the use of alternative fuels is now becoming an important issue for ship owners, shipping lines and ship builders globally. This paper provides a critical review of the performance of biodiesel and natural gas-fuelled diesel engines for shipboard application. The emission reduction technique included the use of either neat or emulsified rapeseed methyl ester (RME) for pilot ignition and the emission of NOx, CO2 and SOx were measured at engine speed range of 500 - 1500 r/min. The NOx concentrations were compared with the regulated IMO MARPOL73/78, Annex VI, Tiers I, II, III and United States Environmental Protection Agency (US-EPA) standard. All NOx emissions met Tier I and II levels and the EPA standard for the minimum specification of category 1 engines at higher speed but none met the MARPOL Tier III limit which is for designated Emission Control Areas (ECAs). No trace of soot and SOx emission were observed.

Keywords: dual-fuel, biodiesel, natural gas, NOx, SOx, MARPOL 73/78 Annex VI. USEPA Tier 3, EURO V &VI

Procedia PDF Downloads 408
1668 Physico-Chemical and Heavy Metals Analysis of Contaminated Ndawuse River in North Central of Nigeria

Authors: Abimbola Motunrayo Enitan, Ibironke Titilayo Enitan, John Odiyo

Abstract:

The study assessed quality of surface water across Ndawuse River Phase 1, District of the Federal Capital Territory (FCT), Abuja, Nigeria based on physico-chemical variables that are linked to agrochemical and eutrophication, as well as heavy metals concentrations. In total, sixteen surface water samples were obtained from five locations along the river. The results were compared with the standard limits set by both World Health Organization and Federal Environmental Protection Agency for drinking water. The results obtained indicated that BOD5, turbidity, 0.014-3.511 mg Fe/L and 0.078-0.14 mg Cr/L were all above the standard limits. The results further showed that the quality of surface water is being significantly affected by human activities around the Ndawuse River which could pose an adverse health risk to several communities that rely on these receiving water bodies primarily as their source of water. Therefore, there is a need for strict enforcement of environmental laws considering the physico-chemical analysis.

Keywords: Abuja, heavy metals, human exposure risk, Ndawuse River, Nigeria, surface water

Procedia PDF Downloads 259
1667 Corrosion Control of Carbon Steel Surface by Phosphonic Acid Nano-Layers

Authors: T. Abohalkuma, J. Telegdi

Abstract:

Preparation, characterization, and application of self-assembled monolayers (SAM) formed by fluorophosphonic and undecenyl phosphonic acids on carbon steel surfaces as anticorrosive nanocoatings were demonstrated. The anticorrosive efficacy of these SAM layers was followed by atomic force microscopy, as the change in the surface morphology caused by layer deposition and corrosion processes was monitored. The corrosion process was determined by electrochemical potentiodynamic polarization, whereas the surface wettability of the carbon steel samples was tested with the use of static and dynamic contact angle measurements. Results showed that both chemicals produced good protection against corrosion as they performed as anodic inhibitors, especially with increasing the time of layer formation, which results in a more compact molecular film. According to the atomic force microscope (AFM) images, the fluoro-phosphonic acid self-assembled molecular layer can control the general as well as the pitting corrosion, but the SAM layers of the undecenyl-phosphonic acid cannot inhibit the pitting corrosion. The AFM and the contact angle measurements confirmed the results achieved by electrochemical measurements.

Keywords: nanolayers, corrosion, phosphonic acids, coatings

Procedia PDF Downloads 169
1666 Phenolic Compounds, Antiradical Activity, and Antioxidant Efficacy of Satureja hortensisl - Extracts in Vegetable Oil Protection

Authors: Abolfazl Kamkar

Abstract:

Vegetable oils and fats are recognized as important components of our diet. They provide essential fatty acids, which are precursors of important hormones and control many physiological factors such as blood pressure, cholesterol level, and the reproductive system.Vegetable oils with higher contents of unsaturated fatty acids, especially polyunsaturated fatty acids (PUFAs) are more susceptible to oxidation.Protective effects of Sature jahortensis(SE) extracts in stabilizing soybean oil at different concentrations (200 and 400 ppm) were tested. Results showed that plant extracts could significantly (P< 0.05) lower the peroxide value and thiobarbituric acid value of oil during storage at 60 oC. The IC50 values for methanol and ethanol extracts were 31.5 ± 0.7 and 37.00 ± 0 µg/ml, respectively. In the β- carotene/linoleic acid system, methanol and ethanol extracts exhibited 87.5 ± 1.41% and 74.0 ±2.25 % inhibition against linoleic acid oxidation. The total phenolic and flavonoid contents of methanol and ethanol extracts were (101.58 ± 0. 26m g/ g) and (96.00 ± 0.027 mg/ g), (44.91 ± 0.14 m g/ g) and (14.30 ± 0.12 mg/ g) expressed in Gallic acid and Quercetin equivalents, respectively.These findings suggest that Satureja extracts may have potential application as natural antioxidants in the edible oil and food industry.

Keywords: satureja hortensis, antioxidant activity, oxidative stability, vegetable oil, extract

Procedia PDF Downloads 363
1665 Cultural Heritage, War and Heritage Legislations: An Empirical Review

Authors: Gebrekiros Welegebriel Asfaw

Abstract:

The conservation of cultural heritage during times of war is a topic of significant importance and concern in the field of heritage studies. The destruction, looting, and illicit acts against cultural heritages have devastating consequences. International and national legislations have been put in place to address these issues and provide a legal framework for protecting cultural heritage during armed conflicts. Thus, the aim of this review is to examine the existing heritage legislations and evaluate their effectiveness in protecting cultural heritage during times of war with a special insight of the Tigray war. The review is based on a comprehensive empirical analysis of existing heritage legislations related to the protection of cultural heritage during war, with a special focus on the Tigray war. The review reveals that there are several international and national legislations in place to protect cultural heritage during times of war. However, the implementation of these legislations has been insufficient and ineffective in the case of the Tigray war. The priceless cultural heritages in Tigray, which were once the centers of investment and world pride were, have been subjected to destruction, looting, and other illicit acts, in violation of both international conventions such as the UNESCO Convention and national legislations. Therefore, there is a need for consistent intervention and enforcement of different legislations from the international community and organizations to rehabilitate, repatriate, and reinstitute the irreplaceable heritages of Tigray.

Keywords: cultural heritage, heritage legislations, tigray, war

Procedia PDF Downloads 146
1664 The Concept of Anchor Hazard Potential Map

Authors: Sao-Jeng Chao, Chia-Yun Wei, Si-Han Lai, Cheng-Yu Huang, Yu-Han Teng

Abstract:

In Taiwan, the landforms are mainly dominated by mountains and hills. Many road sections of the National Highway are impossible to avoid problems such as slope excavation or slope filling. In order to increase the safety of the slope, various slope protection methods are used to stabilize the slope, especially the soil anchor technique is the most common. This study is inspired by the soil liquefaction potential map. The concept of the potential map is widely used. The typhoon, earth-rock flow, tsunami, flooded area, and the recent discussion of soil liquefaction have safety potential concepts. This paper brings the concept of safety potential to the anchored slope. Because the soil anchor inspection is only the concept of points, this study extends the concept of the point to the surface, using the Quantum GIS program to present the slope damage area, and depicts the slope appearance and soil anchor point with the slope as-built drawing. The soil anchor scores are obtained by anchor inspection data, and the low, medium and high potential areas are remitted by interpolation. Thus, the area where the anchored slope may be harmful is judged and relevant maintenance is provided. The maintenance units can thus prevent judgment and deal with the anchored slope as soon as possible.

Keywords: anchor, slope, potential map, lift-off test, existing load

Procedia PDF Downloads 134
1663 Compilation of Tall Building with Green Architecture Case Study: Babolsar City (North of Iran) at 2014-2015

Authors: Seyyed Hossein Alavi, Soudabeh Mehri Talarposhti

Abstract:

Quick development of urban population need for housing on the one hand and prevention of irregular urban extension for optimum usage of urban land, resolving problems of urban physiognomy, land using, and environmental issues and urban transport, on the other hand, proposed tall building as urban area extension requirement in developing and advanced countries. Beside the tall building, protection, and creation of green architecture is one the most important issues of today's architecture world. This research is about attending tall building with green architecture in Babolsar city 2015. For this, the issues that can make favorite conditions for green architecture has been discussed. The purpose of this discussion is skeleton extension and accessing interactions between architecture and related technologies. This discussion with using of qualitative research methods (Analytical Description) tried to studying designed performance models and also studying and analyzing the inside and foreign articles and books. Hope this research is useful in solving the existing problems in this issue.

Keywords: tall building, green architecture, skeleton extension, Babolsar city

Procedia PDF Downloads 424
1662 Determinants of Contraceptive Demand among Young Nulliparous Women in India: Evidence from National Family Health Survey-4

Authors: Bhawna Verma

Abstract:

Looking at the contraceptive use and unmet need specific to the different age groups would help to understand various determinants and characteristics of women from different age groups, which are often being neglected. The study explores contraceptive behavior, unmet need for family planning and its correlates among young nulliparous women aged 15-29, using data from NFHS-4 (2015-16), India. Method: The study utilized information from 26,924 currently married women, who has no child or who have had first terminated pregnancy and was aged 15-29 at the time of the survey. Chi-Square and logistic regression analysis have been used to assess the effects of socio-economic characteristics. Results: Of all the considered explanatory variables religion, caste, education, current age, age at marriage, media exposure and regional differences were found to be significantly affecting the behavior of contraceptive use. Women of the 25-29 age group are 0.6 percent less likely to have an unmet need than women of 12-19 age group. Unmet need is increasing with the increased level of education. Muslim women are 0.3 percent less likely to have an unmet need than women of Hindu category. Conclusion: Separate considerations must be given to the needs for family planning formation among nulliparous women along with the factors associated with the use and non-use of contraceptives among them. Separate considerations must be given for effective promotion of FP knowledge through print, electronic media, towards the unequal access to the contraceptives among nulliparous women. Marriages after legal minimum age and encouraging women for higher education may address existing socio-economic barriers.

Keywords: contraceptive use, unmet need, family planning, contraceptive behavior

Procedia PDF Downloads 109
1661 Opportunities for Effective Communication Through the Delivery of an Autism Spectrum Disorder Diagnosis: A Scoping Review

Authors: M. D. Antoine

Abstract:

When a child is diagnosed with an illness, condition, or developmental disorder, the process involved in understanding and accepting this diagnosis can be a very stressful and isolating experience for parents and families. The healthcare providers’ ability to effectively communicate in such situations represents a vital lifeline for parents. In this context, communication becomes a crucial element not only for getting through the period of grief but also for the future. We mobilized the five stages of grief model to summarize existing literature regarding the ways in which the experience ofan autism spectrum disorder diagnosis disclosurealigns with the experience of grief to explore how this can inform best practices for effective communication with parents through the diagnosis disclosure. Fifteen publications met inclusion criteria. Findings from the scoping review of empirical studies show that parents/families experience grief-like emotions during the diagnosis disclosure. However, grief is not an outcome of the encounter itself. In fact, the experience of the encounter can help mitigate the grief experience. The way parents/families receive and react to the ‘news’ depends on their preparedness, knowledge, and the support received through the experience. Individual communication skills, as well as policies and regulations, should be examined to alleviate adverse reactions in this context. These findings highlight the importance of further research into effective parent-provider communication strategies and their place in supporting quality autism care.

Keywords: autism spectrum disorder, autism spectrum disorder diagnosis, diagnosis disclosure, parent-provider communication, parental grief

Procedia PDF Downloads 172
1660 Numerical Analysis of Heat and Mass Transfer in an Adsorbent Bed for Different Working Pairs

Authors: N. Allouache, O. Rahli

Abstract:

Solar radiation is by far the largest and the most world’s abundant, clean, and permanent energy source. In recent years, many promising technologies have been developed to harness the sun's energy. These technologies help in environmental protection, economizing energy, and sustainable development, which are the major issues of the world. One of these important technologies is the solar refrigerating machines that make use of either absorption or adsorption technologies. In this present work, the adsorbent bed is modelized and optimized using different working pairs, such as zeolite-water, silica gel-water, activated carbon-ammonia, calcium chlorid-ammonia, activated carbon fiber- methanol and activated carbon AC35-methanol. The results show that the enhancement of the heat and mass transfer depends on the properties of the working pair; the performances of the adsorption cycle are essentially influenced by the choice of the adsorbent-adsorbate pair. The system can operate successfully for optimal parameters such as the evaporator, condenser, and generating temperatures. The activated carbon is the best adsorbent due to its high surface area and micropore volume.

Keywords: adsorbent bed, heat and mass transfer, numerical analysis, working pairs

Procedia PDF Downloads 142
1659 ‘The Guilt Complex’: Assessing the Guilt of Youth Returning From Terrorist Groups in the Narratives of Justice Presentation on the Methodological Opportunities and Concerns in Operational Research

Authors: Arpita Mitra

Abstract:

The research explores the concept of ‘guilt’ as understood in relation to children and young individuals associated with terrorist groups who are exiting these groups and returning to civilian lives (‘young returnees’). The study explores young returnees’ guilt – in its psychological, legal, and sociological manifestations and how it contributes to experiences of reintegration and justice administration. Streamlining it further, the research question on assessing guilt engages with young adults – between 18 and 30 years – who were part of a terrorist organization during their formative years and have returned to civilian life. Overall, the findings of the said research are intended to contribute first-hand operational research to criminological literature as well as transitional justice mechanisms with regard to narratives on truth, justice, reparations and institutional reform/guarantees of non-recurrence. Particularly for this paper, the focus of the paper shall be on one aspect of this research, that is, on the added value of conducting operational research and the methodological challenges encountered during this process with regard to informed consent, data protection, mental health and security considerations for the respondents and researcher.

Keywords: terrorism, reintegration, young returnees, criminology

Procedia PDF Downloads 55
1658 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 256
1657 Azan in Funeral: A Local Islamic Tradition in Indonesia

Authors: Muhajirin Gafar

Abstract:

In Indonesia, Azan not only used as a reminder or call to prayer, its also used at the birth of a child, as the direction of the Prophet Muhammad PBUH, but also become part of a 'tradition’ to echoed in obsequies or the funeral, even there is a tradition in which the Azan echoed in the four corners of the grave. This tradition has become a necessity and has become part of the local Islamic culture preserved from time to time, although it certainly can not be known legal basis underlying the tradition. Based on the phenomenon, this paper proposed three research objective, namely: 1) To described the history about tradition Azan in funeral, 2) To analyze some of the postulates supporting the occurrence of the tradition, 3) To find out the postulates/ hadist which has been arranged in accordance with the instructions of the Prophet Muhammad PBUH about the rules of funeral. To reconstruct the history of the emergence of events azan tradition in the funeral this research used historical method, while the second and third objective used library research. Data and facts systematically processed and analyzed so as to be able to answer the questions of what, who, where, when, how, and why an event occurred. Finally, this research used Takhrij al-hadith a method to look at the validity of the arguments of the hadith. Result found that tradition of Azan in funeral has been around since the presence of Islam in Indonesia. This tradition continued and became a local Islamic culture which spread almost all over Indonesia, even considered part of religious guidance. While there are no decisive postulates which can be accounted for this tradition, except ‘qiyas’ postulates which are not appropriate. Most Indonesian Muslim put Azan as the first priority to do in funeral while oblivious other compulsory things that must be recited when lay down the corpse. They tend to assume that this tradition is a part of Islamic local culture.

Keywords: Azan, tradition, qiyas, Islamic local, hadist

Procedia PDF Downloads 505
1656 Legal Regulation and Critical Analysis for an Effectively Treatment of Pharmaceutical Waste

Authors: Merita Dauti, Edita Alili-Idrizi, Sihana Ahmeti –Lika, Ledjan Malaj

Abstract:

The extermination and proper disposal of pharmaceutical wastes from expired and unused medications remains a disputable issue due to their specific nature and characteristics. Even though the hazards from these wastes are already well known in terms of environment and human health, people still treat them as usual wastes. At a national level, in many countries the management of pharmaceutical and medical wastes has been one of the main objectives in order to protect people’s health and the environment. Even though many legal regulations exist in this respect, there has not been a single law that would clearly explain the procedures of returning medicines, ways of selection, treatment and extermination of pharmaceutical wastes. This paper aims at analyzing the practices of pharmaceutical waste management and treatment in some European countries as well as a review of the legislation and official guidelines in managing these kinds of wastes and protecting the environment and human health. A suitable treatment and management of expired medications and other similar wastes would be in the interest of public health in the first place, as well as in the interest of healthcare institutions and other bodies engaged in environment protection.

Keywords: pharmaceutical waste, legal regulation, proper disposal, environment pollution

Procedia PDF Downloads 328
1655 Chemicals to Remove and Prevent Biofilm

Authors: Cynthia K. Burzell

Abstract:

Aequor's Founder, a Marine and Medical Microbiologist, discovered novel, non-toxic chemicals in the ocean that uniquely remove biofilm in minutes and prevent its formation for days. These chemicals and over 70 synthesized analogs that Aequor developed can replace thousands of toxic biocides used in consumer and industrial products and, as new drug candidates, kill biofilm-forming bacteria and fungi Superbugs -the antimicrobial-resistant (AMR) pathogens for which there is no cure. Cynthia Burzell, PhD., is a Marine and Medical Microbiologist studying natural mechanisms that inhibit biofilm formation on surfaces in contact with water. In 2002, she discovered a new genus and several new species of marine microbes that produce small molecules that remove biofilm in minutes and prevent its formation for days. The molecules include new antimicrobials that can replace thousands of toxic biocides used in consumer and industrial products and can be developed into new drug candidates to kill the biofilm-forming bacteria and fungi -- including the antimicrobial-resistant (AMR) Superbugs for which there is no cure. Today, Aequor has over 70 chemicals that are divided into categories: (1) Novel natural chemicals. Lonza validated that the primary natural chemical removed biofilm in minutes and stated: "Nothing else known can do this at non-toxic doses." (2) Specialty chemicals. 25 of these structural analogs are already approved under the U.S. Environmental Protection Agency (EPA)'s Toxic Substances Control Act, certified as "green" and available for immediate sale. These have been validated for the following agro-industrial verticals: (a) Surface cleaners: The U.S. Department of Agriculture validated that low concentrations of Aequor's formulations provide deep cleaning of inert, nano and organic surfaces and materials; (b) Water treatments: NASA validated that one dose of Aequor's treatment in the International Space Station's water reuse/recycling system lasted 15 months without replenishment. DOE validated that our treatments lower energy consumption by over 10% in buildings and industrial processes. Future validations include pilot projects with the EPA to test efficacy in hospital plumbing systems. (c) Algae cultivation and yeast fermentation: The U.S. Department of Energy (DOE) validated that Aequor's treatment boosted biomass of renewable feedstocks by 40% in half the time -- increasing the profitability of biofuels and biobased co-products. DOE also validated increased yields and crop protection of algae under cultivation in open ponds. A private oil and gas company validated decontamination of oilfield water. (3) New structural analogs. These kill Gram-negative and Gram-positive bacteria and fungi alone, in combinations with each other, and in combination with low doses of existing, ineffective antibiotics (including Penicillin), "potentiating" them to kill AMR pathogens at doses too low to trigger resistance. Both the U.S. National Institutes for Health (NIH) and Department of Defense (DOD) has executed contracts with Aequor to provide the pre-clinical trials needed for these new drug candidates to enter the regulatory approval pipelines. Aequor seeks partners/licensees to commercialize its specialty chemicals and support to evaluate the optimal methods to scale-up of several new structural analogs via activity-guided fractionation and/or biosynthesis in order to initiate the NIH and DOD pre-clinical trials.

Keywords: biofilm, potentiation, prevention, removal

Procedia PDF Downloads 93
1654 Ranking of Performance Measures of GSCM towards Sustainability: Using Analytic Hierarchy Process

Authors: Dixit Garg, S. Luthra, A. Haleem

Abstract:

During recent years, the natural environment has become a challenging topic that business organizations must consider due to the economic and ecological impacts and increasing awareness of environment protection among society. Organizations are trying to achieve the goals of improvement in environment, low cost, high quality, flexibility and more customer satisfaction. Performance measurement frameworks are very useful to monitor the performance of any organization. The basic goal of this paper is to identify performance measures and ranking of these performance measures of GSCM performance measurement towards sustainability framework. Five perspectives (Environment, Economic, Social, Operational and Cost performances) and nineteen performance measures of GSCM performance towards sustainability have been have been identified from extensive literature review. Analytical Hierarchy Process (AHP) technique has been utilized for ranking of these performance perspectives and measures. All pair comparisons in AHP have been made on the basis on the experts’ opinions (selected from academia and industry). Ranking of these performance perspectives and measures will help to understand the importance of environmental, economic, social, operational performances, and cost performances in the supply chain.

Keywords: analytical hierarchy process, green supply chain management, performance measures, sustainability

Procedia PDF Downloads 512
1653 Corporate Cautionary Statement: A Genre of Professional Communication

Authors: Chie Urawa

Abstract:

Cautionary statements or disclaimers in corporate annual reports need to be carefully designed because clear cautionary statements may protect a company in the case of legal disputes and may undermine positive impressions. This study compares the language of cautionary statements using two corpora, Sony’s cautionary statement corpus (S-corpus) and Panasonic’s cautionary statement corpus (P-corpus), illustrating the differences and similarities in relation to the use of meaningful cautionary statements and critically analyzing why practitioners use the way. The findings describe the distinct differences between the two companies in the presentation of the risk factors and the way how they make the statements. The word ability is used more for legal protection in S-corpus whereas the word possibility is used more to convey a better impression in P-corpus. The main similarities are identified in the use of lexical words and pronouns, and almost the same wordings for eight years. The findings show how they make the statements unique to the company in the presentation of risk factors, and the characteristics of specific genre of professional communication. Important implications of this study are that more comprehensive approach can be applied in other contexts, and be used by companies to reflect upon their cautionary statements.

Keywords: cautionary statements, corporate annual reports, corpus, risk factors

Procedia PDF Downloads 164
1652 Public Interest Law for Gender Equality: An Exploratory Study of the 'Single Woman Reproductive Rights' Movement in China

Authors: Xiaofei Zhu

Abstract:

As a 'weapon of the weak', the Public Interest Law can provide a better perspective for the cause of gender justice. In recent years, the legal practice of single female reproductive rights in China has already possessed the elements of public interest law activities and the possibility of public interest law operation. Through the general operating procedures of public interest law practice, that is, from the choice of subject, the planning of the case, the operation of the strategy and the later development, the paper analyzes the gains and losses of the legal practice of single female reproductive rights in China, and puts forward some ideas on its possible operation path. On this basis, it is believed that the cause of women's rights should be carried out under the broad human rights perspective; it is necessary to realize the particularity of different types of women's rights protection practice; the practice of public interest law needs to accurately grasp the constituent elements of all aspects of the case, and strive to find the opportunities of institutional and social change; the practice of public welfare law of gender justice should be carried out from a long-term perspective.

Keywords: single women’s reproductive rights, public interest law, gender justice, legal strategies, legal change

Procedia PDF Downloads 135
1651 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 295
1650 Characterization of Vegetable Wastes and Its Potential Use for Hydrogen and Methane Production via Dark Anaerobic Fermentation

Authors: Ajay Dwivedi, M. Suresh Kumar, A. N. Vaidya

Abstract:

The problem of fruit and vegetable waste management is a grave one and with ever increasing need to feed the exponentially growing population, more and more solid waste in the form of fruit and vegetables waste are generated and its management has become one of the key issues in protection of environment. Energy generation from fruit and vegetables waste by dark anaerobic fermentation is a recent an interesting avenue effective management of solid waste as well as for generating free and cheap energy. In the present study 17 vegetables were characterized for their physical as well as chemical properties, these characteristics were used to determine the hydrogen and methane potentials of vegetable from various models, and also lab scale batch experiments were performed to determine their actual hydrogen and methane production capacity. Lab scale batch experiments proved that vegetable waste can be used as effective substrate for bio hydrogen and methane production, however the expected yield of bio hydrogen and methane was much lower than predicted by models, this was due to the fact that other vital experimental parameters such as pH, total solids content, food to microorganism ratio was not optimized.

Keywords: vegetable waste, physico-chemical characteristics, hydrogen, methane

Procedia PDF Downloads 422
1649 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 167
1648 Simulation Study of Multiple-Thick Gas Electron Multiplier-Based Microdosimeters for Fast Neutron Measurements

Authors: Amir Moslehi, Gholamreza Raisali

Abstract:

Microdosimetric detectors based on multiple-thick gas electron multiplier (multiple-THGEM) configurations are being used in various fields of radiation protection and dosimetry. In the present work, microdosimetric response of these detectors to fast neutrons has been investigated by Monte Carlo method. Three similar microdosimeters made of A-150 and rexolite as the wall materials are designed; the first based on single-THGEM, the second based on double-THGEM and the third is based on triple-THGEM. Sensitive volume of the three microdosimeters is a right cylinder of 5 mm height and diameter which is filled with the propane-based tissue-equivalent (TE) gas. The TE gas with 0.11 atm pressure at the room temperature simulates 1 µm of tissue. Lineal energy distributions for several neutron energies from 10 keV to 14 MeV including 241Am-Be neutrons are calculated by the Geant4 simulation toolkit. Also, mean quality factor and dose-equivalent value for any neutron energy has been determined by these distributions. Obtained data derived from the three microdosimeters are in agreement. Therefore, we conclude that the multiple-THGEM structures present similar microdosimetric responses to fast neutrons.

Keywords: fast neutrons, geant4, multiple-thick gas electron multiplier, microdosimeter

Procedia PDF Downloads 344
1647 A Retrospective Review of HIV-Infected Pregnant Females with Respect to Gestational Age and Mode of Delivery: Trends over a Decade

Authors: Qurat-ul-Ain, Humaira Mehmood

Abstract:

Background: HIV infection (a global pandemic) in pregnant women has turn out to be an emerging aspect of public health because of its role in the spread of HIV infection, predominantly among children. Aim: The aim was to analyze the trends of diagnosis with respect to gestational age and an overview of the mode of delivery over ten years. Methods: A retrospective data collection from clinical records of diagnosed HIV infected pregnant females attended at HIV antenatal clinic (special clinic), at Pakistan Institute of Medical Sciences, Islamabad, for various complaints during the period of 10 years from February 2007 to December 2016 was done. Results: A total of 113 pregnancies were reported with HIV infection in 10 years. Cases diagnosed at the 1st trimester (1-12 weeks) of pregnancy were (50.4%, 57/113), at the 2nd trimester (13-26 weeks) were (24.8%, 28/113), at the 3rd trimester (27-40+ weeks) were (24.7%, 28/113). Most deliveries were by caesarean section (53.1%, 60/113), elective caesarean sections were (58.3%, 35/60) and emergency caesarean sections were (41.6%,25/60). Vaginal deliveries were (26.5%, 30/113). Reported miscarriages were (17.7%, 20/113). Conclusion: At 1st trimester, 50% of the females were diagnosed with HIV infection, and 50% remained undiagnosed at their 1st trimester. Routine antenatal HIV testing throughout the country is vastly needed for timely diagnoses and prompt treatment(antiretroviral therapy), to suppress the virus, to reduce the risk of spread of HIV infection, to plan elective caesarean section delivery and to prevent mother-to-child transmission.

Keywords: gestational age, HIV infection, mode of delivery, pregnancy

Procedia PDF Downloads 120
1646 Hyperspectral Mapping Methods for Differentiating Mangrove Species along Karachi Coast

Authors: Sher Muhammad, Mirza Muhammad Waqar

Abstract:

It is necessary to monitor and identify mangroves types and spatial extent near coastal areas because it plays an important role in coastal ecosystem and environmental protection. This research aims at identifying and mapping mangroves types along Karachi coast ranging from 24.79 to 24.85 degree in latitude and 66.91 to 66.97 degree in longitude using hyperspectral remote sensing data and techniques. Image acquired during February, 2012 through Hyperion sensor have been used for this research. Image preprocessing includes geometric and radiometric correction followed by Minimum Noise Fraction (MNF) and Pixel Purity Index (PPI). The output of MNF and PPI has been analyzed by visualizing it in n-dimensions for end-member extraction. Well-distributed clusters on the n-dimensional scatter plot have been selected with the region of interest (ROI) tool as end members. These end members have been used as an input for classification techniques applied to identify and map mangroves species including Spectral Angle Mapper (SAM), Spectral Feature Fitting (SFF), and Spectral Information Diversion (SID). Only two types of mangroves namely Avicennia Marina (white mangroves) and Avicennia Germinans (black mangroves) have been observed throughout the study area.

Keywords: mangrove, hyperspectral, hyperion, SAM, SFF, SID

Procedia PDF Downloads 360
1645 The Strategic Importance of Technology in the International Production: Beyond the Global Value Chains Approach

Authors: Marcelo Pereira Introini

Abstract:

The global value chains (GVC) approach contributes to a better understanding of the international production organization amid globalization’s second unbundling from the 1970s on. Mainly due to the tools that help to understand the importance of critical competences, technological capabilities, and functions performed by each player, GVC research flourished in recent years, rooted in discussing the possibilities of integration and repositioning along regional and global value chains. Regarding this context, part of the literature endorsed a more optimistic view that engaging in fragmented production networks could represent learning opportunities for developing countries’ firms, since the relationship with transnational corporations could allow them build skills and competences. Increasing recognition that GVCs are based on asymmetric power relations provided another sight about benefits, costs, and development possibilities though. Once leading companies tend to restrict the replication of their technologies and capabilities by their suppliers, alternative strategies beyond the functional specialization, seen as a way to integrate value chains, began to be broadly highlighted. This paper organizes a coherent narrative about the shortcomings of the GVC analytical framework, while recognizing its multidimensional contributions and recent developments. We adopt two different and complementary perspectives to explore the idea of integration in the international production. On one hand, we emphasize obstacles beyond production components, analyzing the role played by intangible assets and intellectual property regimes. On the other hand, we consider the importance of domestic production and innovation systems for technological development. In order to provide a deeper understanding of the restrictions on technological learning of developing countries’ firms, we firstly build from the notion of intellectual monopoly to analyze how flagship companies can prevent subordinated firms from improving their positions in fragmented production networks. Based on intellectual property protection regimes we discuss the increasing asymmetries between these players and the decreasing access of part of them to strategic intangible assets. Second, we debate the role of productive-technological ecosystems and of interactive and systemic technological development processes, as concepts of the Innovation Systems approach. Supporting the idea that not only endogenous advantages are important for international competition of developing countries’ firms, but also that the building of these advantages itself can be a source of technological learning, we focus on local efforts as a crucial element, which is not replaceable for technology imported from abroad. Finally, the paper contributes to the discussion about technological development as a two-dimensional dynamic. If GVC analysis tends to underline a company-based perspective, stressing the learning opportunities associated to GVC integration, historical involvement of national States brings up the debate about technology as a central aspect of interstate disputes. In this sense, technology is seen as part of military modernization before being also used in civil contexts, what presupposes its role for national security and productive autonomy strategies. From this outlook, it is important to consider it as an asset that, incorporated in sophisticated machinery, can be the target of state policies besides the protection provided by intellectual property regimes, such as in export controls and inward-investment restrictions.

Keywords: global value chains, innovation systems, intellectual monopoly, technological development

Procedia PDF Downloads 75
1644 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 347
1643 Aquatic Intervention Research for Children with Autism Spectrum Disorders

Authors: Mehmet Yanardag, Ilker Yilmaz

Abstract:

Children with autism spectrum disorders (ASD) enjoy and success the aquatic-based exercise and play skills in a pool instead of land-based exercise in a gym. Some authors also observed that many children with ASD experience more success in attaining movement skills in aquatic environment. Properties of the water and hydrodynamic principles cause buoyancy of the water and decrease effects of gravity and it leads to allow a child to practice important aquatic skills with limited motor skills. Also, some authors experience that parents liked the effects of the aquatic intervention program on children with ASD such as improving motor performance, movement capacity and learning basic swimming skills. The purpose of this study was to investigate the effects of aquatic exercise training on water orientation and underwater working capacity were measured in the pool. This study included in four male children between 5 and 7 years old with ASD and 6.25±0.5 years old. Aquatic exercise skills were applied by using one of the error less teaching which is called the 'most to least prompt' procedure during 12-week, three times a week and 60 minutes a day. The findings of this study indicated that there were improvements test results both water orientation skill and underwater working capacity of children with ASD after 12-weeks exercise training. It was seen that the aquatic exercise intervention would be affected to improve working capacity and orientation skills with the special education approaches applying children with ASD in multidisciplinary team-works.

Keywords: aquatic, autism, orientation, ASD, children

Procedia PDF Downloads 427
1642 Factors Associated to Down Syndrome Causes in Patients of Cytogenetics Laboratory, Faculty of Medicine, Universitas Padjadjaran in 2014─2015

Authors: Bremmy Laksono, Nurul Qomarilla, Riksa Parikrama, Dyan K. Nugrahaeni, Willyanti Soewondo, Dadang S. H. Effendi, Eriska Rianti, Arlette S. Setiawan, Ine Sasmita, Risti S. Primanti, Erna Kurnikasari, Yunia Sribudiani

Abstract:

Down syndrome is a chromosomal abnormality of chromosome 21 which can appear in man or woman. Maternal age and paternal age, history of radiation are the common risk factors. This study was conducted to observe risk factors which related as causes of Down syndrome. In this case control study using purposive sampling technique, 84 respondents were chosen from Cell Culture and Cytogenetics Laboratory patients in Faculty of Medicine, Universitas Padjadjaran, Indonesia. They were used as study samples and divided into 42 Down syndrome cases and 42 control respondents. This study used univariate and bivariate analysis (chi-square). Samples population were West Java residents, the biggest province in Indonesia in number of population. The results showed maternal age, paternal age, history of radiation exposure and family history were not significantly related to Down syndrome baby. Moreover, all of those factors also did not contribute to the risk of having a child with Down syndrome in patients at Cell Culture and Cytogenetics Laboratory, Faculty of Medicine, Universitas Padjadjaran. Therefore, we should investigate other risk factors of Down syndrome in West Java population.

Keywords: down syndrome, family history, maternal age, paternal age, risk factor

Procedia PDF Downloads 397
1641 Mother and Father Involvement and Students’ School Performance: A Study on Private Primary Schools in Bahir Dar City, Ethiopia

Authors: Alemayehu Belay Emagnaw

Abstract:

This study was conducted to investigate the relationship of mother and father involvement with students’ school performance and the effect of selected family demographic variables (mother and father education, family structure and sex of students) to the involvement of mothers and fathers in their children’s school performance. In addition, this study attempted to differentiate the level of involvement of mothers’ and fathers’ in their children’s school performance. The research was conducted in Bahirdar City, Ethiopia. A total of 175 students (boys were 85 and girls were 90) of grade 7th and 8th private primary schools were selected as respondents using stratified random sampling technique. The data were collected using a questionnaire. Analysis of the data showed that fathers and mothers have significant involvement in their children’s school performance. A significant difference was also found between mothers and fathers involvement in their children’s school performance. Mothers were better involved in their children school performance than fathers. The analysis of inter-correlation between variables showed that there is a statistically significant relationship between mother and father education, mother and father involvement, and school performance whereas, family structure and sex of the child had no significant relationship with school performance.

Keywords: family structure, parental education, parental involvement, school performance

Procedia PDF Downloads 152
1640 Influences of Socioeconomic Status and Age on Child Creativity: An Exploratory Study Applied to School Children in Poland

Authors: Bernard Vaernes

Abstract:

Creativity is thought to be of importance for educational success. Educational institutions vary greatly in regard to socioeconomic status (SES) and curricular emphasis on creativity. Research is needed to clarify the effects of age and SES on creativity. The objective of this study will be to compare the creative performance of children with different SES, low or high, and age. It is hypothesized that younger children will score higher than older children, independent of their SES. Children aged 15, 12, and 9 from four different junior and secondary schools in Warsaw, Poland, will participate in the study. The schools will differ in terms of socioeconomic, geographic localization. To assess creative performance, a Polish adaptation of the Torrance Test of Creative Thinking (TTCT) will be used. In order to select low and high SES individuals for SES grouping, a Polish adaptation of the MacArthur Scale of Subjective Social Status will be given to all participants. To control for individual differences in personality traits, a Polish adaptation of the Big Five Questionnaire for Children (BFQ-C) will be used. These measures will allow to compare the creative performance of children with different age and SES and eliminate confound variables. It is predicted that younger children, as well as high SES children, will score higher on the TTCT than older children, and low SES children. The findings of this study may provide useful insight into socioeconomic and age differences in creativity, as well as facilitating teacher’s adjustment of learning styles and emphasis on creativity in relation to the SES and age of their students.

Keywords: big five questionnaire for children, children, creativity, socioeconomic status, Torrance test of creative thinking, TTCT

Procedia PDF Downloads 135