Search results for: immigrant child protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3940

Search results for: immigrant child protection

1690 Cultural Heritage, War and Heritage Legislations: An Empirical Review

Authors: Gebrekiros Welegebriel Asfaw

Abstract:

The conservation of cultural heritage during times of war is a topic of significant importance and concern in the field of heritage studies. The destruction, looting, and illicit acts against cultural heritages have devastating consequences. International and national legislations have been put in place to address these issues and provide a legal framework for protecting cultural heritage during armed conflicts. Thus, the aim of this review is to examine the existing heritage legislations and evaluate their effectiveness in protecting cultural heritage during times of war with a special insight of the Tigray war. The review is based on a comprehensive empirical analysis of existing heritage legislations related to the protection of cultural heritage during war, with a special focus on the Tigray war. The review reveals that there are several international and national legislations in place to protect cultural heritage during times of war. However, the implementation of these legislations has been insufficient and ineffective in the case of the Tigray war. The priceless cultural heritages in Tigray, which were once the centers of investment and world pride were, have been subjected to destruction, looting, and other illicit acts, in violation of both international conventions such as the UNESCO Convention and national legislations. Therefore, there is a need for consistent intervention and enforcement of different legislations from the international community and organizations to rehabilitate, repatriate, and reinstitute the irreplaceable heritages of Tigray.

Keywords: cultural heritage, heritage legislations, tigray, war

Procedia PDF Downloads 155
1689 A Retrospective Review of HIV-Infected Pregnant Females with Respect to Gestational Age and Mode of Delivery: Trends over a Decade

Authors: Qurat-ul-Ain, Humaira Mehmood

Abstract:

Background: HIV infection (a global pandemic) in pregnant women has turn out to be an emerging aspect of public health because of its role in the spread of HIV infection, predominantly among children. Aim: The aim was to analyze the trends of diagnosis with respect to gestational age and an overview of the mode of delivery over ten years. Methods: A retrospective data collection from clinical records of diagnosed HIV infected pregnant females attended at HIV antenatal clinic (special clinic), at Pakistan Institute of Medical Sciences, Islamabad, for various complaints during the period of 10 years from February 2007 to December 2016 was done. Results: A total of 113 pregnancies were reported with HIV infection in 10 years. Cases diagnosed at the 1st trimester (1-12 weeks) of pregnancy were (50.4%, 57/113), at the 2nd trimester (13-26 weeks) were (24.8%, 28/113), at the 3rd trimester (27-40+ weeks) were (24.7%, 28/113). Most deliveries were by caesarean section (53.1%, 60/113), elective caesarean sections were (58.3%, 35/60) and emergency caesarean sections were (41.6%,25/60). Vaginal deliveries were (26.5%, 30/113). Reported miscarriages were (17.7%, 20/113). Conclusion: At 1st trimester, 50% of the females were diagnosed with HIV infection, and 50% remained undiagnosed at their 1st trimester. Routine antenatal HIV testing throughout the country is vastly needed for timely diagnoses and prompt treatment(antiretroviral therapy), to suppress the virus, to reduce the risk of spread of HIV infection, to plan elective caesarean section delivery and to prevent mother-to-child transmission.

Keywords: gestational age, HIV infection, mode of delivery, pregnancy

Procedia PDF Downloads 124
1688 The Concept of Anchor Hazard Potential Map

Authors: Sao-Jeng Chao, Chia-Yun Wei, Si-Han Lai, Cheng-Yu Huang, Yu-Han Teng

Abstract:

In Taiwan, the landforms are mainly dominated by mountains and hills. Many road sections of the National Highway are impossible to avoid problems such as slope excavation or slope filling. In order to increase the safety of the slope, various slope protection methods are used to stabilize the slope, especially the soil anchor technique is the most common. This study is inspired by the soil liquefaction potential map. The concept of the potential map is widely used. The typhoon, earth-rock flow, tsunami, flooded area, and the recent discussion of soil liquefaction have safety potential concepts. This paper brings the concept of safety potential to the anchored slope. Because the soil anchor inspection is only the concept of points, this study extends the concept of the point to the surface, using the Quantum GIS program to present the slope damage area, and depicts the slope appearance and soil anchor point with the slope as-built drawing. The soil anchor scores are obtained by anchor inspection data, and the low, medium and high potential areas are remitted by interpolation. Thus, the area where the anchored slope may be harmful is judged and relevant maintenance is provided. The maintenance units can thus prevent judgment and deal with the anchored slope as soon as possible.

Keywords: anchor, slope, potential map, lift-off test, existing load

Procedia PDF Downloads 141
1687 Compilation of Tall Building with Green Architecture Case Study: Babolsar City (North of Iran) at 2014-2015

Authors: Seyyed Hossein Alavi, Soudabeh Mehri Talarposhti

Abstract:

Quick development of urban population need for housing on the one hand and prevention of irregular urban extension for optimum usage of urban land, resolving problems of urban physiognomy, land using, and environmental issues and urban transport, on the other hand, proposed tall building as urban area extension requirement in developing and advanced countries. Beside the tall building, protection, and creation of green architecture is one the most important issues of today's architecture world. This research is about attending tall building with green architecture in Babolsar city 2015. For this, the issues that can make favorite conditions for green architecture has been discussed. The purpose of this discussion is skeleton extension and accessing interactions between architecture and related technologies. This discussion with using of qualitative research methods (Analytical Description) tried to studying designed performance models and also studying and analyzing the inside and foreign articles and books. Hope this research is useful in solving the existing problems in this issue.

Keywords: tall building, green architecture, skeleton extension, Babolsar city

Procedia PDF Downloads 430
1686 Numerical Analysis of Heat and Mass Transfer in an Adsorbent Bed for Different Working Pairs

Authors: N. Allouache, O. Rahli

Abstract:

Solar radiation is by far the largest and the most world’s abundant, clean, and permanent energy source. In recent years, many promising technologies have been developed to harness the sun's energy. These technologies help in environmental protection, economizing energy, and sustainable development, which are the major issues of the world. One of these important technologies is the solar refrigerating machines that make use of either absorption or adsorption technologies. In this present work, the adsorbent bed is modelized and optimized using different working pairs, such as zeolite-water, silica gel-water, activated carbon-ammonia, calcium chlorid-ammonia, activated carbon fiber- methanol and activated carbon AC35-methanol. The results show that the enhancement of the heat and mass transfer depends on the properties of the working pair; the performances of the adsorption cycle are essentially influenced by the choice of the adsorbent-adsorbate pair. The system can operate successfully for optimal parameters such as the evaporator, condenser, and generating temperatures. The activated carbon is the best adsorbent due to its high surface area and micropore volume.

Keywords: adsorbent bed, heat and mass transfer, numerical analysis, working pairs

Procedia PDF Downloads 149
1685 Aquatic Intervention Research for Children with Autism Spectrum Disorders

Authors: Mehmet Yanardag, Ilker Yilmaz

Abstract:

Children with autism spectrum disorders (ASD) enjoy and success the aquatic-based exercise and play skills in a pool instead of land-based exercise in a gym. Some authors also observed that many children with ASD experience more success in attaining movement skills in aquatic environment. Properties of the water and hydrodynamic principles cause buoyancy of the water and decrease effects of gravity and it leads to allow a child to practice important aquatic skills with limited motor skills. Also, some authors experience that parents liked the effects of the aquatic intervention program on children with ASD such as improving motor performance, movement capacity and learning basic swimming skills. The purpose of this study was to investigate the effects of aquatic exercise training on water orientation and underwater working capacity were measured in the pool. This study included in four male children between 5 and 7 years old with ASD and 6.25±0.5 years old. Aquatic exercise skills were applied by using one of the error less teaching which is called the 'most to least prompt' procedure during 12-week, three times a week and 60 minutes a day. The findings of this study indicated that there were improvements test results both water orientation skill and underwater working capacity of children with ASD after 12-weeks exercise training. It was seen that the aquatic exercise intervention would be affected to improve working capacity and orientation skills with the special education approaches applying children with ASD in multidisciplinary team-works.

Keywords: aquatic, autism, orientation, ASD, children

Procedia PDF Downloads 432
1684 Factors Associated to Down Syndrome Causes in Patients of Cytogenetics Laboratory, Faculty of Medicine, Universitas Padjadjaran in 2014─2015

Authors: Bremmy Laksono, Nurul Qomarilla, Riksa Parikrama, Dyan K. Nugrahaeni, Willyanti Soewondo, Dadang S. H. Effendi, Eriska Rianti, Arlette S. Setiawan, Ine Sasmita, Risti S. Primanti, Erna Kurnikasari, Yunia Sribudiani

Abstract:

Down syndrome is a chromosomal abnormality of chromosome 21 which can appear in man or woman. Maternal age and paternal age, history of radiation are the common risk factors. This study was conducted to observe risk factors which related as causes of Down syndrome. In this case control study using purposive sampling technique, 84 respondents were chosen from Cell Culture and Cytogenetics Laboratory patients in Faculty of Medicine, Universitas Padjadjaran, Indonesia. They were used as study samples and divided into 42 Down syndrome cases and 42 control respondents. This study used univariate and bivariate analysis (chi-square). Samples population were West Java residents, the biggest province in Indonesia in number of population. The results showed maternal age, paternal age, history of radiation exposure and family history were not significantly related to Down syndrome baby. Moreover, all of those factors also did not contribute to the risk of having a child with Down syndrome in patients at Cell Culture and Cytogenetics Laboratory, Faculty of Medicine, Universitas Padjadjaran. Therefore, we should investigate other risk factors of Down syndrome in West Java population.

Keywords: down syndrome, family history, maternal age, paternal age, risk factor

Procedia PDF Downloads 405
1683 Mother and Father Involvement and Students’ School Performance: A Study on Private Primary Schools in Bahir Dar City, Ethiopia

Authors: Alemayehu Belay Emagnaw

Abstract:

This study was conducted to investigate the relationship of mother and father involvement with students’ school performance and the effect of selected family demographic variables (mother and father education, family structure and sex of students) to the involvement of mothers and fathers in their children’s school performance. In addition, this study attempted to differentiate the level of involvement of mothers’ and fathers’ in their children’s school performance. The research was conducted in Bahirdar City, Ethiopia. A total of 175 students (boys were 85 and girls were 90) of grade 7th and 8th private primary schools were selected as respondents using stratified random sampling technique. The data were collected using a questionnaire. Analysis of the data showed that fathers and mothers have significant involvement in their children’s school performance. A significant difference was also found between mothers and fathers involvement in their children’s school performance. Mothers were better involved in their children school performance than fathers. The analysis of inter-correlation between variables showed that there is a statistically significant relationship between mother and father education, mother and father involvement, and school performance whereas, family structure and sex of the child had no significant relationship with school performance.

Keywords: family structure, parental education, parental involvement, school performance

Procedia PDF Downloads 160
1682 Influences of Socioeconomic Status and Age on Child Creativity: An Exploratory Study Applied to School Children in Poland

Authors: Bernard Vaernes

Abstract:

Creativity is thought to be of importance for educational success. Educational institutions vary greatly in regard to socioeconomic status (SES) and curricular emphasis on creativity. Research is needed to clarify the effects of age and SES on creativity. The objective of this study will be to compare the creative performance of children with different SES, low or high, and age. It is hypothesized that younger children will score higher than older children, independent of their SES. Children aged 15, 12, and 9 from four different junior and secondary schools in Warsaw, Poland, will participate in the study. The schools will differ in terms of socioeconomic, geographic localization. To assess creative performance, a Polish adaptation of the Torrance Test of Creative Thinking (TTCT) will be used. In order to select low and high SES individuals for SES grouping, a Polish adaptation of the MacArthur Scale of Subjective Social Status will be given to all participants. To control for individual differences in personality traits, a Polish adaptation of the Big Five Questionnaire for Children (BFQ-C) will be used. These measures will allow to compare the creative performance of children with different age and SES and eliminate confound variables. It is predicted that younger children, as well as high SES children, will score higher on the TTCT than older children, and low SES children. The findings of this study may provide useful insight into socioeconomic and age differences in creativity, as well as facilitating teacher’s adjustment of learning styles and emphasis on creativity in relation to the SES and age of their students.

Keywords: big five questionnaire for children, children, creativity, socioeconomic status, Torrance test of creative thinking, TTCT

Procedia PDF Downloads 140
1681 Gender Inequality and Human Trafficking

Authors: Kimberly McCabe

Abstract:

The trafficking of women and children for abuse and exploitation is not a new problem under the umbrella of human trafficking; however, over the last decade, the problem has attracted increased attention from international governments and non-profits attempting to reduce victimization and provide services for survivors. Research on human trafficking suggests that the trafficking of human beings is, largely, a symptom of poverty. As the trafficking of human beings may be viewed as a response to the demand for people for various forms of exploitation, a product of poverty, and a consequence of the subordinate positions of women and children in society, it reaches beyond randomized victimization. Hence, human trafficking, and especially the trafficking of women and children, goes beyond the realm of poorness. Therefore, to begin to understand the reasons for the existence of human trafficking, one must identify and consider not only the immediate causes but also those underlying structural determinants that facilitate this form of victimization. Specifically, one must acknowledge the economic, social, and cultural factors that support human trafficking. This research attempts to study human trafficking at the country level by focusing on economic, social, and cultural characteristics. This study focuses on inequality and, in particular, gender inequality as related to legislative attempts to address human trafficking. Within the design of this project is the use of the US State Department’s tier classification system for Trafficking in Persons (TIP) and the USA CIA Fact Sheet of country characteristics for over 150 countries in an attempt to model legal outcomes as related to human trafficking. Results of this research demonstrate the significance of characteristics beyond poverty as related to country-level responses to human trafficking.

Keywords: child trafficking, gender inequality, human trafficking, inequality

Procedia PDF Downloads 241
1680 ‘The Guilt Complex’: Assessing the Guilt of Youth Returning From Terrorist Groups in the Narratives of Justice Presentation on the Methodological Opportunities and Concerns in Operational Research

Authors: Arpita Mitra

Abstract:

The research explores the concept of ‘guilt’ as understood in relation to children and young individuals associated with terrorist groups who are exiting these groups and returning to civilian lives (‘young returnees’). The study explores young returnees’ guilt – in its psychological, legal, and sociological manifestations and how it contributes to experiences of reintegration and justice administration. Streamlining it further, the research question on assessing guilt engages with young adults – between 18 and 30 years – who were part of a terrorist organization during their formative years and have returned to civilian life. Overall, the findings of the said research are intended to contribute first-hand operational research to criminological literature as well as transitional justice mechanisms with regard to narratives on truth, justice, reparations and institutional reform/guarantees of non-recurrence. Particularly for this paper, the focus of the paper shall be on one aspect of this research, that is, on the added value of conducting operational research and the methodological challenges encountered during this process with regard to informed consent, data protection, mental health and security considerations for the respondents and researcher.

Keywords: terrorism, reintegration, young returnees, criminology

Procedia PDF Downloads 59
1679 Agony and Agency: Discursive Construction of Barren women in the Bible and Traditional African Society

Authors: Vicky Khasandi-Telewa, Sinfree Makoni

Abstract:

Barrenness is a fundamentally agonizing condition that leads to identity disruption in its victims. In Africa, women are usually referred to as ‘Mother of X,’ and this causes grief to one who does not have a child to be identified with. This paper is an examination and critical appraisal of the impact of barrenness on the self-perception of women and the underlying power relations in how they are discursively constructed in the Bible and Traditional African Society (TAS). It is an analysis of expressive practices to examine how barrenness is constructed in Christianity and TAS with the aim of understanding the intersecting power systems. We approach this from an integrationism and Critical Discourse Analysis perspective that takes seriously both the radical harassment of barren women and the possibilities offered by the ensuing desperation calling for inclusive reinterpretation. We also seek to understand barren women’s coping mechanisms and suggestions on how best to improve their lives. The purpose of this study is to explain how discursive construction of barrenness affects the fundamental rights and freedoms of women and what linguistic strategies they adopt to navigate through the maze of stigma. It seeks to illustrate a more nuanced complexity of barren women's lives through women's own exegesis of the Biblical accounts of barrenness and their traditions and to explore alternative narratives. We explore the linguistic strategies the barren women employ to communicate their coping with limitations imposed upon their rights by the negative constructions.

Keywords: integrationism, critical discourse analysis, barrenness, communication strategies, women rights

Procedia PDF Downloads 69
1678 A Cross-Sectional Study on the Nutritional Status of School Going Children From Urban and Rural Populations of Pakistan

Authors: Aftab Ahmed, Farhan Saeed, Muhammad Afzaal, Shinawar Waseem Ali, Ali Imran, Sadaf Munir

Abstract:

Malnutrition is a globally increasing public health concern among children; it affects number of school children influencing their growth, development and academic performance. The tenet of the current cross sectional study was to assess the nutritional biomarkers of school going children of age 12-15 years resulting in stunting, underweight, overweight, bone deformities and other health disparities in nutritionally deprived urban and rural populations of Pakistan. A sample size comprising of 180 school going children was stipulated from the targeted urban and rural populations. The fallouts of investigation unveiled that both rural and urban populations were experiencing nutritional challenges however; on account of awareness paucity the rustic population was nutritionally more compromised. Hematological tests elucidated 16.7% and 7.8% cases for high glucose level, 35.6% and 27.8% cases for low hemoglobin levels, 14.4% and 15.6% cases for low calcium indices, 12.2% and 4.4% high white blood cell count (WBC), 20% and 14.4% low red blood cell count, 76.7% and 74.4% low hematocrit (HCT) values, among the rural and urban populations respectively. The above mentioned outcomes can serve as a way forward for policy and law maker institutions to curb the possible barricades in the way of healthy nutritional status in these areas

Keywords: malnutrition, hematological study, child nutrition, bone mineral density, calcium, RBC

Procedia PDF Downloads 86
1677 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 271
1676 Legal Regulation and Critical Analysis for an Effectively Treatment of Pharmaceutical Waste

Authors: Merita Dauti, Edita Alili-Idrizi, Sihana Ahmeti –Lika, Ledjan Malaj

Abstract:

The extermination and proper disposal of pharmaceutical wastes from expired and unused medications remains a disputable issue due to their specific nature and characteristics. Even though the hazards from these wastes are already well known in terms of environment and human health, people still treat them as usual wastes. At a national level, in many countries the management of pharmaceutical and medical wastes has been one of the main objectives in order to protect people’s health and the environment. Even though many legal regulations exist in this respect, there has not been a single law that would clearly explain the procedures of returning medicines, ways of selection, treatment and extermination of pharmaceutical wastes. This paper aims at analyzing the practices of pharmaceutical waste management and treatment in some European countries as well as a review of the legislation and official guidelines in managing these kinds of wastes and protecting the environment and human health. A suitable treatment and management of expired medications and other similar wastes would be in the interest of public health in the first place, as well as in the interest of healthcare institutions and other bodies engaged in environment protection.

Keywords: pharmaceutical waste, legal regulation, proper disposal, environment pollution

Procedia PDF Downloads 333
1675 Chemicals to Remove and Prevent Biofilm

Authors: Cynthia K. Burzell

Abstract:

Aequor's Founder, a Marine and Medical Microbiologist, discovered novel, non-toxic chemicals in the ocean that uniquely remove biofilm in minutes and prevent its formation for days. These chemicals and over 70 synthesized analogs that Aequor developed can replace thousands of toxic biocides used in consumer and industrial products and, as new drug candidates, kill biofilm-forming bacteria and fungi Superbugs -the antimicrobial-resistant (AMR) pathogens for which there is no cure. Cynthia Burzell, PhD., is a Marine and Medical Microbiologist studying natural mechanisms that inhibit biofilm formation on surfaces in contact with water. In 2002, she discovered a new genus and several new species of marine microbes that produce small molecules that remove biofilm in minutes and prevent its formation for days. The molecules include new antimicrobials that can replace thousands of toxic biocides used in consumer and industrial products and can be developed into new drug candidates to kill the biofilm-forming bacteria and fungi -- including the antimicrobial-resistant (AMR) Superbugs for which there is no cure. Today, Aequor has over 70 chemicals that are divided into categories: (1) Novel natural chemicals. Lonza validated that the primary natural chemical removed biofilm in minutes and stated: "Nothing else known can do this at non-toxic doses." (2) Specialty chemicals. 25 of these structural analogs are already approved under the U.S. Environmental Protection Agency (EPA)'s Toxic Substances Control Act, certified as "green" and available for immediate sale. These have been validated for the following agro-industrial verticals: (a) Surface cleaners: The U.S. Department of Agriculture validated that low concentrations of Aequor's formulations provide deep cleaning of inert, nano and organic surfaces and materials; (b) Water treatments: NASA validated that one dose of Aequor's treatment in the International Space Station's water reuse/recycling system lasted 15 months without replenishment. DOE validated that our treatments lower energy consumption by over 10% in buildings and industrial processes. Future validations include pilot projects with the EPA to test efficacy in hospital plumbing systems. (c) Algae cultivation and yeast fermentation: The U.S. Department of Energy (DOE) validated that Aequor's treatment boosted biomass of renewable feedstocks by 40% in half the time -- increasing the profitability of biofuels and biobased co-products. DOE also validated increased yields and crop protection of algae under cultivation in open ponds. A private oil and gas company validated decontamination of oilfield water. (3) New structural analogs. These kill Gram-negative and Gram-positive bacteria and fungi alone, in combinations with each other, and in combination with low doses of existing, ineffective antibiotics (including Penicillin), "potentiating" them to kill AMR pathogens at doses too low to trigger resistance. Both the U.S. National Institutes for Health (NIH) and Department of Defense (DOD) has executed contracts with Aequor to provide the pre-clinical trials needed for these new drug candidates to enter the regulatory approval pipelines. Aequor seeks partners/licensees to commercialize its specialty chemicals and support to evaluate the optimal methods to scale-up of several new structural analogs via activity-guided fractionation and/or biosynthesis in order to initiate the NIH and DOD pre-clinical trials.

Keywords: biofilm, potentiation, prevention, removal

Procedia PDF Downloads 99
1674 Ranking of Performance Measures of GSCM towards Sustainability: Using Analytic Hierarchy Process

Authors: Dixit Garg, S. Luthra, A. Haleem

Abstract:

During recent years, the natural environment has become a challenging topic that business organizations must consider due to the economic and ecological impacts and increasing awareness of environment protection among society. Organizations are trying to achieve the goals of improvement in environment, low cost, high quality, flexibility and more customer satisfaction. Performance measurement frameworks are very useful to monitor the performance of any organization. The basic goal of this paper is to identify performance measures and ranking of these performance measures of GSCM performance measurement towards sustainability framework. Five perspectives (Environment, Economic, Social, Operational and Cost performances) and nineteen performance measures of GSCM performance towards sustainability have been have been identified from extensive literature review. Analytical Hierarchy Process (AHP) technique has been utilized for ranking of these performance perspectives and measures. All pair comparisons in AHP have been made on the basis on the experts’ opinions (selected from academia and industry). Ranking of these performance perspectives and measures will help to understand the importance of environmental, economic, social, operational performances, and cost performances in the supply chain.

Keywords: analytical hierarchy process, green supply chain management, performance measures, sustainability

Procedia PDF Downloads 519
1673 Corporate Cautionary Statement: A Genre of Professional Communication

Authors: Chie Urawa

Abstract:

Cautionary statements or disclaimers in corporate annual reports need to be carefully designed because clear cautionary statements may protect a company in the case of legal disputes and may undermine positive impressions. This study compares the language of cautionary statements using two corpora, Sony’s cautionary statement corpus (S-corpus) and Panasonic’s cautionary statement corpus (P-corpus), illustrating the differences and similarities in relation to the use of meaningful cautionary statements and critically analyzing why practitioners use the way. The findings describe the distinct differences between the two companies in the presentation of the risk factors and the way how they make the statements. The word ability is used more for legal protection in S-corpus whereas the word possibility is used more to convey a better impression in P-corpus. The main similarities are identified in the use of lexical words and pronouns, and almost the same wordings for eight years. The findings show how they make the statements unique to the company in the presentation of risk factors, and the characteristics of specific genre of professional communication. Important implications of this study are that more comprehensive approach can be applied in other contexts, and be used by companies to reflect upon their cautionary statements.

Keywords: cautionary statements, corporate annual reports, corpus, risk factors

Procedia PDF Downloads 171
1672 Public Interest Law for Gender Equality: An Exploratory Study of the 'Single Woman Reproductive Rights' Movement in China

Authors: Xiaofei Zhu

Abstract:

As a 'weapon of the weak', the Public Interest Law can provide a better perspective for the cause of gender justice. In recent years, the legal practice of single female reproductive rights in China has already possessed the elements of public interest law activities and the possibility of public interest law operation. Through the general operating procedures of public interest law practice, that is, from the choice of subject, the planning of the case, the operation of the strategy and the later development, the paper analyzes the gains and losses of the legal practice of single female reproductive rights in China, and puts forward some ideas on its possible operation path. On this basis, it is believed that the cause of women's rights should be carried out under the broad human rights perspective; it is necessary to realize the particularity of different types of women's rights protection practice; the practice of public interest law needs to accurately grasp the constituent elements of all aspects of the case, and strive to find the opportunities of institutional and social change; the practice of public welfare law of gender justice should be carried out from a long-term perspective.

Keywords: single women’s reproductive rights, public interest law, gender justice, legal strategies, legal change

Procedia PDF Downloads 139
1671 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 307
1670 Characterization of Vegetable Wastes and Its Potential Use for Hydrogen and Methane Production via Dark Anaerobic Fermentation

Authors: Ajay Dwivedi, M. Suresh Kumar, A. N. Vaidya

Abstract:

The problem of fruit and vegetable waste management is a grave one and with ever increasing need to feed the exponentially growing population, more and more solid waste in the form of fruit and vegetables waste are generated and its management has become one of the key issues in protection of environment. Energy generation from fruit and vegetables waste by dark anaerobic fermentation is a recent an interesting avenue effective management of solid waste as well as for generating free and cheap energy. In the present study 17 vegetables were characterized for their physical as well as chemical properties, these characteristics were used to determine the hydrogen and methane potentials of vegetable from various models, and also lab scale batch experiments were performed to determine their actual hydrogen and methane production capacity. Lab scale batch experiments proved that vegetable waste can be used as effective substrate for bio hydrogen and methane production, however the expected yield of bio hydrogen and methane was much lower than predicted by models, this was due to the fact that other vital experimental parameters such as pH, total solids content, food to microorganism ratio was not optimized.

Keywords: vegetable waste, physico-chemical characteristics, hydrogen, methane

Procedia PDF Downloads 428
1669 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 172
1668 Simulation Study of Multiple-Thick Gas Electron Multiplier-Based Microdosimeters for Fast Neutron Measurements

Authors: Amir Moslehi, Gholamreza Raisali

Abstract:

Microdosimetric detectors based on multiple-thick gas electron multiplier (multiple-THGEM) configurations are being used in various fields of radiation protection and dosimetry. In the present work, microdosimetric response of these detectors to fast neutrons has been investigated by Monte Carlo method. Three similar microdosimeters made of A-150 and rexolite as the wall materials are designed; the first based on single-THGEM, the second based on double-THGEM and the third is based on triple-THGEM. Sensitive volume of the three microdosimeters is a right cylinder of 5 mm height and diameter which is filled with the propane-based tissue-equivalent (TE) gas. The TE gas with 0.11 atm pressure at the room temperature simulates 1 µm of tissue. Lineal energy distributions for several neutron energies from 10 keV to 14 MeV including 241Am-Be neutrons are calculated by the Geant4 simulation toolkit. Also, mean quality factor and dose-equivalent value for any neutron energy has been determined by these distributions. Obtained data derived from the three microdosimeters are in agreement. Therefore, we conclude that the multiple-THGEM structures present similar microdosimetric responses to fast neutrons.

Keywords: fast neutrons, geant4, multiple-thick gas electron multiplier, microdosimeter

Procedia PDF Downloads 350
1667 Hyperspectral Mapping Methods for Differentiating Mangrove Species along Karachi Coast

Authors: Sher Muhammad, Mirza Muhammad Waqar

Abstract:

It is necessary to monitor and identify mangroves types and spatial extent near coastal areas because it plays an important role in coastal ecosystem and environmental protection. This research aims at identifying and mapping mangroves types along Karachi coast ranging from 24.79 to 24.85 degree in latitude and 66.91 to 66.97 degree in longitude using hyperspectral remote sensing data and techniques. Image acquired during February, 2012 through Hyperion sensor have been used for this research. Image preprocessing includes geometric and radiometric correction followed by Minimum Noise Fraction (MNF) and Pixel Purity Index (PPI). The output of MNF and PPI has been analyzed by visualizing it in n-dimensions for end-member extraction. Well-distributed clusters on the n-dimensional scatter plot have been selected with the region of interest (ROI) tool as end members. These end members have been used as an input for classification techniques applied to identify and map mangroves species including Spectral Angle Mapper (SAM), Spectral Feature Fitting (SFF), and Spectral Information Diversion (SID). Only two types of mangroves namely Avicennia Marina (white mangroves) and Avicennia Germinans (black mangroves) have been observed throughout the study area.

Keywords: mangrove, hyperspectral, hyperion, SAM, SFF, SID

Procedia PDF Downloads 362
1666 Review Architectural Standards in Design and Development Children's Educational Centers

Authors: Ahmad Torkaman, Suogol Shomtob, Hadi Akbari Seddigh

Abstract:

In this paper it has been attempted to investigate the lack of attention to how specific spatial characteristics of the children except existing places such as nurseries. In order to achieve the standard center to faster children understanding their mentality is the first issue that must be studied. Exploring the spiritual characteristics and complexities of children cannot be possible except in accordance with the different aspects and background of their growth in various age periods. In order to achieving the standard center for fostering children, the first issue that must be studied understands their mentality. Exploring the spiritual qualities and complexities of children are not provided except in accordance with the characteristics and their different growth backgrounds in different age periods. According to previous researches game or playing is the most important activity that helps children to communicate and educate and sometimes therapy in specific fields. Investigating game as a proper way to train, the variety of games, the various kind of play environment and how to treat some abnormalities thereby are the issues discussed in recent research. Another consideration concerns the importance of artistic activities among children which is very evident in studying identification of their abnormalities. At the end of this study after investigating how to understand child and communicate with him/her, aiming to recognize Specific spatial characteristics for better training children, the physical and physiological criteria and characteristics is Reviewed and ends up to a list of required spaces and dimensional characteristic of spaces and needed children's equipment.

Keywords: children, space, interior design, development, growth

Procedia PDF Downloads 333
1665 The Use of Layered Neural Networks for Classifying Hierarchical Scientific Fields of Study

Authors: Colin Smith, Linsey S Passarella

Abstract:

Due to the proliferation and decentralized nature of academic publication, no widely accepted scheme exists for organizing papers by their scientific field of study (FoS) to the author’s best knowledge. While many academic journals require author provided keywords for papers, these keywords range wildly in scope and are not consistent across papers, journals, or field domains, necessitating alternative approaches to paper classification. Past attempts to perform field-of-study (FoS) classification on scientific texts have largely used a-hierarchical FoS schemas or ignored the schema’s inherently hierarchical structure, e.g. by compressing the structure into a single layer for multi-label classification. In this paper, we introduce an application of a Layered Neural Network (LNN) to the problem of performing supervised hierarchical classification of scientific fields of study (FoS) on research papers. In this approach, paper embeddings from a pretrained language model are fed into a top-down LNN. Beginning with a single neural network (NN) for the highest layer of the class hierarchy, each node uses a separate local NN to classify the subsequent subfield child node(s) for an input embedding of concatenated paper titles and abstracts. We compare our LNN-FOS method to other recent machine learning methods using the Microsoft Academic Graph (MAG) FoS hierarchy and find that the LNN-FOS offers increased classification accuracy at each FoS hierarchical level.

Keywords: hierarchical classification, layer neural network, scientific field of study, scientific taxonomy

Procedia PDF Downloads 133
1664 The Strategic Importance of Technology in the International Production: Beyond the Global Value Chains Approach

Authors: Marcelo Pereira Introini

Abstract:

The global value chains (GVC) approach contributes to a better understanding of the international production organization amid globalization’s second unbundling from the 1970s on. Mainly due to the tools that help to understand the importance of critical competences, technological capabilities, and functions performed by each player, GVC research flourished in recent years, rooted in discussing the possibilities of integration and repositioning along regional and global value chains. Regarding this context, part of the literature endorsed a more optimistic view that engaging in fragmented production networks could represent learning opportunities for developing countries’ firms, since the relationship with transnational corporations could allow them build skills and competences. Increasing recognition that GVCs are based on asymmetric power relations provided another sight about benefits, costs, and development possibilities though. Once leading companies tend to restrict the replication of their technologies and capabilities by their suppliers, alternative strategies beyond the functional specialization, seen as a way to integrate value chains, began to be broadly highlighted. This paper organizes a coherent narrative about the shortcomings of the GVC analytical framework, while recognizing its multidimensional contributions and recent developments. We adopt two different and complementary perspectives to explore the idea of integration in the international production. On one hand, we emphasize obstacles beyond production components, analyzing the role played by intangible assets and intellectual property regimes. On the other hand, we consider the importance of domestic production and innovation systems for technological development. In order to provide a deeper understanding of the restrictions on technological learning of developing countries’ firms, we firstly build from the notion of intellectual monopoly to analyze how flagship companies can prevent subordinated firms from improving their positions in fragmented production networks. Based on intellectual property protection regimes we discuss the increasing asymmetries between these players and the decreasing access of part of them to strategic intangible assets. Second, we debate the role of productive-technological ecosystems and of interactive and systemic technological development processes, as concepts of the Innovation Systems approach. Supporting the idea that not only endogenous advantages are important for international competition of developing countries’ firms, but also that the building of these advantages itself can be a source of technological learning, we focus on local efforts as a crucial element, which is not replaceable for technology imported from abroad. Finally, the paper contributes to the discussion about technological development as a two-dimensional dynamic. If GVC analysis tends to underline a company-based perspective, stressing the learning opportunities associated to GVC integration, historical involvement of national States brings up the debate about technology as a central aspect of interstate disputes. In this sense, technology is seen as part of military modernization before being also used in civil contexts, what presupposes its role for national security and productive autonomy strategies. From this outlook, it is important to consider it as an asset that, incorporated in sophisticated machinery, can be the target of state policies besides the protection provided by intellectual property regimes, such as in export controls and inward-investment restrictions.

Keywords: global value chains, innovation systems, intellectual monopoly, technological development

Procedia PDF Downloads 81
1663 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 351
1662 Acute Intraperitoneal Toxicity of Sesbania grandiflora (Katuray) Methanolic Flower Extract in Swiss Albino Mice

Authors: Levylee Bautista, Dawn Grace Santos, Aishwarya Veluchamy, Jesusa Santos, Ghafoor Haque, Jr. I, Rodolfo Rafael

Abstract:

Sesbania grandiflora is widely used in traditional medicine to treat a wide range of ailments. Assessment of its toxic properties is hence crucial when considering public health protection because exposure to plant extracts may pose adverse effects on consumers. This study aimed to investigate the acute intraperitoneal toxicity of S. grandiflora flower methanolic extract (SGFME) in Swiss albino mice. Four different concentrations (11.25, 22.5, 40, and 90 mg/kg) of SGFME were administered intraperitoneally and immediate behavioral and clinical signs were observed. All concentrations of SGFME-treated mice exhibited gasping and faster respiratory rate, writhing, reddening and fanning of the ears, paralysis of the hind leg, and mortality. Such reactions may be attributed to the histamine and saponin content of S. grandiflora. Results of this study suggests that intraperitoneal administration of SGFME produced significant adverse effect in mice, therefore, caution should be exercised in using it as herbal remedy since there is little control over its quality.

Keywords: acute toxicity test, histamine, medicinal plants, Sesbania grandiflora

Procedia PDF Downloads 168
1661 Assessment of the Standard of Referrals for Extraction of Carious Primary Teeth under General Anaesthetic

Authors: Emma Carr, Jennifer Morrison, Peter Walker

Abstract:

Background: Due to COVID-19, there was a significant reduction in the number of children being treated under general anaesthetic (GA) within the health board, which led to a backlog of referrals. The referrals were being triaged and added to a waiting list in order of priority -determined by the information given. By implementing a checklist, it is anticipated that at least 70% of referrals will have the majority of the information required to effectively prioritise patients. The gold standard, as defined in ‘Guidelines For The Management Of Children Referred For Dental Extractions Under General Anaesthesia’, indicates that all referrals should mention: (i) Inability of the child to cooperate, (ii) Previously tried anxiety management techniques, (iii) Existence of psychological disorders, (iv) Presence of acute dental infection, (v) Requirement for extractions in multiple quadrants. Method: 130 referrals were examined over three months and compared to the recommended standard. A letter was emailed to referring dentists within Ayrshire & Arran outlining the recommended information to be included within the referral. The second round of data collection was then carried out, which involved an examination of 105 referrals. Results: The first round revealed that only 28% of referrals mentioned at least four defined standards outlined above. Following issuing a checklist to all dentists, this increased to 72%. Conclusion: As many of the children referred for extractions under GA have suffered pain and infection because of dental caries, it is important that delay of treatment is minimised, where possible. The implementation of a standardised checklist has enabled more effective prioritisation of patients.

Keywords: caries, dentistry, general anaesthetic, paediatrics

Procedia PDF Downloads 108