Search results for: juridical security
473 Microbial Phylogenetic Divergence between Surface-Water and Sedimentary Ecosystems Drove the Resistome Profiles
Authors: Okugbe Ebiotubo Ohore, Jingli Zhang, Binessi Edouard Ifon, Mathieu Nsenga Kumwimba, Xiaoying Mu, Dai Kuang, Zhen Wang, Ji-Dong Gu, Guojing Yang
Abstract:
Antibiotic pollution and the evolution of antibiotic resistance genes (ARGs) are increasingly viewed as major threats to both ecosystem security and human health, and has drawn attention. This study investigated the fate of antibiotics in aqueous and sedimentary substrates and the impact of ecosystem shifts between water and sedimentary phases on resistome profiles. The findings indicated notable variations in the concentration and distribution patterns of antibiotics across various environmental phases. Based on the partition coefficient (Kd), the total antibiotic concentration was significantly greater in the surface water (1405.45 ng/L; 49.5%) compared to the suspended particulate matter (Kd =0.64; 892.59 ng/g; 31.4%) and sediment (Kd=0.4; 542.64 ng/g; 19.1%). However, the relative abundance of ARGs in surface water and sediment was disproportionate to the abundance of antibiotics concentration, and sediments were the predominant ARGs reservoirs. Phylogenetic divergence of the microbial communities between the surface water and the sedimentary ecosystems potentially played important roles in driving the ARGs profiles between the two distinctive ecosystems. ARGs of Clinical importance; including blaGES, MCR-7.1, ermB, tet(34), tet36, tetG-01, and sul2 were significantly increased in the surface water, while blaCTX-M-01, blaTEM, blaOXA10-01, blaVIM, tet(W/N/W), tetM02, and ermX were amplified in the sediments. cfxA was an endemic ARG in surface-water ecosystems while the endemic ARGs of the sedimentary ecosystems included aacC4, aadA9-02, blaCTX-M-04, blaIMP-01, blaIMP-02, bla-L1, penA, erm(36), ermC, ermT-01, msrA-01, pikR2, vgb-01, mexA, oprD, ttgB, and aac. These findings offer a valuable information for the identification of ARGs-specific high-risk reservoirs.Keywords: antibiotic resistance genes, microbial diversity, suspended particulate matter, sediment, surface water
Procedia PDF Downloads 31472 Enhanced Disk-Based Databases towards Improved Hybrid in-Memory Systems
Authors: Samuel Kaspi, Sitalakshmi Venkatraman
Abstract:
In-memory database systems are becoming popular due to the availability and affordability of sufficiently large RAM and processors in modern high-end servers with the capacity to manage large in-memory database transactions. While fast and reliable in-memory systems are still being developed to overcome cache misses, CPU/IO bottlenecks and distributed transaction costs, disk-based data stores still serve as the primary persistence. In addition, with the recent growth in multi-tenancy cloud applications and associated security concerns, many organisations consider the trade-offs and continue to require fast and reliable transaction processing of disk-based database systems as an available choice. For these organizations, the only way of increasing throughput is by improving the performance of disk-based concurrency control. This warrants a hybrid database system with the ability to selectively apply an enhanced disk-based data management within the context of in-memory systems that would help improve overall throughput. The general view is that in-memory systems substantially outperform disk-based systems. We question this assumption and examine how a modified variation of access invariance that we call enhanced memory access, (EMA) can be used to allow very high levels of concurrency in the pre-fetching of data in disk-based systems. We demonstrate how this prefetching in disk-based systems can yield close to in-memory performance, which paves the way for improved hybrid database systems. This paper proposes a novel EMA technique and presents a comparative study between disk-based EMA systems and in-memory systems running on hardware configurations of equivalent power in terms of the number of processors and their speeds. The results of the experiments conducted clearly substantiate that when used in conjunction with all concurrency control mechanisms, EMA can increase the throughput of disk-based systems to levels quite close to those achieved by in-memory system. The promising results of this work show that enhanced disk-based systems facilitate in improving hybrid data management within the broader context of in-memory systems.Keywords: in-memory database, disk-based system, hybrid database, concurrency control
Procedia PDF Downloads 420471 Fusion of Finger Inner Knuckle Print and Hand Geometry Features to Enhance the Performance of Biometric Verification System
Authors: M. L. Anitha, K. A. Radhakrishna Rao
Abstract:
With the advent of modern computing technology, there is an increased demand for developing recognition systems that have the capability of verifying the identity of individuals. Recognition systems are required by several civilian and commercial applications for providing access to secured resources. Traditional recognition systems which are based on physical identities are not sufficiently reliable to satisfy the security requirements due to the use of several advances of forgery and identity impersonation methods. Recognizing individuals based on his/her unique physiological characteristics known as biometric traits is a reliable technique, since these traits are not transferable and they cannot be stolen or lost. Since the performance of biometric based recognition system depends on the particular trait that is utilized, the present work proposes a fusion approach which combines Inner knuckle print (IKP) trait of the middle, ring and index fingers with the geometrical features of hand. The hand image captured from a digital camera is preprocessed to find finger IKP as region of interest (ROI) and hand geometry features. Geometrical features are represented as the distances between different key points and IKP features are extracted by applying local binary pattern descriptor on the IKP ROI. The decision level AND fusion was adopted, which has shown improvement in performance of the combined scheme. The proposed approach is tested on the database collected at our institute. Proposed approach is of significance since both hand geometry and IKP features can be extracted from the palm region of the hand. The fusion of these features yields a false acceptance rate of 0.75%, false rejection rate of 0.86% for verification tests conducted, which is less when compared to the results obtained using individual traits. The results obtained confirm the usefulness of proposed approach and suitability of the selected features for developing biometric based recognition system based on features from palmar region of hand.Keywords: biometrics, hand geometry features, inner knuckle print, recognition
Procedia PDF Downloads 221470 The Lived Experiences of South African Female Offenders and the Possible Links to Recidivism Due to their Exclusion from Educational Rehabilitation Programmes
Authors: Jessica Leigh Thornton
Abstract:
The South African Constitution outlines provisions for every detainee and sentenced prisoner in relation to the human rights recognized in the country since 1994; but currently, across the country, prisons have yet to meet many of these criteria. Consequently, their day-to-day lives are marked by extreme lack of privacy, high rates of infection, poor nutrition, and deleterious living conditions, which steadily erode prisoners’ mental and physical capacities rather than rehabilitating inmates so that they can effectively reintegrate into society. Even more so, policy reform, advocacy, security, and rehabilitation programs continue to be based on research and theories that were developed to explain the experiences of men, while female offenders are seen as the “special category” of inmates. Yet, the experiences of women and their pathways to incarceration are remarkably different from those of male offenders. Consequently, little is known about the profile, nature and contributing factors and experiences of female offenders which has impeded a comprehensive and integrated understanding of the subject of female criminality. The number of women globally in correctional centers has more than doubled over the past fifteen years (these increases vary from prison to prison and country to country). Yet, female offenders have largely been ignored in research even though the minority status of female offenders is a phenomenon that is not peculiar to South Africa as the number of women incarcerated has increased by 68% within the decade. Within South Africa, there have been minimal studies conducted on the gendered experience of offenders. While some studies have explored the pathways to female offending, gender-sensitive correctional programming for women that respond to their needs has been overlooked. This often leads to a neglect of the needs of female offenders, not only in terms of programs and services delivery to this minority group but also from a research perspective. In response, the aim of the proposed research is twofold: Firstly, the lived experiences and views of rehabilitation and reintegration of female offenders will be explored. Secondly, the various pathways into and out of recidivism amongst female offenders will be investigated regarding their inclusion in educational rehabilitation.Keywords: female incarceration, educational rehabilitation, exclusion, experiences of female offenders
Procedia PDF Downloads 273469 Mordechai Vanunu: “The Atomic Spy” as a Nuclear Threat to Discourse in Israeli Society
Authors: Ada Yurman
Abstract:
Using the case of Israeli Atomic Spy Mordechai Vanunu as an example, this study sought to examine social response to political deviance whereby social response can be mobilized in order to achieve social control. Mordechai Vanunu, a junior technician in the Dimona Atomic Research Center, played a normative role in the militaristic discourse while working in the “holy shrine” of the Israeli defense system for many years. At a certain stage, however, Vanunu decided to detach himself from this collective and launched an assault on this top-secret circle. Israeli society in general and the security establishment in particular found this attack intolerable and unforgivable. They presented Vanunu as a ticking time bomb, delegitimized him and portrayed him as “other”. In addition, Israeli enforcement authorities imposed myriad prohibitions and sanctions on Vanunu even after his release from prison – “as will be done to he who desecrates holiness.” Social response to Vanunu at the time of his capture and trial was studied by conducting a content analysis of six contemporary daily newspapers. The analysis focused on use of language and forms of expression. In contrast with traditional content analysis methodology, this study did not just look at frequency of expressions of ideas and terms in the text and covert content; rather, the text was analyzed as a structural whole, and included examination of style, tone and unusual use of imagery, and more, in order to uncover hidden messages within the text. The social response to this case was extraordinarily intense, not only because in this case of political deviance, involving espionage and treason, Vanunu’s actions comprised a real potential threat to the country, but also because of the threat his behavior posed to the symbolic universe of society. Therefore, the response to this instance of political deviance can be seen as being part of a mechanism of social control aiming to protect world view of society as a whole, as well as to punish the criminal.Keywords: militarism, political deviance, social construction, social control
Procedia PDF Downloads 113468 Energy Intensity: A Case of Indian Manufacturing Industries
Authors: Archana Soni, Arvind Mittal, Manmohan Kapshe
Abstract:
Energy has been recognized as one of the key inputs for the economic growth and social development of a country. High economic growth naturally means a high level of energy consumption. However, in the present energy scenario where there is a wide gap between the energy generation and energy consumption, it is extremely difficult to match the demand with the supply. India being one of the largest and rapidly growing developing countries, there is an impending energy crisis which requires immediate measures to be adopted. In this situation, the concept of Energy Intensity comes under special focus to ensure energy security in an environmentally sustainable way. Energy Intensity is defined as the energy consumed per unit output in the context of industrial energy practices. It is a key determinant of the projections of future energy demands which assists in policy making. Energy Intensity is inversely related to energy efficiency; lesser the energy required to produce a unit of output or service, the greater is the energy efficiency. Energy Intensity of Indian manufacturing industries is among the highest in the world and stands for enormous energy consumption. Hence, reducing the Energy Intensity of Indian manufacturing industries is one of the best strategies to achieve a low level of energy consumption and conserve energy. This study attempts to analyse the factors which influence the Energy Intensity of Indian manufacturing firms and how they can be used to reduce the Energy Intensity. The paper considers six of the largest energy consuming manufacturing industries in India viz. Aluminium, Cement, Iron & Steel Industries, Textile Industries, Fertilizer and Paper industries and conducts a detailed Energy Intensity analysis using the data from PROWESS database of the Centre for Monitoring Indian Economy (CMIE). A total of twelve independent explanatory variables based on various factors such as raw material, labour, machinery, repair and maintenance, production technology, outsourcing, research and development, number of employees, wages paid, profit margin and capital invested have been taken into consideration for the analysis.Keywords: energy intensity, explanatory variables, manufacturing industries, PROWESS database
Procedia PDF Downloads 331467 Feedback of an Automated Hospital about the Performance of an Automated Drug Dispensing System’s Implementation
Authors: Bouami Hind, Millot Patrick
Abstract:
The implementation of automated devices in life-critical systems such as hospitals can bring a new set of challenges related to automation malfunctions. While automation has been identified as great leverage for the medication dispensing system’s security and efficiency, it also increases the complexity of the organization. In particular, the installation and operation stage of automated devices can be complex when malfunctions related to automated systems occur. This paper aims to document operators’ situation awareness about the malfunctions of automated drug delivery systems (ADCs) during their implementation through Saint Brieuc hospital’s feedback. Our evaluation approach has been deployed in Saint Brieuc hospital center’s pharmacy, which has been equipped with automated nominative drug dispensing systems since January of 2021. The analysis of Saint Brieuc hospital center pharmacy’s automation revealed numerous malfunctions related to the implementation of Automated Delivery Cabinets. It appears that the targeted performance is not reached in the first year of implementation in this case study. Also, errors have been collected in patients' automated treatments’ production such as lack of drugs in pill boxes or nominative carnets, excess of drugs, wrong location of the drug, drug blister damaged, non-compliant sachet, or ticket errors. Saint Brieuc hospital center’s pharmacy is doing a tremendous job of setting up and monitoring performance indicators from the beginning of automation and throughout ADC’s operation to control ADC’s malfunctions and meet the performance targeted by the hospital. Health professionals, including pharmacists, biomedical engineers and directors of work, technical services and safety, are heavily involved in an automation project. This study highlights the importance of the evaluation of ADCs’ performance throughout the implementation process and the hospital’s team involvement in automation supervision and management.Keywords: life-critical systems, situation awareness, automated delivery cabinets, implementation, risks and malfunctions
Procedia PDF Downloads 100466 Assessment of the Risks of Environmental Factors on the Health of Kazakhstan Cities in Promoting the Sustainable Development Goals
Authors: Rassima Salimbayeva, Kaliash Stamkulova, Gulparshyn Satbayeva
Abstract:
In order to adapt projects to promote Sustainable Development Goal 11. «Ensuring openness, security, resilience and environmental sustainability of cities and human settlements», presented in the UN Concept, it is necessary to assess the environmental sustainability of cities. From the analysis of the problems of sustainable development of cities in Kazakhstan, it can be seen that the industrial past created a typical range of problems -transport, housing, environment, and, importantly, image. Currently, the issue of air pollution in cities whose economies are dominated by one industry or company should be studied in more detail at the level of projects. In this research, using ecological, economic, and social indicators of five single-industry towns of the Karaganda region of Kazakhstan, an assessment of the risks of the negative impact of environmental factors on the health of the population was carried out, including by paying special attention to air quality. In order to investigate the relationship between the structure of industry, environmental pressure, and environmental sustainability of resource-oriented cities, an analysis of the main components was carried out to measure the structure of industry, environmental stress, and environmental sustainability of single-industry towns. It has been established that in resource-based cities, economic growth mainly depends on the development of one main industry, which primarily depends on local natural resources. Empirical results show that the regional structure of industry has a significant negative impact on the environmental sustainability of cities, in particular on the health of the population living in them. The paper complements the study of the theory of urban sustainability and clarifies the relationship between industrial structure and environmental pressure on health safety and environmental sustainability of cities and towns, which is crucial for further promoting the "green" development of single-industry towns based on natural resources.Keywords: public health risks, urban sustainability, suspended solids, single-industry towns, atmospheric air, environmental pollution
Procedia PDF Downloads 17465 Economic Life of Iranians on Instagram and the Disturbance in Politics
Authors: Mohammad Zaeimzade
Abstract:
The development of communication technologies is clearly and rapidly moving towards reducing the distance between the virtual and real worlds. Of course, living in a two-spatial or two-globalized world or any other interpretation that means mixing real and virtual life is still relevant and debatable. In the present age of communication, where social networks have transformed the message equation and turned the audience out of passivity and turned into a user. Platforms have penetrated widely in various aspects of human life, from culture and education and economy. Among the messengers, Instagram, which is one of the most extensive image-based interactive networks, plays a significant role in the new economic life. It doesn't need much explanation that the era of thinking of every messenger as a non-insulating conductor that is just a neutral load has passed. Every messenger has its own economic, political and of course security background, Instagram is no exception to this rule and of course it leaves its effects in bio-economics as well. Iran, as the 19th largest economy in the world, has not been unaffected by new platforms, including Instagram, and their consequences in the economy. Generally, in the policy-making space, there are two simple and inflexible pessimistic or optimistic views on this issue, and each of the holders of these views usually have their own one-dimensional policy recommendations regarding how to deal with Instagram. Prescriptions that are usually very different and sometimes contradictory. In this article, we show that this confusion of policymakers is the result of not accurately describing the reality of its effect, and the reason for this inaccurate description is the existence of a conflict of interests in the eyes of describers and researchers. In this article, we first take a look at the main indicators of the Iranian economy, estimate the role of the digital economy in Iran's economic growth, then study the conflicting descriptions of the Instagram-based digital economy, the statistics that show the tolerance of economic users of Instagram in Iran. 300 thousand to 9 million have been estimated. Finally, we take a look at the government's actions in this matter, especially in the context of street riots in October and November 2022. And we suggest an intermediate idea.Keywords: digital economy, instagram, conflict of interest, social networks
Procedia PDF Downloads 77464 Bioconversion of Kitchen Waste to Bio-Ethanol for Energy Security and Solid Waste Management
Authors: Sanjiv Kumar Soni, Chetna Janveja
Abstract:
The approach of utilizing zero cost kitchen waste residues for growing suitable strains of fungi for the induction of a cocktail of hydrolytic enzymes and ethanol generation has been validated in the present study with the objective of developing an indigenous biorefinery for low cost bioethanol production with the generation of zero waste. Solid state fermentation has been carried out to evaluate the potential of various steam pretreated kitchen waste residues as substrates for the co-production of multiple carbohydrases including cellulases, hemicellulases, pectinase and amylases by a locally isolated strain of Aspergillus niger C-5. Of all the residues, potato peels induced the maximum yields of all the enzyme components corresponding to 64.0±1.92 IU of CMCase, 17.0±0.54 IU of FPase , 42.8±1.28 IU of β-glucosidase, 990.0±28.90 IU of xylanase, 53.2±2.12 IU of mannanase, 126.0±3.72 IU of pectinase, 31500.0±375.78 IU of α-amylase and 488.8±9.82 IU of glucoamylase/g dry substrate respectively. Saccharification of various kitchen refuse residues using inhouse produced crude enzyme cocktail resulted in the release of 610±10.56, 570±8.89, 435±6.54, 475±4.56, 445±4.27, 385±4.49, 370±6.89, 490±10.45 mg of total reducing sugars/g of dried potato peels, orange peels, pineapple peels, mausami peels, onion peels, banana stalks, pea pods and composite mixture respectively revealing carbohydrate conversion efficiencies in the range of 97.0-99.4%. After fermentation of released hexoses by Saccharomyces cerevisae, ethanol yields ranging from 80-262 mL/ kg of dry residues were obtained. The study has successfully evaluated the valorization of kitchen garbage, a highly biodegradable component in Municipal Solid Waste by using it as a substrate for the in-house co-production of multiple carbohydrases and employing the steam treated residues as a feed stock for bioethanol production. Such valorization of kitchen garbage may reduce the level of Municipal Solid Waste going into land-fills thus lowering the emissions of greenhouse gases. Moreover, the solid residue left after the bioconversion may be used as a biofertilizer for improving the fertility of the soils.Keywords: kitchen waste, bioethanol, solid waste, bioconversion, waste management
Procedia PDF Downloads 401463 Conservation Agriculture and Precision Water Management in Alkaline Soils under Rice-Wheat Cropping System: Effect on Wheat Productivity and Irrigation Water Use-a Case Study from India
Authors: S. K. Kakraliya, H. S. Jat, Manish Kakraliya, P. C. Sharma, M. L. Jat
Abstract:
The biggest challenge in agriculture is to produce more food for the continually increasing world population with in the limited land and water resources. Serious water deficits and reducing natural resources are some of the major threats to the agricultural sustainability in many regions of South Asia. Food and water security may be gained by bringing improvement in the crop water productivity and the amount produced per unit of water consumed. Improvement in the crop water productivity may be achieved by pursuing alternative modern agronomics approaches, which are more friendly and efficient in utilizing natural resources. Therefore, a research trial on conservation agriculture (CA) and precision water management (PWM) was conducted in 2018-19 at Karnal, India to evaluate the effect on crop productivity and irrigation in sodic soils under rice-wheat (RW) systems of Indo-Gangetic Plains (IGP). Eight scenarios were compared varied in the tillage, crop establishment, residue and irrigarion management i.e., {First four scenarios irrigated with flood irrigation method;Sc1-Conventional tillage (CT) without residue, Sc2-CT with residue, Sc3- Zero tillage (ZT) without residue, Sc4-ZT with residue}, and {last four scenarios irrigated with sub-surface drip irrigation method; Sc5-ZT without residue, Sc6- ZT with residue, Sc7-ZT inclusion legume without residue and Sc8- ZT inclusion legume with residue}. Results revealed that CA-flood irrigation (S3, Sc4) and CA-PWM system (Sc5, Sc6, Sc7 and Sc8) recorded about ~5% and ~15% higher wheat yield, respectively compared to Sc1. Similar, CA-PWM saved ~40% irrigation water compared to Sc1. Rice yield was not different under different scenarios in the first year (kharif 2019) but almost half irrigation water saved under CA-PWM system. Therefore, results of our study on modern agronomic practices including CA and precision water management (subsurface drip irrigation) for RW rotation would be addressed the existing and future challenges in the RW system.Keywords: Sub-surface drip, Crop residue, Crop yield , Zero tillage
Procedia PDF Downloads 121462 Artificial Intelligence Impact on Strategic Stability
Authors: Darius Jakimavicius
Abstract:
Artificial intelligence is the subject of intense debate in the international arena, identified both as a technological breakthrough and as a component of the strategic stability effect. Both the kinetic and non-kinetic development of AI and its application in the national strategies of the great powers may trigger a change in the security situation. Artificial intelligence is generally faster, more capable and more efficient than humans, and there is a temptation to transfer decision-making and control responsibilities to artificial intelligence. Artificial intelligence, which, once activated, can select and act on targets without further intervention by a human operator, blurs the boundary between human or robot (machine) warfare, or perhaps human and robot together. Artificial intelligence acts as a force multiplier that speeds up decision-making and reaction times on the battlefield. The role of humans is increasingly moving away from direct decision-making and away from command and control processes involving the use of force. It is worth noting that the autonomy and precision of AI systems make the process of strategic stability more complex. Deterrence theory is currently in a phase of development in which deterrence is undergoing further strain and crisis due to the complexity of the evolving models enabled by artificial intelligence. Based on the concept of strategic stability and deterrence theory, it is appropriate to develop further research on the development and impact of AI in order to assess AI from both a scientific and technical perspective: to capture a new niche in the scientific literature and academic terminology, to clarify the conditions for deterrence, and to identify the potential uses, impacts and possibly quantities of AI. The research problem is the impact of artificial intelligence developed by great powers on strategic stability. This thesis seeks to assess the impact of AI on strategic stability and deterrence principles, with human exclusion from the decision-making and control loop as a key axis. The interaction between AI and human actions and interests can determine fundamental changes in great powers' defense and deterrence, and the development and application of AI-based great powers strategies can lead to a change in strategic stability.Keywords: artificial inteligence, strategic stability, deterrence theory, decision making loop
Procedia PDF Downloads 43461 Environmental Degradation and Biodiversity Loss in Bangladesh
Authors: Mohammad Atiqur Rahman
Abstract:
The study aimed at inventorying the threatened biodiversity of Bangladesh and assessing the rate of loss of biodiversity caused due to environmental degradation for conservation management. The impact assessment of environmental depletion and rate of biodiversity loss determination have been made by a long term field investigation, examination of preserved herbarium specimens and survey of relevant floristic literature following the IUCN’s threatened criteria of assessing Red List Plants under the Flora Bangladesh Project. Biodiversity of Bangladesh, as evaluated, has been affected to a large extent during the last four and half decades due to spontaneous environmental degradation caused by frequent occurrence of cyclonic storms and tidal bores since 1970 and flooding, draught, unilateral diversion of trans-boundary waters by operating Farakka Barrage since 1975, indiscriminate destruction and over exploitation of natural resources, unplanned development and industrialization, overpopulation etc. Depletion of world’s largest mangrove biodiversity in Sundarbans, coastal and island biodiversity in southern part, agro-biodiversity and agro-fisheries all over the country, Haor and wetland biodiversity of plain lands, terrestrial and forest biodiversity in central and eastern hilly part of Bangladesh, as assessed, have greatly been occurred at a higher rate due to environmental degradation which in turn affect directly or indirectly the economy, food security and environmental health of the country. Complete inventory of 30 plant families resulted in the recognition of 45.18% species of Bangladesh as threatened environmentally and 13.23% species as possibly extinct from the flora since these have neither been reported or could be traced in the field for more than 100 years. The rate of extinction is determined to be 2.65% per 20 years. Hence the study indicates that the loss of biodiversity and environmental degradation in Bangladesh occurring at an alarming rate. The study focuses on the issues of environment, the extent of loss of different plant biodiversities in Bangladesh, prioritizing and implementing national conservation strategies for sustainable management of the environment.Keywords: Bangladesh, biodiversity, conservation, environmental management
Procedia PDF Downloads 252460 Alternative Seed System for Enhanced Availability of Quality Seeds and Seed/Varietal Replacement Rate - An Experience
Authors: Basave Gowda, Lokesh K., Prasanth S. M., Bellad S. B., Radha J., Lokesh G. Y., Patil S. B., Vijayakumar D. K., Ganigar B. S., Rakesh C. Mathad
Abstract:
Quality seed plays an important role in enhancing the crop productivity. It was reported and confirmed by large scale verification research trials that by use of quality seeds alone, the crop yield can be enhanced by 15 to 20 per cent. At present, the quality seed production and distribution through organised sectors comprising both public and private seed sector was only 20-25% of the requirement and the remaining quantity is met through unorganised sector which include the farmer to farmers saved seeds. With an objective of developing an alternative seed system, the University of Agricultural Sciences, Raichur in Karnataka state has implemented Seed Village Programme in more than 100 villages covering around 5000 farmers every year since 2009-10 and in the selected seed villages, a group of 50-150 farmers were supplied the foundation seeds of new varieties to an extent of 0.4 ha at 50 % subsidy. And two to three training programmes were conducted in the targeted villages for quality seed production and the seed produced in the target group was processed locally in the university seed processing units and arranged for distribution in the local villages by the seed growers themselves. By this new innovative and modified seed system, the university can able to replace old varieties of pigeon pea and green gram by producing 1482, 2978, 2729, 2560, and 4581 tonnes of seeds of new varieties on large scale under farmers and scientists participatory seed village programmes respectively during 2009-10, 2010-11, 2011-12, 2012-13 and 2013-14. From this new alternate model of seed system, there should be large scale promotion of regional seed system involving farmers, NGO and voluntary organisation for quick and effective replacement of old, low yielding, disease susceptible varieties with new high yielding, disease resistant for enhanced food production and food security.Keywords: seed system, seed village, seed replacement, varietal replacement
Procedia PDF Downloads 432459 The Women Entrepreneur Support Fund in Bangladesh: Challenges and Prospects
Authors: Chowdhury Dilruba Shoma
Abstract:
Gender is about equal rights that both males and females having access to responsibilities and opportunities in decision making is a fundamental human right. It is also a precondition for, and a mark of, sustainable people-oriented development. In Bangladesh, women have fewer opportunities than men do to access credit from banks and financial institutions. Entrenched patriarchal attitudes, unequal inheritance rights, and male-dominated hierarchies in the financial system, plus high interest rates and a lack of security/collateral, make it harder for women to obtain bank loans. Limited access to institutional credit is a serious restraint on the productivity and income of women entrepreneurs, (and the wider economy). These gender-biased and structural barriers inhibit women’s access to fundamental economic rights. Using a liberal feminist theoretical lens, this study provides some useful insights into the relationship between gender inequality and entrepreneurship, leading to a better understanding of women’s entrepreneurship development in Bangladesh. Recently, the Bangladesh Government, the United Nations Capital Development Fund, and Bangladesh Bank opened up the Women Entrepreneur Support Fund (WESF) ‒ Credit Guarantee Scheme (CGS) pilot project to cover collateral shortfalls for women entrepreneurs in the small and medium enterprise sector. The aim is to improve gender equality and advance women’s rights in relation to receiving credit. This article examines the challenges and prospects of the WESF-CGS, and suggests that implementation of measures in WESF-CGS policymaking, coupled with a combination of legislatory and regulatory reforms that implement the fundamental tenets of liberal feminism, can lead to a comprehensive and effective credit policy to boost women’s agency and economic empowerment. This may ultimately lead to more sustainable development in Bangladesh.Keywords: Bangladesh, credit guarantee scheme, liberal feminist theory, women entrepreneur support fund
Procedia PDF Downloads 143458 Prevalence of Elder Abuse and Effects of Social Factors on It
Authors: Ezat Vahidian, Babak Eshrati
Abstract:
Introduction: Elder abuse, a very complex issue with diverse definitions and names, has been very slow to capture the public eye and public policy since it is manifested at many levels. It requires the involvement of different types of professionals. While elder abuse is not a new phenomenon, the speed of population ageing world-wide is likely to lead to an increase in its incidence and prevalence. Elder abuse has devastating consequences for older persons such as poor quality of life, psychological distress, and loss of property and security. It is also associated with increased mortality and morbidity. Elder abuse is a problem that manifests itself in both rich and poor countries and at all levels of society. Purpose: The purpose of this study is to determine the prevalence of elder abuse and effects of social factor on it in Markazi Province. Materials and methods: The society of the study was all of the elders in Markazi Province that were available by geographical address in the table of rural and urban household societies. The study was cross sectional and multi phases in sampling the first one was classification according rural and urban area and the second one was cluster sampling with equal cluster. Estimation of samples were 472 persons and increased by design effect to 1110 persons. Collection data was done by questionnaire and analyzed by SPSS and chi 2 exam. Results: This study showed 70 persons were abused (42/8% male and 57/2% female) mean of ages was 74/7 years. 64% were marred and 31% were widows. There were not any significant meaningful association between elder abuse and area of living (pv=0.299),occupation (p.v=0.104), education (pv=0.358) and age (P.value=0.104) there were significant meaningful association between physical impairment (pv=0.08), and movement impairment (P.value=0.008). Conclusion: Results verify that maltreatment occurred in the aged persons. Analysis of data indicated that elder abuse exist in every socioeconomic group with any context of education in urban area and rural area and in men and women. Prevalence of elder abuse was 6.3% (70 persons) that verify the data of developed countries with limited sample.Keywords: elder abuse, education, occupation, area of living
Procedia PDF Downloads 404457 The Influence of Organic Waste on Vegetable Nutritional Components and Healthy Livelihood, Minna, Niger State, Nigeria
Authors: A. Abdulkadir, A. A. Okhimamhe, Y. M. Bello, H. Ibrahim, D. H. Makun, M. T. Usman
Abstract:
Household waste form a larger proportion of waste generated across the state, accumulation of organic waste is an apparent problem and the existing dump sites could be overstressed. Niger state has abundant arable land and water resources thus should be one of the highest producers of agricultural crops in the country. However, the major challenge to agricultural sector today is the loss of soil nutrient coupled with high cost of fertilizer. These have continued to increase the use of fertilizer and decomposed solid waste for enhancing agricultural yield, which have varying effects on the soil as well a threat to human livelihood. Consequently, vegetable yield samples from poultry droppings decomposed household waste manure, NPK treatments and control from each replication were subjected to proximate analysis to determine the nutritional and anti-nutritional component as well as heavy metal concentration. Data collected was analyzed using SPSS software and Randomized complete Block Design means were compared. The result shows that the treatments do not devoid the concentrations of any nutritional components while the anti-nutritional analysis proved that NPK had higher oxalate content than control and organic treats. The concentration of lead and cadmium are within safe permissible level while the mercury level exceeded the FAO/WHO maximum permissible limit for the entire treatments depicts the need for urgent intervention to minimize mercury levels in soil and manure in order to mitigate its toxic effect. Thus, eco-agriculture should be widely accepted and promoted by the stakeholders for soil amendment, higher yield, strategies for sustainable environmental protection, food security, poverty eradication, attainment of sustainable development and healthy livelihood.Keywords: anti-nutritional, healthy livelihood, nutritional waste, organic waste
Procedia PDF Downloads 384456 Digital Antimicrobial Thermometer for Axilliary Usage: A New Device for Measuring the Temperature of the Body for the Reduction of Cross-Infections
Authors: P. Efstathiou, E. Kouskouni, Z. Manolidou, K. Karageorgou, M. Tseroni, A. Efstathiou, V. Karyoti, I. Agrafa
Abstract:
Aim: The aim of this prospective comparative study is to evaluate the reduction of microbial flora on the surface of an axillary digital thermometer, made of antimicrobial copper, in relation with a common digital thermometer. Material – Methods: A brand new digital electronic thermometer implemented with antimicrobial copper (Cu 70% - Nic 30%, low lead) on the two edges of the device (top and bottom: World Patent Number WO2013064847 and Register Number by the Hellenic Copper Development Institute No 11/2012) was manufactured and a comparative study with common digital electronic thermometer was conducted on 18 ICU (Intensive Care Unit) patients of three different hospitals. The thermometry was performed in accordance with the projected International Nursing Protocols for body temperature measurement. A total of 216 microbiological samples were taken from the axillary area of the patients, using both of the investigated body temperature devises. Simultaneously the “Halo” phenomenon (phenomenon “Stefanis”) was studied at the non-antimicrobial copper-implemented parts of the antimicrobial digital electronic thermometer. Results: In all samples collected from the surface of the antimicrobial electronic digital thermometer, the reduction of microbial flora (Klebsiella spp, Staphylococcus aureus, Staphylococcus epidermitis, Candida spp, Pneudomonas spp) was progressively reduced to 99% in two hours after the thermometry. The above flora was found in the axillary cavity remained the same in common thermometer. The statistical analysis (SPSS 21) showed a statistically significant reduction of the microbial load (N = 216, < 0.05). Conclusions: The hospital-acquired infections are linked to the transfer of pathogens due to the multi-usage of medical devices from both health professionals and patients, such as axillary thermometers. The use of antimicrobial digital electronic thermometer minimizes microbes' transportation between patients and health professionals while having all the conditions of reliability, proper functioning, security, ease of use and reduced cost.Keywords: antimicrobial copper, cross infections, digital thermometers, ICU
Procedia PDF Downloads 405455 Human Capital Discourse and Higher Education Policy
Authors: Tien-Hui Chiang
Abstract:
Human capital discourse encourages many countries to expand the capacity of HEIs. Along with this expansion, the higher education system is redefined as a free market and in turn it is privatized and commercialized. However, the state’s role in education is to balance social justice and capital accumulation. This role is further regulated by a specific form of neoliberalism constituted by social contexts. These correlations call for exploring the influence of human capital discourse on interwoven issues, such as the state’s role in education, higher education policy, and employability. Method: According to the perspective of neoliberal governmentality, answers to the above four research questions are likely to be embedded within discourses in documents related to higher education policies. Consequently, this study adopts a qualitative approach by analyzing official documents, including government reports, official statistics, circulars and official statements. Documents were collected and subjected to content analysis, with a particular focus on the period from 2005 to 2021. The technique of content analysis was applied to decode keywords and core concepts of these documents. Findings: Neoliberalism is exerted through human capital discourse in China particularly in the changes in higher education policies moving from quantitative expansion to quality control via employment or employability. Such changes highlight that the principle of “n”eoliberalism is more suitable for illustrating the practice of free market logic in different social contexts. The modifications of neoliberalism adopted by the Chinese government reflect that the state’s mission is to secure social security or the common good, so that public managerialism - in the form of programs for employment, internship and entrepreneurship - is adopted in the name of the public interest and the collective mission. Public managerialism now is not only targeted towards social institutions but the population more generally, incarnated here by college graduates. Its practice is not only to renovate organizational cultures but to activate people’s commitment to national development.Keywords: employability, higher education expansion, neoliberalism, human capital discourse
Procedia PDF Downloads 79454 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network
Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour
Abstract:
Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network
Procedia PDF Downloads 171453 Socio-Economic Impact of Covid-19 in Ethiopia
Authors: Kebron Abich Asnake
Abstract:
The outbreak of COVID-19 has had far-reaching socio-economic consequences globally, and Ethiopia is no exception. This abstract provides a summary of a research study on the socio-economic impact of COVID-19 in Ethiopia. The study analyzes the health impact, economic repercussions, social consequences, government response measures, and opportunities for post-crisis recovery. In terms of health impact, the research explores the spread and transmission of the virus, the capacity and response of the healthcare system, and the mortality rate, with a focus on vulnerable populations. The economic impact analysis entails investigating the contraction of the GDP, employment and income loss, disruption in key sectors such as agriculture, tourism, and manufacturing, and the specific implications for small and medium-sized enterprises (SMEs), foreign direct investment, and remittances. The social impact section looks at the disruptions in education and the digital divide, food security and nutrition challenges, increased poverty and inequality, gender-based violence, and mental health issues. The research also examines the measures taken by the Ethiopian government, including health and safety regulations, economic stimulus packages, social protection programs, and support for vulnerable populations. Furthermore, the study outlines long-term recovery prospects, social cohesion, and community resilience challenges. It highlights the need to strengthen the healthcare system and finds a balance between health and economic priorities. The research concludes by presenting recommendations for policy-makers and stakeholders, emphasizing opportunities for post-crisis recovery such as diversification of the economy, enhanced healthcare infrastructure, investment in digital infrastructure and technology, and support for domestic tourism and local industries. This research provides valuable insights into the socio-economic impact of COVID-19 in Ethiopia, offering a comprehensive analysis of the challenges faced and potential pathways towards recovery.Keywords: impact, covid, ethiopia, health
Procedia PDF Downloads 84452 Financing Energy Efficiency: Innovative Options
Authors: Rahul Ravindranathan, R. P. Gokul
Abstract:
India, in its efforts towards economic and social development, is currently experiencing a heavy demand for energy. Due to the lack of sufficient domestic energy reserves, the country is highly dependent on energy imports which has increased rapidly at a rate of about 12 % per annum since 2005. Hence, India is currently focusing its efforts to manage this energy supply and demand gap and eventually achieve energy security. One of the most cost effective means to reduce this gap is by adopting Energy efficiency measures in the country. Initial assessments have shown that Energy efficiency measures have an energy conservation potential of about 23%. For an estimated investment potential of USD 8 Billion, the annual energy savings was estimated to be about 180 Billion Units per annum. In order to explore this huge energy conservation potential, many critical factors need to be considered to achieve practical energy savings. Financing options for these investments is one such major factor. Not only has India come out with various policy level as well as technology level drives to promote Energy efficiency but it has also developed various financing schemes to promote investment in Energy Efficiency projects. The Public sector has already come out with certain financing schemes such as the Partial Risk Guarantee Fund (PRGF), Venture Capital Fund (VCF), Partial Risk Sharing Fund (PRSF) etc., and various sectors are gradually utilizing these schemes to implement energy saving measures. However, additional financing options are required in order to explore the untouched energy conservation potential in the country. Hence, there is a need to develop some innovative financing options for India which would motivate the private sectors as well as financing institutions to invest in these energy saving measures. This paper shall review the existing financing schemes launched by the Government of India and highlight the key benefits as well as challenges with respect to these schemes. In addition to this, the paper would also review new and innovative financing schemes for India and how the same could be adopted in other parts of the globe especially in South and South East Asia. This review would provide an insight to the various Governments as well as Financial Institutions in coming out with new financing schemes for their country.Keywords: energy, efficiency, financing, India
Procedia PDF Downloads 341451 Out of Order: The Rise of Stop and Search in Civil Orders Legislation
Authors: Jodie Bradshaw, Rebecca Dooley, Habib Kadiri, Holly Bird, Aaliyah Felix-West, Udit Mahalingam, Ella Thomson
Abstract:
The sharp rise of civil orders has led to an expansion of police powers, particularly in the realm of stop and search activities. The broad scope and objectives of these civil orders –addressing issues as varied as public safety, crime prevention, and counter-terrorism – has led to ‘mission-creep’, whereby orders were being imposed in a wider range of contexts than initially intended. The ever-widening purview of civil orders in practice necessitates proactive measures by law enforcement which often rely heavily on the utilisation of stop and search, leading to an expansion of stop and search practices and the regulation of public space. Civil liberties organisations, criminal justice and legal practitioners, activist groups, and researchers have argued that civil orders dilute and undermine foundational legal principles, pose a threat to our basic rights and freedoms, facilitate dangerous criminal justice net-widening, and disproportionately target young, working-class people of colour. Many of the provisions in these orders are potentially incompatible with the right to liberty and security. The conditions of an order (whether negative restrictions or positive obligations) tend to be extremely easy to breach –and in some cases, almost impossible for the person subject to the order not to breach. When the conditions of an order are breached, the result is criminal punishment – often in the form of imprisonment. This paper argues that civil orders set people up to fail, sending them down a path towards incarceration and the ultimate deprivation of liberty. The proclaimed intentions underpinning these civil orders – to tackle purportedly ‘undesirable’ behaviour (which in and of itself is not a crime) committed by ‘undesirable’ people – paves the way for justifying violent and racially disproportionate policing practices.Keywords: civil orders, policing, stop and search, crime, civil liberties, criminal punishment, anti-social behaviour
Procedia PDF Downloads 14450 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks
Authors: Mst Shapna Akter, Hossain Shahriar
Abstract:
One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.Keywords: cyber security, vulnerability detection, neural networks, feature extraction
Procedia PDF Downloads 91449 Analysis of Policy Issues on Computer-Based Testing in Nigeria
Authors: Samuel Oye Bandele
Abstract:
A policy is a system of principles to guide activities and strategic decisions of an organisation in order to achieve stated objectives and meeting expected outcomes. A Computer Based Test (CBT) policy is therefore a statement of intent to drive the CBT programmes, and should be implemented as a procedure or protocol. Policies are hence generally adopted by an organization or a nation. The concern here, in this paper, is the consideration and analysis of issues that are significant to evolving the acceptable policy that will drive the new CBT innovation in Nigeria. Public examinations and internal examinations in higher educational institutions in Nigeria are gradually making a radical shift from Paper Based or Paper-Pencil to Computer-Based Testing. The need to make an objective and empirical analysis of Policy issues relating to CBT became expedient. The following are some of the issues on CBT evolution in Nigeria that were identified as requiring policy backing. Prominent among them are requirements for establishing CBT centres, purpose of CBT, types and acquisition of CBT equipment, qualifications of staff: professional, technical and regular, security plans and curbing of cheating during examinations, among others. The descriptive research design was employed based on a population consisting of Principal Officers (Policymakers), Staff (Teaching and non-Teaching-Policy implementors), and CBT staff ( Technical and Professional- Policy supports) and candidates (internal and external). A fifty-item researcher-constructed questionnaire on policy issues was employed to collect data from 600 subjects drawn from higher institutions in South West Nigeria, using the purposive and stratified random sampling techniques. Data collected were analysed using descriptive (frequency counts, means and standard deviation) and inferential (t-test, ANOVA, regression and Factor analysis) techniques. Findings from this study showed, among others, that the factor loadings had significantly weights on the organizational and National policy issues on CBT innovation in Nigeria.Keywords: computer-based testing, examination, innovation, paper-based testing, paper pencil based testing, policy issues
Procedia PDF Downloads 249448 Team-Theatre as a Tool of Occupational Safety Awareness
Authors: Fiorenza Misale
Abstract:
The painful phenomenon of so-called white deaths and accidents at work, unfortunately, is always current. The key is to act on the culture of security through effective measures of attitudes and behaviors that go far beyond the knowledge and the know-how. It is necessary that there is an ‘introjection’ of safety culture through the conscious involvement of all workers. The legislation on work safety identifies the main tool to promote the culture of safety at work and prevention within the workplace. In law the term education is used to distinguish itself from the information with which they will simply theoretically transmit, and from the training with which they will provide the practical skills. The new decree fact fills several gaps in previous legislation and stresses the importance of training in the workplace, that is, the main activity through which it is possible to achieve the active participation of all workers in the company’s prevention system. This system is built only through the dissemination of risk information, the circulation of information, comparison and dialogue between all actors involved that are the necessary elements for a correct transmission of the culture of worker safety. Training activity should put the focus on work experience in order to bring out all the knowledge needed to identify and assess the risks in the work place, and especially the action to eliminate or control them, integrating, when necessary, the missing knowledge. In addition to traditional training and information systems can be utilized for the purpose of training that are able to affect both one emotionally and aesthetically, team-theatre is one of them. Among the methods of company theater that can be used in work safety we have: Lesson show, theater workshop, improvised theater, forum theater, theater playback. The theater can represent a complementary approach to traditional training and give information on safety measures, demonstrating that there are more engaging outreach tools. Team-theatre allows identification with the characters, a transmission of emotions and moods and it is through the staging of a story that the individual processes new information. It’ also s a means of experiential training that allows you to work with your mind, body, emotions.The aim of one work is the use of corporate theater on the personnel working in the health sector. Through a questionnaire we are able to analyze the knowledge of occupational safety and current risks; in particular in health care which is to be administered before and after the play.Keywords: theater, training, occupational health, safety
Procedia PDF Downloads 274447 Optimization of the Energy Consumption of the Pottery Kilns by the Use of Heat Exchanger as Recovery System and Modeling of Heat Transfer by Conduction Through the Walls of the Furnace
Authors: Maha Bakakri, Rachid Tadili, Fatiha Lemmini
Abstract:
Morocco is one of the few countries that have kept their traditional crafts, despite the competition of modern industry and its impact on manual labor. Therefore the optimization of energy consumption becomes an obligation and this is the purpose of this document. In this work we present some characteristics of the furnace studied, its operating principle and the experimental measurements of the evolutions of the temperatures inside and outside the walls of the furnace, values which will be used later in the calculation of its thermal losses. In order to determine the major source of the thermal losses of the furnace we have established the heat balance of the furnace. The energy consumed, the useful energy and the thermal losses through the walls and the chimney of the furnace are calculated thanks to the experimental measurements which we realized for several firings. The results show that the energy consumption of this type of furnace is very high and that the main source of energy loss is mainly due to the heat losses of the combustion gases that escape from the furnace by the chimney while the losses through the walls are relatively small. it have opted for energy recovery as a solution where we can recover some of the heat lost through the use of a heat exchanger system using a double tube introduced into the flue gas exhaust stack compartment. The study on the heat recovery system is presented and the heat balance inside the exchanger is established. In this paper we also present the numerical modeling of heat transfer by conduction through the walls of the furnace. A numerical model has been established based on the finite volume method and the double scan method. It makes it possible to determine the temperature profile of the furnace and thus to calculate the thermal losses of its walls and to deduce the thermal losses due to the combustion gases. Validation of the model is done using the experimental measurements carried out on the furnace. The results obtained in this work, relating to the energy consumed during the operation of the furnace are important and are part of the energy efficiency framework that has become a key element in global energy policies. It is the fastest and cheapest way to solve energy, environmental and economic security problems.Keywords: energy cunsumption, energy recovery, modeling, energy eficiency
Procedia PDF Downloads 73446 Management of Blood Exposure Risk: Knowledge and Attitudes of Caregivers in Pediatric Dapartments
Authors: Hela Ghali, Oumayma Ben Amor, Salwa Khefacha, Mohamed Ben Rejeb, Sirine Frigui, Meriam Tourki Dhidah, Lamine Dhidah, Houyem Said Laatiri
Abstract:
Background: Blood exposure accidents are the most common problem in hospitals that threaten healthcare professionals with a high risk of infectious complications which weighs heavily on health systems worldwide. Paramedics are the highest risk group due to the nature of their daily activities. We aimed to determine knowledge and attitudes about the management of blood-exposure accidents among nurses and technicians in two pediatric departments. Materials/Methods: This is a cross-sectional descriptive study conducted on March 2017, carried out with the care staff of the pediatric ward of the Farhat Hached Teaching Hospital of Sousse and pediatric surgery of the Fattouma Bourguiba University Hospital in Monastir, using a pre- tested and self-administered questionnaire. Data entry and analysis were performed using Excel software. Results: The response rate was 85.1%. A female predominance (82.5%) was reported among respondents with a sex ratio of 0.21. 80% of the participants were under 35 years old. Seniority of less than 10 years was found in 77.5% of respondents. Only 22.5% knew the definition of a blood- exposure accident. 100% and 95% of participants reported the relative risk, respectively, to hepatitis and AIDS viruses. However, only 15% recognized the severity factors of a blood-exposure accident. Hygiene compliance was the most important dimension for almost the entire population for the prevention. On the other hand, only 12.5% knew the meaning of 'standard precautions' and ¼ considered them necessary for at-risk patients only. 40% reported being exposed at least once, among them, 87.5% used betadine, and 77.5% said that anti-infectious chemoprophylaxis is necessary regardless of the patient's serological status. However, 52.5% did not know the official reporting circuit of management of blood-exposure accident in their institutions. Conclusion: For better management of risks in hospitals and an improvement of the safety of the care, a reinforcement of the sensibilization of the caregivers with regard to the risks of blood exposure accident is necessary, while developing their knowledge to act in security.Keywords: attitudes, blood-exposure accident, knowledge, pediatric department
Procedia PDF Downloads 196445 An Assessment of Rice Yield Improvement Among Smallholder Rice Farmers in Asunafo North Municipality of Ghana
Authors: Isaac Diaka, Matsui Kenichi
Abstract:
Ghana’s rice production has increased mainly because of increased cultivated areas. On this point, scholars who promoted crop production increase for food security have overlooked the fact that its per-acre yield has not increased. Also, Ghana’s domestic rice production has not contributed much to domestic rice consumption especially in major cities where consumers tend to rely on imported rice from Asia. Considering these points, the paper seeks to understand why smallholder rice farmers have not been able to increase per acre rice yield. It also examines smallholder rice farmers’ rice yield improvement needs, and the relationship that exist between rice farmers’ socioeconomic factors and their yield levels by rice varieties. The study adopted a simple random sampling technique to select 154 rice farmers for a questionnaire survey between October and November 2020. The data was analyzed by performing a correlation analysis, an independent t-test, and Kendall’s coefficient of concordance. The results showed that 58.4% of the respondents cultivated popular high-yield varieties like AGRA and Jasmine. The rest used local varieties. Regarding respondents’ yield differentials, AGRA and Jasmine had an average yield of 2.6 mt/ha, which is higher than that of local varieties (1.6mt/ha). The study found untimely availability of improved seed varieties and high cost of inputs some of the major reasons affecting yield in the area. For respondents’ yield improvement needs, Kendall’s coefficient of concordance showed that access to improved varieties, irrigation infrastructure, and row planting were respondents’ major technological needs. As to their non-technological needs, the respondents needed timely information about rice production, access to credit support options, and extension services. The correlation analysis revealed that farm size and off-farm income exhibited a positive and negative association towards respondents’ yield level, respectively. This paper then discusses recommendations for providing with improved rice production technologies to farmers.Keywords: Ghana, rice, smallholder farmers, yield improvement.
Procedia PDF Downloads 93444 Threat Modeling Methodology for Supporting Industrial Control Systems Device Manufacturers and System Integrators
Authors: Raluca Ana Maria Viziteu, Anna Prudnikova
Abstract:
Industrial control systems (ICS) have received much attention in recent years due to the convergence of information technology (IT) and operational technology (OT) that has increased the interdependence of safety and security issues to be considered. These issues require ICS-tailored solutions. That led to the need to creation of a methodology for supporting ICS device manufacturers and system integrators in carrying out threat modeling of embedded ICS devices in a way that guarantees the quality of the identified threats and minimizes subjectivity in the threat identification process. To research, the possibility of creating such a methodology, a set of existing standards, regulations, papers, and publications related to threat modeling in the ICS sector and other sectors was reviewed to identify various existing methodologies and methods used in threat modeling. Furthermore, the most popular ones were tested in an exploratory phase on a specific PLC device. The outcome of this exploratory phase has been used as a basis for defining specific characteristics of ICS embedded devices and their deployment scenarios, identifying the factors that introduce subjectivity in the threat modeling process of such devices, and defining metrics for evaluating the minimum quality requirements of identified threats associated to the deployment of the devices in existing infrastructures. Furthermore, the threat modeling methodology was created based on the previous steps' results. The usability of the methodology was evaluated through a set of standardized threat modeling requirements and a standardized comparison method for threat modeling methodologies. The outcomes of these verification methods confirm that the methodology is effective. The full paper includes the outcome of research on different threat modeling methodologies that can be used in OT, their comparison, and the results of implementing each of them in practice on a PLC device. This research is further used to build a threat modeling methodology tailored to OT environments; a detailed description is included. Moreover, the paper includes results of the evaluation of created methodology based on a set of parameters specifically created to rate threat modeling methodologies.Keywords: device manufacturers, embedded devices, industrial control systems, threat modeling
Procedia PDF Downloads 81