Search results for: private security
2032 Perceptions on Development of the Deaf in Higher Education Level: The Case of Special Education Students in Tiaong, Quezon, Philippines
Authors: Ashley Venerable, Rosario Tatlonghari
Abstract:
This study identified how college deaf students of Bartimaeus Center for Alternative Learning in Tiaong, Quezon, Philippines view development using visual communication techniques and generating themes from responses. Complete enumeration was employed. Guided by Constructivist Theory of Perception, past experiences and stored information influenced perception. These themes of development emerged: social development; pleasant environment; interpersonal relationships; availability of resources; employment; infrastructure development; values; and peace and security. Using the National Economic and Development Authority development indicators, findings showed the deaf students’ views on development were similar from the mainstream views. Responses also became more meaningful through visual communication techniques.Keywords: deaf, development, perception, development indicators, visual communication
Procedia PDF Downloads 4312031 Analyze Long-Term Shoreline Change at Yi-Lan Coast, Taiwan Using Multiple Sources
Authors: Geng-Gui Wang, Chia-Hao Chang, Jee-Cheng Wu
Abstract:
A shoreline is a line where a body of water and the shore meet. It provides economic and social security to coastal habitations. However, shorelines face multiple threats due to both natural processes and man-made effects because of disasters, rapid urbanization, industrialization, and sand deposition and erosion, etc. In this study, we analyzed multi-temporal satellite images of the Yilan coast, Taiwan from 1978 to 2016, using the United States Geological Survey (USGS) Digital Shoreline Analysis System (DSAS), weather information (as rainfall records and typhoon routes), and man-made construction project data to explore the causes of shoreline changes. The results showed that the shoreline at Yilan coast is greatly influenced by typhoons and anthropogenic interventions.Keywords: shoreline change, multi-temporal satellite, digital shoreline analysis system, DSAS, Yi-Lan coast
Procedia PDF Downloads 1642030 IoT: State-of-the-Art and Future Directions
Authors: Bashir Abdu Muzakkari, Aisha Umar Sulaiman, Mohamed Afendee Muhamad, Sanah Abdullahi Muaz
Abstract:
The field of the Internet of Things (IoT) is rapidly expanding and has the potential to completely change how we work, live, and interact with the world. The Internet of Things (IoT) is the term used to describe a network of networked physical objects, including machinery, vehicles, and buildings, which are equipped with electronics, software, sensors, and network connectivity. This review paper aims to provide a comprehensive overview of the current state of IoT, including its definition, key components, development history, and current applications. The paper will also discuss the challenges and opportunities presented by IoT, as well as its potential impact on various industries, such as healthcare, agriculture, and transportation. In addition, this paper will highlight the ethical and security concerns associated with IoT and the need for effective solutions to address these challenges. The paper concludes by highlighting the prospects of IoT and the directions for future research in this field.Keywords: internet of things, IoT, sensors, network
Procedia PDF Downloads 1762029 The Right to Receive Alternative Health Care as a Part of the Right to Health
Authors: Vera Lúcia Raposo
Abstract:
The right to health care – usually known as the right to health – is recognized in many national laws and Constitutions, as well as in international human rights documents. The kind of health care that citizens are entitled to receive, especially in the framework of the National Health Service, is usually identified with conventional medicine. However, since ancient times that a different form of medicine – alternative, traditional or nonconventional medicine – exists. In recent times it is attracting increasing interest, as it is demonstrated by the use of its specific knowledge either by pharmaceutical companies either by modern health technologies. Alternative medicine refers to a holistic approach to body and mind using herbal products, animal parts and minerals instead of technology and pharmaceutical drugs. These notes contributed to a sense of distrust towards it, accusing alternative medicine of being based on superstition and ignorance. However, and without denying that some particular practices lack indeed any kind of evidence or scientific grounds, the fact is that a substantial part of alternative medicine can actually produce satisfactory results. The paper will not advocate the substitution of conventional medicine by alternative medicine, but the complementation between the two and their specific knowledge. In terms of the right to health, as a fundamental right and a human right, this thesis leads to the implementation of a wider range of therapeutic choices for patients, who should be entitled to receive different forms of health care that complement one another, both in public and private health facilities. This scenario would demand a proper regulation for alternative medicine, which nowadays does not exist in most countries, but it is essential to protect patients and public health in general and to reinforce confidence in alternative medicine.Keywords: alternative medicine, conventional medicine, patient’s rights, right to health
Procedia PDF Downloads 3892028 Diversity and Use of Agroforestry Yards of Family Farmers of Ponte Alta – Gama, Federal District, Brazil
Authors: Kever Bruno Paradelo Gomes, Rosana Carvalho Martins
Abstract:
The home gardens areas are production systems, which are located near the homes and are quite common in the tropics. They consist of agricultural and forest species and may also involve the raising of small animals to produce food for subsistence as well as income generation, with a special focus on the conservation of biodiversity. Home gardens are diverse Agroforestry systems with multiple uses, among many, food security, income aid, traditional medicine. The work was carried out on rural properties of the family farmers of the Ponte Alta Rural Nucleus, Gama Administrative Region, in the city of Brasília, Federal District- Brazil. The present research is characterized methodologically as a quantitative, exploratory and descriptive nature. The instruments used in this research were: bibliographic survey and semi-structured questionnaire. The data collection was performed through the application of a semi-structured questionnaire, containing questions that referred to the perception and behavior of the interviewed producer on the subject under analysis. In each question, the respondent explained his knowledge about sustainability, agroecological practices, environmental legislation, conservation methods, forest and medicinal species, ago social and socioeconomic characteristics, use and purpose of agroforestry and technical assistance. The sample represented 55.62% of the universe of the study. We interviewed 99 people aged 18-83 years, with a mean age of 49 years. The low level of education, coupled with the lack of training and guidance for small family farmers in the Ponte Alta Rural Nucleus, is one of the limitations to the development of practices oriented towards sustainable and agroecological agriculture in the nucleus. It is observed that 50.5% of the interviewed people landed with agroforestry yards less than 20 years ago, and only 16.17% of them are older than 35 years. In identifying agriculture as the main activity of most of the rural properties studied, attention is drawn to the cultivation of medicinal plants, fruits and crops as the most extracted products. However, it is verified that the crops in the backyards have the exclusive purpose of family consumption, which could be complemented with the marketing of the surplus, as well as with the aggregation of value to the cultivated products. Initiatives such as this may contribute to the increase in family income and to the motivation and value of the crop in agroecological gardens. We conclude that home gardens of Ponte Alta are highly diverse thus contributing to local biodiversity conservation of are managed by women to ensure food security and allows income generation. The tradition of existing knowledge on the use and management of the diversity of resources used in agroforestry yards is of paramount importance for the development of sustainable alternative practices.Keywords: agriculture, agroforestry system, rural development, sustainability
Procedia PDF Downloads 1422027 A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms
Authors: Shehroz Mukhtar, Maqsood Ahmed, Abdullah Mukhtar, Choudhry Shahid, Waqar Javaid
Abstract:
Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code-switching literature reveals that mostly code-switching has been studied in the classrooms in learning and teaching contexts, while code-switching outside the classroom in settings such as café, hostels and so on has been the least explored areas. The current research investigated the reasons for code-switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different classroom situations. In Pakistani classrooms where Multilingual is in abundance, i.e. they can speak two or more two languages at the same time, code-switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the classrooms. This phenomenon has not been explored in Sialkot’s teaching context. In Sialkot, private educational institutes do not encourage code-switching, whereas public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code-switching by taking its users into consideration. The survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot.Keywords: code switching, foreign language classrooms, bilingual context, use of L1, importance of L2.
Procedia PDF Downloads 702026 The Woman in Arabic Popular Proverbs, Stereotypical Roles and Actual Pain: The Woman in the Institution of Marriage as a Sample
Authors: Hanan Bishara
Abstract:
This study deals with the subject of Popular Arabic Proverbs and the stereotypical roles and images that they create about the woman in general and Arab woman in particular. Popular proverbs in general are considered to be essence of experiences of society and the extract of its collective thought establish wisdom in a distinguished concise tight mold or style that affects the majority of people and keep them alive by virtue of constant use and oral currency through which they are transmitted from one generation to another. Proverbs deal with different aspects and types of people, different social relations, including the society's attitude about the woman. Proverbs about women in the human heritage in general and the Arab heritage in particular are considered of a special characteristics and remarkable in their being dynamic ones that move in all directions of life. Most of them carry the essence of the social issues and are distributed in such a way that they have become part of the private life of the general public. This distribution covers all periods and fields of the woman's life, the social, the economic and psychological ones. The woman occupies a major space in the Popular Proverbs because she is the center of social life inside and outside the house. The woman's statuses and images in the provers are numerous and she is often described in parallel images but each one differs from the other. These images intertwine due to their varieties and multiplicity and ultimately, they constitute a general stereotypical image of the woman, which degrades her status as a woman, a mother and a wife. The study shows how Popular Proverbs in Arabic reflect the Arab woman's position and status in her society.Keywords: Arab, proverb, popular, society, woman
Procedia PDF Downloads 2022025 Pregnancy Rhinitis Prevalence among Saudi Women
Authors: Mohammed G. Alotaibi, Sameer Albahkaly, Salwa M. Bahkali, Abdullah M. Alghamdi, Raseel S. Alswidan, Maha Bin Shafi, Sarah Almaiman
Abstract:
Introduction: Rhinitis is common in Saudi Arabia. Therefore, our study was designed to evaluate the prevalence, triggering factors, severity and progression of rhinitis during pregnancy. Methods: Prospective cross-sectional study was conducted in eight governmental and private medical centers in Riyadh, Saudi Arabia, during June and July 2014. Validated Arabic language self-administered questionnaire was used. Sample size of 260 Saudi pregnant women was calculated by Raosoft sample size calculator. Random sampling was achieved by choosing one and skipping every five patients in the clinic list. Data were coded and entered manually into spreadsheets then transferred to SPSS statistical package version 16.0 for Windows. Consent, Privacy and confidentiality of information were assured. Results: Pregnancy rhinitis was reported 31.2% (CI 25.6 - 37.2%). Symptoms arising in first trimester appeared in 79.2% of PR cases and mostly worsen. The most prevalent symptoms were nasal pruritis (67.5%), followed by sneezing (57.1%), congestion (50.6%), and post nasal drip (46.7%). The major triggering factor was dust (71.4%), followed by Tobacco/Shisha smoke (57.6%) and perfume(47%). Preexisting allergic diseases were markedly associated with developing pregnancy rhinitis. Conclusion: Rhinitis during pregnancy manifested in one third of Saudi pregnant ladies. Nasal pruritus was the most common symptom and dust was the widespread triggering factor.Keywords: allergy, pregnancy, Rhinitis, sneezing
Procedia PDF Downloads 2532024 Cosmetic Surgery on the Rise: The Impact of Remote Communication
Authors: Bruno Di Pace, Roxanne H. Padley
Abstract:
Aims: The recent increase in remote video interaction has increased the number of requests for teleconsultations with plastic surgeons in private practice (70% in the UK and 64% in the USA). This study investigated the motivations for such an increase and the underlying psychological impact on patients. Method: An anonymous web-based poll of 8 questions was designed and distributed to patients seeking cosmetic surgery through social networks in both Italy and the UK. The questions gathered responses regarding 1. Reasons for pursuing cosmetic surgery; 2. The effects of delays caused by the SARS-COV-2 pandemic; 3. The effects on mood; 4. The influence of video conferencing on body-image perception. Results: 85 respondents completed the online poll. Overall, 68% of respondents stated that seeing themselves more frequently online had influenced their decision to seek cosmetic surgery. The types of surgeries indicated were predominantly to the upper body and face (82%). Delays and access to surgeons during the pandemic were perceived as negatively impacting patients' moods (95%). Body-image perception and self-esteem were lower than in the pre-pandemic, particularly during lockdown (72%). Patients were more inclined to undergo cosmetic surgery during the pandemic, both due to the wish to improve their “lockdown face” for video conferencing (77%) and also due to the benefits of home recovery while in smart working (58%). Conclusions: Overall, findings suggest that video conferencing has led to a significant increase in requests for cosmetic surgery and the so-called “Zoom Boom” effect.Keywords: cosmetic surgery, remote communication, telehealth, zoom boom
Procedia PDF Downloads 1802023 The Old Basis of Press Authority and New Media: Devolution of Communication Power Base in Nigeria by X (Formally Twitter)
Authors: Nzeaka Emmanuel Ezimako
Abstract:
With the advent of new media, especially X, the government's previous foundation of media power and control in Nigeria has been diminished because they can no longer regulate the public sphere to control social action and reactions. This study examined how IPOB (Indigenous People of Biafra) resistance and the 2020 #Endsars aborted revolution were able to control public discourse during social upheavals, as well as how the new media have diminished the influence that the government and media owners once had over Nigerians. This study is significant because it recognizes the social transformation brought about by the emergence of new media, particularly with the most widely used social media platform in Nigeria, X, and how citizen media activity is altering the media ecosystem and challenging the government and private media owners' hegemony over news coverage in Nigeria to the point where the government saw X as a blatant threat to its hegemony and banned it in 2021. This study used a triangulation of qualitative and quantitative analysis with 300 respondents (n=300) from different sectors of the media practitioners, scholars, and university students in Nigeria to draw a conclusion in line with Democratic Participant Media Theory, which questions the necessity for centralized media regulated by the government and conglomerates. The contributions to filling the gap in the literature are meant to aid readers in comprehending how X has developed into a dominant force in Nigerian media, particularly during the crisis. The study offers recommendations for media executives, policymakers, and the public on how to manage the media conflict that has developed because of the loss of official government oversight of the mass media due to the emergence of X in the media space.Keywords: Twitter, new media, regulations, dominance, resistance
Procedia PDF Downloads 912022 A Machine Learning Approach to Detecting Evasive PDF Malware
Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran
Abstract:
The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.Keywords: PDF, PDF malware, decision tree classifier, random forest classifier
Procedia PDF Downloads 932021 Three Star Hotels in Sukhumvit Area of Bangkok and the Potential to Be in Tourism Industry Joining the ASEAN Community
Authors: Benjaporn Yaemjamuang, Sasitorn Jetanont
Abstract:
The three star hotels in Sukhumvit area of Bangkok and the potential to be in the tourism industry joining the ASEAN Community were studied. The findings revealed that the representative samples satisfy the potential of hotel services at a high level in all aspects. The level of service satisfaction by gender is not different. On the other hand, for different ethnic origins, ages, occupations, levels of education, the satisfaction on the services varies in significance level of 0.05. Factors associated with satisfaction in the services of the hotel include a potential location and environment. It was also found that satisfaction with the service aspects are related as follows: services (r = .810), food (r = .807), booking service (r = .768), room condition (r = .762) and security (r =.756) which is aligned with the coefficient .826.Keywords: three star hotel, ASEAN community, potential in tourism industry, Bangkok
Procedia PDF Downloads 3032020 Evaluation of Environmental, Social, and Governance Factors by U.S. Tolling Authorities in Bond Issuance Disclosures
Authors: Nicolas D. Norboge
Abstract:
Purchasers of municipal bonds in primary and secondary markets are increasingly expecting issuers to disclose environmental, social, and governance factors (ESG) inissuance and continuing disclosure documents. U.S. tolling authorities are slowly catching up with other transportation sectors, such as public transit, in integrating ESG factors into their bond disclosure documents. A systematic mixed-methods evaluation of publicly available bond disclosure documents from 2010-2022 suggest that only a small number of U.S. tolling authorities disclosedall ESG factors; however, the pace has accelerated significantly from 2020-2022. Because many tolling authorities have a direct financial stake in the growth of passenger vehicle miles traveled on their toll facilities, and in turn the burning of more climate-warming fossil fuels, one crucial questionthat remains is how bond purchasers will view increasedESG transparency. Recent moves by large institutional investors, credit rating agencies, and regulators suggestan expectation of ESG disclosure is a trend likely to endure. This researchsuggests tolling authorities will need to proactively consider these emerging trends and carefully adapt their disclosure practiceswhere possible. Building on these findings, this research also provides a basic sketch framework for how issuers can responsibly position themselves within the changing global municipal debt marketplace.Keywords: debt policy, ESG, municipal bonds, public-private partnerships, public tolling authorities, transportation finance, and policy
Procedia PDF Downloads 1802019 Intellectual Property in Digital Environment
Authors: Balamurugan L.
Abstract:
Artificial intelligence (AI) and its applications in Intellectual Property Rights (IPR) has been significantly growing in recent years. In last couple of years, AI tools for Patent Research and Patent Analytics have been well-stabilized in terms of accuracy of references and representation of identified patent insights. However, AI tools for Patent Prosecution and Patent Litigation are still in the nascent stage and there may be a significant potential if such market is explored further. Our research is primarily focused on identifying potential whitespaces and schematic algorithms to automate the Patent Prosecution and Patent Litigation Process of the Intellectual Property. The schematic algorithms may assist leading AI tool developers, to explore such opportunities in the field of Intellectual Property. Our research is also focused on identification of pitfalls of the AI. For example, Information Security and its impact in IPR, and Potential remediations to sustain the IPR in the digital environment.Keywords: artificial intelligence, patent analytics, patent drafting, patent litigation, patent prosecution, patent research
Procedia PDF Downloads 682018 Study of the Landslide and Stability of Open Pit Quarry: Case of Open Pite Quarry of Chouf Amar M'sila, Algeria
Authors: Saadoun Abd Errazak, Hafssaoui Abdallah, Fredj Mohamed
Abstract:
Mining operations open induce risks of instability that can cause landslides and collapse at the bleachers slope. These risks may occur both during and after the operation phase. The magnitude of these risks depends on the mechanical and physical characteristics of the rock mass, the geometrical dimensions of ore bodies, their spatial arrangement, and the state of the operated area. If security and technology measures are not taken into account for this purpose, the environment will be affected. The main objective of this work is to assess these risks by analytical and numerical methods. The study is based on the geological, hydrogeological and geotechnical rock mass of the open pit quarry of Chouf Amar M'sila. The results obtained have allowed us to obtain an acceptable factor of safety and stability study of the open pit.Keywords: stability, land sliding, numerical modeling, safety factor, open-pit quarry
Procedia PDF Downloads 3762017 Healthcare Waste Management Practices in Bangladesh: A Case Study in Dhaka City, Bangladesh
Authors: H. M. Nuralam, Z. Xiao-lan, B. K. Dubey, D. Wen-Chuan
Abstract:
Healthcare waste (HCW) is one of the major concerns in environmental issues due to its infectious and hazardous nature that is requires specific treatment and systematic management prior to final disposal. This study aimed to assess HCW management system in Dhaka City (DC), Bangladesh, by investigating the present practices implemented by the city. In this study, five different healthcare establishments were selected in DC. Field visits and interviews with health personnel and staff who are concerned with the waste management were conducted. The information was gathered through questionnaire focus on the different aspect of HCW management like, waste segregation and collection, storage and transport, awareness as well. The results showed that a total of 7,215 kg/day (7.2 ton/day) of waste were generated, of which 79.36% (5.6 ton/day) was non-hazardous waste and 20.6% (1.5 ton/day) was hazardous waste. The rate of waste generation in these healthcare establishments (HCEs) was 2.6 kg/bed/day. There was no appropriate and systematic management of HCWs except at few private HCEs that segregate their hazardous waste. All the surveyed HCEs dumped their HCW together with the municipal waste, and some staff members were also found to be engaged in improper handling of the generated waste. Furthermore, the used sharp instruments, saline bags, blood bags and test tubes were collected for resale or reuse. Nevertheless, the lack of awareness, appropriate policy, regulation and willingness to act, were responsible for the improper management of HCW in DC. There was lack of practical training of concerned healthcare to handle the waste properly, while the nurses and staff were found to be aware of the health impacts of HCW.Keywords: awareness, disposal, Dhaka city, healthcare waste management, waste generation
Procedia PDF Downloads 3262016 Minority Rights in Islamic Law (Sharia) and International Law Protection Mechanisms in the Region Kurdistan of Iraq
Authors: Ardawan Mustafa Ismail, Rebaz Sdiq Ismail
Abstract:
The subject of minorities takes an exceptional importance at all levels, around the world, especially those whose population is composed of many nationalities, and this subject became a very affective part in every country for its security, entity and stability, such as the nationality, religion or culture, as a result of internal factors and external influences, and at the same time it became clear that enslaving minorities had become a matter of reality. Which made the rights of minorities one of the legal, political and geographical issues, many attempts emerged that specialists and non-specialists have given the minorities ’problems their realistic solutions away from theorizing and assumption. On this chosen topic, there are many researches that are written in general places, but… It is believed did not see any in-depth studies dealing with the protection of minority rights of the Region of Kurdistan/ Iraq, because in the Region of Kurdistan/ Iraq there are many minorities living in this area, such as: Muslims, Yazidi, Assyrian, Christian, Chaldeans, and others.Keywords: minority, international law, protection, Kurdistan, people
Procedia PDF Downloads 422015 Scalable Performance Testing: Facilitating The Assessment Of Application Performance Under Substantial Loads And Mitigating The Risk Of System Failures
Authors: Solanki Ravirajsinh
Abstract:
In the software testing life cycle, failing to conduct thorough performance testing can result in significant losses for an organization due to application crashes and improper behavior under high user loads in production. Simulating large volumes of requests, such as 5 million within 5-10 minutes, is challenging without a scalable performance testing framework. Leveraging cloud services to implement a performance testing framework makes it feasible to handle 5-10 million requests in just 5-10 minutes, helping organizations ensure their applications perform reliably under peak conditions. Implementing a scalable performance testing framework using cloud services and tools like JMeter, EC2 instances (Virtual machine), cloud logs (Monitor errors and logs), EFS (File storage system), and security groups offers several key benefits for organizations. Creating performance test framework using this approach helps optimize resource utilization, effective benchmarking, increased reliability, cost savings by resolving performance issues before the application is released. In performance testing, a master-slave framework facilitates distributed testing across multiple EC2 instances to emulate many concurrent users and efficiently handle high loads. The master node orchestrates the test execution by coordinating with multiple slave nodes to distribute the workload. Slave nodes execute the test scripts provided by the master node, with each node handling a portion of the overall user load and generating requests to the target application or service. By leveraging JMeter's master-slave framework in conjunction with cloud services like EC2 instances, EFS, CloudWatch logs, security groups, and command-line tools, organizations can achieve superior scalability and flexibility in their performance testing efforts. In this master-slave framework, JMeter must be installed on both the master and each slave EC2 instance. The master EC2 instance functions as the "brain," while the slave instances operate as the "body parts." The master directs each slave to execute a specified number of requests. Upon completion of the execution, the slave instances transmit their results back to the master. The master then consolidates these results into a comprehensive report detailing metrics such as the number of requests sent, encountered errors, network latency, response times, server capacity, throughput, and bandwidth. Leveraging cloud services, the framework benefits from automatic scaling based on the volume of requests. Notably, integrating cloud services allows organizations to handle more than 5-10 million requests within 5 minutes, depending on the server capacity of the hosted website or application.Keywords: identify crashes of application under heavy load, JMeter with cloud Services, Scalable performance testing, JMeter master and slave using cloud Services
Procedia PDF Downloads 302014 Municipal Solid Waste Management Characteristics and Management Challenges in Bauchi Metropolitan Area, Nigeria
Authors: Haruna Abdu Usman, Bashir Usman Mohammed, Mohammed Umar Jamil
Abstract:
Municipal solid waste management constitutes a serious problem bedeviling environmental protection agencies in many cities of developing countries. Most agencies do not collect the totality of the waste generated in their cities. This study presents the current solid waste management practices and problems in Bauchi metropolis, Bauchi state Nigeria. The general feature is characterized by inefficient, insufficient and irrational collection and improper disposal alternatives. The consequent environmental effects of these problems depict clogged city drains, uncollected heap of waste on road sides of residential areas, vacant plots and uncompleted buildings and highways. This contributes immensely to flooding in the city. The major challenges facing the state environmental protection agency includes; lack of collection and disposal points, technical and institutional arrangements, financial resources and general attitude of the serving public among others. The study suggested a comprehensive and integrated approach to the solid waste management which recognizes and incorporates the interventionist role of the state government, the private formal and informal waste management operators and the serving public.Keywords: municipal solid waste, bauchi metropolitan area, environmental protection agency, solid waste management, waste disposal
Procedia PDF Downloads 7462013 Anxiety Sensitivity and Coping Motives Predict Substance Use Craving and Relapse
Authors: Ruhollah Heydari Sheikh Ahmad, Sara Alaie Khoraem
Abstract:
Introduction: Substance use disorder is conceptualized as a chronic relapsing condition where relapse is usually defined as the return to problematic substance use following treatment. An issue of great importance is the identification of the predictors of relapse and the development of treatments that may help prevent relapse. One of the strongest predictors of relapse is craving. The purpose of the present study was to study the effect of anxiety, anxiety sensitivity, and coping motives on craving. Materials and method: Participants (n=74) were male opiate users recruited from a semi-private clinic providing de-toxification and treatment services for substance users. Anxiety, anxiety sensitivity, coping motives and craving were assessed using relevant questionnaires. The addiction severity index was used to assess addiction severity. Results: All patients were methadone maintained and one year after detoxification, 36 patients (48.64%) relapsed. Stress and anxiety, anxiety sensitivity, addiction severity and coping motives predicted craving and relapse. Anxiety sensitivity specifically predicted early relapse. Conclusion: Substance use is a severe mental disorder, with high relapse rates. Substance users high in anxiety sensitivity are particularly prone to relapse during the first six months of treatment. Addiction severity and coping motives need to be taken into account when providing interventional services for substance users. Findings imply the significance of additional psychological attention to methadone maintained patients to prevent craving and relapse.Keywords: anxiety sensitivity, coping motives, relapse, substance use craving
Procedia PDF Downloads 2962012 Hospital Beds: Figuring and Forecasting Patient Population Arriving at Health Care Research Institute, Illustrating Roemer's Law
Authors: Karthikeyan Srinivasan, Ranjana Singh, Yatin Talwar, Karthikeyan Srinivasan
Abstract:
Healthcare services play a vital role in the life of human being. The Setup of Hospital varies in wide spectrum of cost, technology, and access. Hospital’s of Public sector satisfies need of a common man to poorer, which can differ at private owned hospitals on cost and treatment. Patient assessing hospital frequently assumes spending time at the hospital is miserable and not aware of what is happening around them. Mostly they are queued up round the clock waiting to be admitted on hospital beds. The idea here is to highlight the role in admitting patient population of Outdoor as well as Emergency entering the Post Graduate Institute of Medical Education and Research, Chandigarh with available hospital beds. This study emphasizes the trend forecasting and acquiring beds needed. The conception “if patient population increases’ likewise increasing hospital beds advertently perceived. If tend to increase the hospital beds, thereby exploring budget, Manpower, space, and infrastructure make compulsion. This survey ideally draws out planning and forecasting beds to cater patient population in and around neighboring state of Chandigarh for admission at territory healthcare and research institute on available hospital beds. Executing healthcare services for growing population needs to know Roemer’s law indicating "in an insured population, a hospital bed built is a filled bed".Keywords: admissions, average length of stay, bed days, hospital beds, occupancy rates
Procedia PDF Downloads 2812011 The Historical Framework of International Crime in International Criminal Law
Authors: Tahraoui Boualem
Abstract:
Researching the historical framework of international crime means examining the historical facts that have contributed to uncovering this serious crime affecting international interests, and the law by which the study of the subject of international crime is determined is international criminal law, which is a branch of public international law. In this context, the historical study of international crime means recognizing the existence of an international community governed by international law, which makes us acknowledge that ancient societies lacked such stable and recurring international relations. Therefore, an attempt to monitor international crime in those ancient societies is only to demonstrate a historical fact that those societies have known some features of this crime, and have contributed in one way or another to the development of international criminal law without defining its concept or legal nature. The international community has affirmed the principle of establishing peace, achieving security, and respecting human rights. As a basis for friendly relations between the people of the international community and in case of prejudice, such as the aggressors breaching the obligations imposed on them, whether in time of peace or war.Keywords: historical framework, of international crime, peace or war., international law
Procedia PDF Downloads 1022010 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis
Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng
Abstract:
Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.Keywords: attribution trace, probabilistic relevance, network attack, attacker identification
Procedia PDF Downloads 3682009 Psychosocial Processes and Strategies behind Islamic Deradicalisation: A Scoping Review
Authors: Carvalho M. Catia, Pinto R. Isabel, Azevedo F. Luis, Guerreiro, T. Alexandre, Barbosa R. Mariana, Pinto S. Marta
Abstract:
Due to the loss of territory, foreign terrorist fighters who have joined Islamic State are returning to their home countries. In order to counter this threat to international security, it is important to implement deradicalisation programmes, through strategies and processes that can reverse radicalisation. The objectives of this scoping review - which is underway - are to provide a comprehensive overview of the programmes being implemented, its main characteristics, the main motives and processes leading to deradicalisation, and to identify the key findings and the existing gaps in the literature. The methodology to be implemented in this scoping review follows the guidelines proposed by Arksey and O’Malley and by The Joanna Briggs Institute. The main results will be the development of a synthesis map of the deradicalisation programmes existing in the world, its main features, and recommendations to policy-makers and professionals.Keywords: deradicalisation strategies, psychosocial processes, radicalisation, terrorism
Procedia PDF Downloads 3902008 Hybrid Obfuscation Technique for Reverse Engineering Problem
Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro
Abstract:
Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.Keywords: intellectual property, obfuscation, software security, reverse engineering
Procedia PDF Downloads 1492007 The Importance of Fire Safety in Egypt
Authors: Omar Shakra
Abstract:
This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients.Keywords: fire, system, protection, fire hydrants, security, alarms
Procedia PDF Downloads 1122006 The Morality of the Sensitive in Adorno: Suffering and Recognition in the Mimesis Model
Authors: Talita Cavaignac
Abstract:
Adorno's critique of totality, especially in a split society marked by reification, also rests on the impossibility of generalizing normative principles. Given the unfeasibility of normative universalizations, which conditions can justify the possibility of criticism and normativity in Adorno's thought? If reason itself is still entangled in alienation from the model of the domination of nature, how could be possible a critical theory? In political terms, if the notion of totality is challenged by the critique of identity, how can Adorno maintain the ideal of liberation and reconciliation between private interests and the possibility of some sort of ethics without giving up a materialist theory of society and without betting in a necessary link between redemption and history? Faced with this complex of questions, it is intended to reflect on the sense in which the notion of ‘suffering’ could throw help to the epistemological problem of the foundations of criticism in Adorno's work. The idea is that, in contrast to a universalizable model of justice, Adorno mobilizes in the notion of ‘suffering’ a gateway to the critical reflection of society. He would thus develop an approach to moral problems through the sensual-bodily perspective, fear, pain, and somatic factors. Nevertheless, due to the attention to the damaged experience and to the constitution of subjectivity -a sense in which the concept of mimesis continues to stand out- we understand suffering as an expression of an objective reification. Following the statement of other authors, the intention is to think how the resources linked to the idea of ‘suffering’ in Adorno's writings are engaged in the reflection of the problem of morality and of the contradictions between universal and particular (articulated in Hegel's tradition).Keywords: ethics, morality, sensitive, Theodor Adorno
Procedia PDF Downloads 1402005 Development of Management Model for Promoting Sustainable Tourism of Rajabhat Universities in Thailand
Authors: Weera Weerasophon
Abstract:
This research paper is to study the development of a management model for promoting sustainable tourism of Rajabhat universities in Thailand. Mixed Method Research is applied under the said topic. The researcher has developed a management model to promote sustainable tourism. The objectives of the research are 1) to study the readiness in management sustainable tourism of Rajabhat universities in Thailand 2) to develop a management model for promoting sustainable tourism of those universities. The process of this research is organized in two steps according to the objectives. The results of the research are as in the following: 1. Rajabhat universities have the readiness in management for promoting sustainable tourism. The universities can be developed to be sustainable tourist attraction under the admistrators who have vision and realize the importance of tourism, eager to promote sustainable tourism of the universities by specifying obvious policy plans and management. 2. The management model for promoting sustainable tourism of Rajabhat universities is consisted of the main following factors : 2.1 Master plan and policy, 2.2 Rajabhat universities organization management and personnel administration, 2.3 Assignment and authority, leadership, 2.4 Join network, 2.5 Assurance of quality and controlling, 2.6 Budget management, 2.7 Human Resources management, 2.8 Alliance and co-ordination, 2.9 Tool of marketing. There are also other communal factors for promoting sustainable tourism. They are: local communities, local communities, tourism activities, government and private sectors, communicative technology system, history, tourist attractive, art and culture, internal and external environment including local wisdom heritage. The management model for promoting sustainable tourism can be concluded from these main and communal factors mentioned above.Keywords: tourism, sustainable tourism, management, Rajabhat University
Procedia PDF Downloads 4152004 Technology Impact on the Challenge between Human Rights and Cyber Terrorism
Authors: Abanoub Zare Zakaria Herzalla
Abstract:
The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 522003 Overview of Wireless Body Area Networks
Authors: Rashi Jain
Abstract:
The Wireless Body Area Networks (WBANs) is an emerging interdisciplinary area where small sensors are placed on/within the human body. These sensors monitor the physiological activities and vital statistics of the body. The data from these sensors is aggregated and communicated to a remote doctor for immediate attention or to a database for records. On 6 Feb 2012, the IEEE 802.15.6 task group approved the standard for Body Area Network (BAN) technologies. The standard proposes the physical and MAC layer for the WBANs. The work provides an introduction to WBANs and overview of the physical and MAC layers of the standard. The physical layer specifications have been covered. A comparison of different protocols used at MAC layer is drawn. An introduction to the network layer and security aspects of the WBANs is made. The WBANs suffer certain limitations such as regulation of frequency bands, minimizing the effect of transmission and reception of electromagnetic signals on the human body, maintaining the energy efficiency among others. This has slowed down their implementation.Keywords: vehicular networks, sensors, MicroController 8085, LTE
Procedia PDF Downloads 261