Search results for: public order and security act
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 20585

Search results for: public order and security act

18035 Solid Waste Management through Mushroom Cultivation: An Eco Friendly Approach

Authors: Mary Josephine

Abstract:

Waste of certain process can be the input source of other sectors in order to reduce environmental pollution. Today there are more and more solid wastes are generated, but only very small amount of those are recycled. So, the threatening of environmental pressure to public health is very serious. The methods considered for the treatment of solid waste are biogas tanks or processing to make animal feed and fertilizer, however, they did not perform well. An alternative approach is growing mushrooms on waste residues. This is regarded as an environmental friendly solution with potential economic benefit. The substrate producers do their best to produce quality substrate at low cost. Apart from other methods, this can be achieved by employing biologically degradable wastes used as the resource material component of the substrate. Mushroom growing is a significant tool for the restoration, replenishment and remediation of Earth’s overburdened ecosphere. One of the rational methods of waste utilization involves locally available wastes. The present study aims to find out the yield of mushroom grown on locally available waste for free and to conserve our environment by recycling wastes.

Keywords: biodegradable, environment, mushroom, remediation

Procedia PDF Downloads 401
18034 Use and Appreciation of a Type of Mathematics Textbook for Secondary Education

Authors: Verónica Díaz Quezada

Abstract:

Despite the wide variety of educational resources on the market and the advances produced in the technological field, the practice of teaching continues to be supported mainly by textbooks. This article reports on descriptive research with qualitative methodology carried out on secondary school mathematics teachers in a region of Chile, in order to describe the use and the indicators of appreciation that teachers have on the textbooks distributed by the official body to public educational establishments. Data were collected through an open response opinion questionnaire. According to the results, among the texts available for the annual performance of their teaching work, the expository and technological books predominate, to the detriment of comprehensive books. The exhibition structure favors master expositions and repetitive exercises, while, with the technological structure, a productive exercise is attempted, proposing numerous applications with the intention of giving meaning to the different mathematical rules and procedures. In relation to the indicators of appreciation that teachers have regarding the use of mathematics textbooks, the suitability and quality of the teaching resources are verified as the most satisfying characteristic.

Keywords: mathematics, secondary school, teachers, textbooks

Procedia PDF Downloads 168
18033 Introducing Information and Communication Technologies in Prison: A Proposal in Favor of Social Reintegration

Authors: Carmen Rocio Fernandez Diaz

Abstract:

This paper focuses on the relevance of information and communication technologies (hereinafter referred as ‘ICTs’) as an essential part of the day-to-day life of all societies nowadays, as they offer the scenario where an immense number of behaviors are performed that previously took place in the physical world. In this context, areas of reality that have remained outside the so-called ‘information society’ are hardly imaginable. Nevertheless, it is possible to identify a means that continue to be behind this reality, and it is the penitentiary area regarding inmates rights, as security aspects in prison have already be improved by new technologies. Introducing ICTs in prisons is still a matter subject to great rejections. The study of comparative penitentiary systems worldwide shows that most of them use ICTs only regarding educational aspects of life in prison and that communications with the outside world are generally based on traditional ways. These are only two examples of the huge range of activities where ICTs can carry positive results within the prison. Those positive results have to do with the social reintegration of persons serving a prison sentence. Deprivation of liberty entails contact with the prison subculture and the harmful effects of it, causing in cases of long-term sentences the so-called phenomenon of ‘prisonization’. This negative effect of imprisonment could be reduced if ICTs were used inside prisons in the different areas where they can have an impact, and which are treated in this research, as (1) access to information and culture, (2) basic and advanced training, (3) employment, (4) communication with the outside world, (5) treatment or (6) leisure and entertainment. The content of all of these areas could be improved if ICTs were introduced in prison, as it is shown by the experience of some prisons of Belgium, United Kingdom or The United States. However, rejections to introducing ICTs in prisons obey to the fact that it could carry also risks concerning security and the commission of new offences. Considering these risks, the scope of this paper is to offer a real proposal to introduce ICTs in prison, trying to avoid those risks. This enterprise would be done to take advantage of the possibilities that ICTs offer to all inmates in order to start to build a life outside which is far from delinquency, but mainly to those inmates who are close to release. Reforming prisons in this sense is considered by the author of this paper an opportunity to offer inmates a progressive resettlement to live in freedom with a higher possibility to obey the law and to escape from recidivism. The value that new technologies would add to education, employment, communications or treatment to a person deprived of liberty constitutes a way of humanization of prisons in the 21st century.

Keywords: deprivation of freedom, information and communication technologies, imprisonment, social reintegration

Procedia PDF Downloads 169
18032 The Study on Corpse Floating Time in Shanghai Region of China

Authors: Hang Meng, Wen-Bin Liu, Bi Xiao, Kai-Jun Ma, Jian-Hui Xie, Geng Fei, Tian-Ye Zhang, Lu-Yi Xu, Dong-Chuan Zhang

Abstract:

The victims in water are often found in the coastal region, along river region or the region with lakes. In China, the examination for the bodies of victims in the water is conducted by forensic doctors working in the public security bureau. Because the enter water time for most of the victims are not clear, and often lack of monitor images and other information, so to find out the corpse enter water time for victims is very difficult. After the corpse of the victim enters the water, it sinks first, then corruption gas produces, which can make the density of the corpse to be less than water, and thus rise again. So the factor that determines the corpse floating time is temperature. On the basis of the temperature data obtained in Shanghai region of China (Shanghai is a north subtropical marine monsoon climate, with an average annual temperature of about 17.1℃. The hottest month is July, the average monthly temperature is 28.6℃, and the coldest month is January, the average monthly temperature is 4.8℃). This study selected about 100 cases with definite corpse enter water time and corpse floating time, analyzed the cases and obtained the empirical law of the corpse floating time. For example, in the Shanghai region, on June 15th and October 15th, the corpse floating time is about 1.5 days. In early December, the bodies who entered the water will go up around January 1st of the following year, and the bodies who enter water in late December will float in March of next year. The results of this study can be used to roughly estimate the water enter time of the victims in Shanghai. Forensic doctors around the world can also draw on the results of this study to infer the time when the corpses of the victims in the water go up.

Keywords: corpse enter water time, corpse floating time, drowning, forensic pathology, victims in the water

Procedia PDF Downloads 198
18031 Design Optimization of a Compact Quadrupole Electromagnet for CLS 2.0

Authors: Md. Armin Islam, Les Dallin, Mark Boland, W. J. Zhang

Abstract:

This paper reports a study on the optimal magnetic design of a compact quadrupole electromagnet for the Canadian Light Source (CLS 2.0). The nature of the design is to determine a quadrupole with low relative higher order harmonics and better field quality. The design problem was formulated as an optimization model, in which the objective function is the higher order harmonics (multipole errors) and the variable to be optimized is the material distribution on the pole. The higher order harmonics arose in the quadrupole due to truncating the ideal hyperbola at a certain point to make the pole. In this project, the arisen harmonics have been optimized both transversely and longitudinally by adjusting material on the poles in a controlled way. For optimization, finite element analysis (FEA) has been conducted. A better higher order harmonics amplitudes and field quality have been achieved through the optimization. On the basis of the optimized magnetic design, electrical and cooling calculation has been performed for the magnet.

Keywords: drift, electrical, and cooling calculation, integrated field, magnetic field gradient, multipole errors, quadrupole

Procedia PDF Downloads 147
18030 Land Management Framework: A Case of Kolkata

Authors: Alokananda Nath

Abstract:

Land is an important issue anywhere in the world as it is one of the fundamental elements in human settlements. Since the urban areas are considered to be the drivers of economy for any country across the world and the phenomenon of ‘urbanization’ happening everywhere, there is always a greater pressure on urban land and its management. Many states in India have realized the importance of land as a valuable resource and have implemented certain framework for managing and developing land. But in West Bengal no such statutory framework has been formulated till now and a very out dated model of land acquisition for public purpose is practiced. Due to the lop-sided character of urban growth in the entire eastern region of India, the city of Kolkata continues to bear the burden of excessive growth of population and consequent urbanization of the adjoining areas at a rapid pace. This research tries to look into these conflicts with respect to the present pattern of development in the context of Kolkata and suggest a system for land management in order to implement the planning processes. For this purpose, five case study areas were taken up within the Kolkata Metropolitan Area and subsequent analysis of their present land management and development techniques was done. The findings reveal that there is a lack of political will as well as administrative inefficiency on part of both the development authority and the local bodies. Mostly the local bodies lack the financial resources and technical expertise to work out any kind of land management framework or work out any kind of model in order to manage the development that is happening. All these place undue strain on city infrastructure systems and reduce the potential of cities to contribute as engines of economic growth. The focus of reforms, therefore, ought to be on streamlining the urban planning process, judicious and optimal land use, efficient plan implementation mechanisms, improvement of titling and registration processes.

Keywords: urbanization, land management framework, land development, policy reforms, land-use planning processes

Procedia PDF Downloads 284
18029 In-Situ Determination of Radioactivity Levels and Radiological Hazards in and around the Gold Mine Tailings of the West Rand Area, South Africa

Authors: Paballo M. Moshupya, Tamiru A. Abiye, Ian Korir

Abstract:

Mining and processing of naturally occurring radioactive materials could result in elevated levels of natural radionuclides in the environment. The aim of this study was to evaluate the radioactivity levels on a large scale in the West Rand District in South Africa, which is dominated by abandoned gold mine tailings and the consequential radiological exposures to members of the public. The activity concentrations of ²³⁸U, ²³²Th and 40K in mine tailings, soil and rocks were assessed using the BGO Super-Spec (RS-230) gamma spectrometer. The measured activity concentrations for ²³⁸U, ²³²Th and 40K in the studied mine tailings were found to range from 209.95 to 2578.68 Bq/kg, 19.49 to 108.00 Bq/kg and 31.30 to 626.00 Bq/kg, respectively. In surface soils, the overall average activity concentrations were found to be 59.15 Bq/kg, 34.91 and 245.64 Bq/kg for 238U, ²³²Th and 40K, respectively. For the rock samples analyzed, the mean activity concentrations were 32.97 Bq/kg, 32.26 Bq/kg and 351.52 Bg/kg for ²³⁸U, ²³²Th and 40K, respectively. High radioactivity levels were found in mine tailings, with ²³⁸U contributing significantly to the overall activity concentration. The external gamma radiation received from surface soil in the area is generally low, with an average of 0.07 mSv/y. The highest annual effective doses were estimated from the tailings dams and the levels varied between 0.14 mSv/y and 1.09 mSv/y, with an average of 0.51 mSv/y. In certain locations, the recommended dose constraint of 0.25 mSv/y from a single source to the average member of the public within the exposed population was exceeded, indicating the need for further monitoring and regulatory control measures specific to these areas to ensure the protection of resident members of the public.

Keywords: activity concentration, gold mine tailings, in-situ gamma spectrometry, radiological exposures

Procedia PDF Downloads 132
18028 RGB-D SLAM Algorithm Based on pixel level Dense Depth Map

Authors: Hao Zhang, Hongyang Yu

Abstract:

Scale uncertainty is a well-known challenging problem in visual SLAM. Because RGB-D sensor provides depth information, RGB-D SLAM improves this scale uncertainty problem. However, due to the limitation of physical hardware, the depth map output by RGB-D sensor usually contains a large area of missing depth values. These missing depth information affect the accuracy and robustness of RGB-D SLAM. In order to reduce these effects, this paper completes the missing area of the depth map output by RGB-D sensor and then fuses the completed dense depth map into ORB SLAM2. By adding the process of obtaining pixel-level dense depth maps, a better RGB-D visual SLAM algorithm is finally obtained. In the process of obtaining dense depth maps, a deep learning model of indoor scenes is adopted. Experiments are conducted on public datasets and real-world environments of indoor scenes. Experimental results show that the proposed SLAM algorithm has better robustness than ORB SLAM2.

Keywords: RGB-D, SLAM, dense depth, depth map

Procedia PDF Downloads 143
18027 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 224
18026 Integrated Mass Rapid Transit (MRT) and Bus System in Singapore: MRT Ridership and the Provision of Feeder Bus Services

Authors: Devansh Jain, Shu Ting Goh

Abstract:

With the aim of improving the quality of life of people of Singapore with provision of better transport services, Land and Transport Authority Singapore recently published its Master Plan 2013. The major objectives mentioned in the plan were to make a comprehensive public transport network with better quality Mass Rapid Transit, bus services along with cycling and walking. MRT is the backbone of the transport system in Singapore, and to promote and increase the MRT ridership, good accessibility to access the MRT stations is a necessity. The aim of this paper is to investigate the relationship between MRT ridership and the provision of feeder bus services in Singapore planning areas and also to understand the hub and spoke model adopted by Singapore for provision of transport services. The findings of the study will lead to conclusions made from the Regression model developed by the various factors affecting MRT ridership, and hence will benefit to enhance the services provided by the system.

Keywords: quality of life, public transport, mass rapid transit, ridership

Procedia PDF Downloads 254
18025 Empirical Evidence to Beliefs and Perceptions About Mental Health Disorder and Substance Abuse: The Role of a Social Worker

Authors: Helena Baffoe

Abstract:

Context: In the United States, there have been significant advancements in programs aimed at improving the lives of individuals with mental health disorders and substance abuse problems. However, public attitudes and beliefs regarding these issues have not improved correspondingly. This study aims to explore the perceptions and beliefs surrounding mental health disorders and substance abuse in the context of data analytics in the field of social work. Research Aim: The aim of this research is to provide empirical evidence on the beliefs and perceptions regarding mental health disorders and substance abuse. Specifically, the study seeks to answer the question of whether being diagnosed with a mental disorder implies a diagnosis of substance abuse. Additionally, the research aims to analyze the specific roles that social workers can play in addressing individuals with mental disorders. Methodology: This research adopts a data-driven methodology, acquiring comprehensive data from the Substance Abuse and Mental Health Services Administration (SAMHSA). A noteworthy causal connection between mental disorders and substance abuse exists, a relationship that current literature tends to overlook critically. To address this gap, we applied logistic regression with an Instrumental Variable approach, effectively mitigating potential endogeneity issues in the analysis in order to ensure robust and unbiased results. This methodology allows for a rigorous examination of the relationship between mental disorders and substance abuse. Empirical Findings: The analysis of the data reveals that depressive, anxiety, and trauma/stressor mental disorders are the most common in the United States. However, the study does not find statistically significant evidence to support the notion that being diagnosed with these mental disorders necessarily implies a diagnosis of substance abuse. This suggests that there is a misconception among the public regarding the relationship between mental health disorders and substance abuse. Theoretical Importance: The research contributes to the existing body of literature by providing empirical evidence to challenge prevailing beliefs and perceptions regarding mental health disorders and substance abuse. By using a novel methodological approach and analyzing new US data, the study sheds light on the cultural and social factors that influence these attitudes.

Keywords: mental health disorder, substance abuse, empirical evidence, logistic regression with IV

Procedia PDF Downloads 68
18024 AI as a Tool Hindering Digital Education

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.

Keywords: AI, digital education, education tools, motivation and engagement

Procedia PDF Downloads 34
18023 Irrigation Challenges, Climate Change Adaptation and Sustainable Water Usage in Developing Countries. A Case Study, Nigeria

Authors: Faith Eweluegim Enahoro-Ofagbe

Abstract:

Worldwide, every nation is experiencing the effects of global warming. In developing countries, due to the heavy reliance on agriculture for socioeconomic growth and security, among other things, these countries are more affected by climate change, particularly with the availability of water. Floods, droughts, rising temperatures, saltwater intrusion, groundwater depletion, and other severe environmental alterations are all brought on by climatic change. Life depends on water, a vital resource; these ecological changes affect all water use, including agriculture and household water use. Therefore adequate and adaptive water usage strategies for sustainability are essential in developing countries. Therefore, this paper investigates Nigeria's challenges due to climate change and adaptive techniques that have evolved in response to such issues to ensure water management and sustainability for irrigation and provide quality water to residents. Questionnaires were distributed to respondents in the study area, central Nigeria, for quantitative evaluation of sustainable water resource management techniques. Physicochemical analysis was done, collecting soil and water samples from several locations under investigation. Findings show that farmers use different methods, ranging from intelligent technologies to traditional strategies for water resource management. Also, farmers need to learn better water resource management techniques for sustainability. Since more residents obtain their water from privately held sources, the government should enforce legislation to ensure that private borehole construction businesses treat water sources of poor quality before the general public uses them.

Keywords: developing countries, irrigation, strategies, sustainability, water resource management, water usage

Procedia PDF Downloads 117
18022 Reconceptualizing Evidence and Evidence Types for Digital Journalism Studies

Authors: Hai L. Tran

Abstract:

In the digital age, evidence-based reporting is touted as a best practice for seeking the truth and keeping the public well-informed. Journalists are expected to rely on evidence to demonstrate the validity of a factual statement and lend credence to an individual account. Evidence can be obtained from various sources, and due to a rich supply of evidence types available, the definition of this important concept varies semantically. To promote clarity and understanding, it is necessary to break down the various types of evidence and categorize them in a more coherent, systematic way. There is a wide array of devices that digital journalists deploy as proof to back up or refute a truth claim. Evidence can take various formats, including verbal and visual materials. Verbal evidence encompasses quotes, soundbites, talking heads, testimonies, voice recordings, anecdotes, and statistics communicated through written or spoken language. There are instances where evidence is simply non-verbal, such as when natural sounds are provided without any verbalized words. On the other hand, other language-free items exhibited in photos, video footage, data visualizations, infographics, and illustrations can serve as visual evidence. Moreover, there are different sources from which evidence can be cited. Supporting materials, such as public or leaked records and documents, data, research studies, surveys, polls, or reports compiled by governments, organizations, and other entities, are frequently included as informational evidence. Proof can also come from human sources via interviews, recorded conversations, public and private gatherings, or press conferences. Expert opinions, eye-witness insights, insider observations, and official statements are some of the common examples of testimonial evidence. Digital journalism studies tend to make broad references when comparing qualitative versus quantitative forms of evidence. Meanwhile, limited efforts are being undertaken to distinguish between sister terms, such as “data,” “statistical,” and “base-rate” on one side of the spectrum and “narrative,” “anecdotal,” and “exemplar” on the other. The present study seeks to develop the evidence taxonomy, which classifies evidence through the quantitative-qualitative juxtaposition and in a hierarchical order from broad to specific. According to this scheme, data, statistics, and base rate belong to the quantitative evidence group, whereas narrative, anecdote, and exemplar fall into the qualitative evidence group. Subsequently, the taxonomical classification arranges data versus narrative at the top of the hierarchy of types of evidence, followed by statistics versus anecdote and base rate versus exemplar. This research reiterates the central role of evidence in how journalists describe and explain social phenomena and issues. By defining the various types of evidence and delineating their logical connections it helps remove a significant degree of conceptual inconsistency, ambiguity, and confusion in digital journalism studies.

Keywords: evidence, evidence forms, evidence types, taxonomy

Procedia PDF Downloads 71
18021 The Determination of Self-Esteem, Life Satisfaction, Anxiety and Depression Levels among Patients with Stoma

Authors: Tugba Cinarli, Tugba Kavalali Erdogan, Sevil Masat, Dilek Kiymaz, Nida Kiyici, Zeliha Koc

Abstract:

This study was conducted in a descriptive and cross-sectional manner, in order to determine the self-esteem, life satisfaction and depression/anxiety levels of the patients with stoma. The study was conducted between June 15, 2016 and June 15, 2017 among 196 oncology patients that were hospitalized in the general surgery clinic of a public hospital in Turkey. The case group consisted of 98 cancer patients with stoma and the control group consisted of 98 cancer patients without stoma. The data were collected through the Coopersmith Self-Esteem Scale, Life Satisfaction Scale, the Hospital Anxiety and Depression Scale, and a 21-question survey that aimed to determine the sociodemographic and clinical properties of the patients. The data were analyzed with percentage analysis, Mann Whitney U-test, Chi-square test and Spearmen’s correlation test. It was determined that for the case group; 44.9% had colon cancer, 29.6% had rectal cancer; 50% underwent temporary colostomia, 15.3% underwent permanent colostomia, 34.7% underwent temporary ileostomy. The experimental group's findings for the Coopersmith Self-Esteem Scale, Life Satisfaction Scale, the Anxiety Subscale and the Depression subscale were 64 (20 - 84), 17 (5 - 38), 10 (1 - 18), and 9 (1 - 19), respectively. The control group's findings for the Coopersmith Self-Esteem Scale, Life Satisfaction Scale, the Anxiety Subscale and the Depression Subscale were 68 (32 - 92), 21 (7 - 31), 8.5 (1 - 18), and 8 (1 - 18), respectively. It was found that the Coopersmith Self-Esteem Scale, Life Satisfaction Scale, and the Anxiety Subscale findings were significantly different for the experimental and control groups (p<0.05). It was determined that the self-esteem levels were positively correlated with life satisfaction and negatively correlated with anxiety and depression; also, the life satisfaction levels were negatively correlated with anxiety and depression. It is suggested that the nursing interventions should be planned in order to improve life-satisfaction and self-esteem levels of the patients, and to decrease depression and anxiety.

Keywords: anxiety, cancer, life satisfaction, self-esteem

Procedia PDF Downloads 176
18020 Time Compression in Engineer-to-Order Industry: A Case Study of a Norwegian Shipbuilding Industry

Authors: Tarek Fatouh, Chehab Elbelehy, Alaa Abdelsalam, Eman Elakkad, Alaa Abdelshafie

Abstract:

This paper aims to explore the possibility of time compression in Engineer to Order production networks. A case study research method is used in a Norwegian shipbuilding project by implementing a value stream mapping lean tool with total cycle time as a unit of analysis. The analysis resulted in demonstrating the time deviations for the planned tasks in one of the processes in the shipbuilding project. So, authors developed a future state map by removing time wastes from value stream process.

Keywords: engineer to order, total cycle time, value stream mapping, shipbuilding

Procedia PDF Downloads 168
18019 Rupture in the Paradigm of the International Policy of Illicit Drugs in the Field of Public Health and within the Framework of the World Health Organization, 2001 to 2016

Authors: Emy Nayana Pinto, Denise Bomtempo Birche De Carvalho

Abstract:

In the present study, the harmful use of illicit drugs is seen as a public health problem and as one of the expressions of the social question, since its consequences fall mainly on the poorer classes of the population. This perspective is a counterpoint to the dominant paradigm on illicit drug policy at the global level, whose centrality lies within the criminal justice arena. The 'drug problem' is internationally combated through fragmented approaches that focus its actions on banning and criminalizing users. In this sense, the research seeks to answer the following key questions: What are the influences of the prohibitionism in the recommendations of the United Nations (UN), the World Health Organization (WHO), and the formulation of drug policies in member countries? What are the actors that have been provoking the prospect of breaking with the prohibitionist paradigm? What is the WHO contribution to the rupture with the prohibitionist paradigm and the displacement of the drug problem in the field of public health? The general objective of this work is to seek evidence from the perspective of rupture with the prohibitionist paradigm in the field of drugs policies at the global and regional level, through analysis of documents of the World Health Organization (WHO), between the years of 2001 to 2016. The research was carried out in bibliographical and documentary sources. The bibliographic sources contributed to the approach with the object and the theoretical basis of the research. The documentary sources served to answer the research questions and evidence the existence of the perspective of change in drug policy. Twenty-two documents of the UN system were consulted, of which fifteen had the contribution of the World Health Organization (WHO). In addition to the documents that directly relate to the subject of the research, documents from various agencies, programs, and offices, such as the Joint United Nations Program on HIV/AIDS (UNAIDS) and the United Nations Office on Drugs and Crime (UNODC), which also has drugs as the central or transversal theme of its performance. The results showed that from the 2000s it was possible to find in the literature review and in the documentary analysis evidence of the critique of the prohibitionist paradigm parallel to the construction of a new perspective for drug policy at the global level and the displacement of criminal justice approaches for the scope of public health, with the adoption of alternative and pragmatic interventions based on human rights, scientific evidence and the reduction of social damages and health by the misuse of illicit drugs.

Keywords: illicit drugs, international organizations, prohibitionism, public health, World Health Organization

Procedia PDF Downloads 158
18018 Content Based Video Retrieval System Using Principal Object Analysis

Authors: Van Thinh Bui, Anh Tuan Tran, Quoc Viet Ngo, The Bao Pham

Abstract:

Video retrieval is a searching problem on videos or clips based on content in which they are relatively close to an input image or video. The application of this retrieval consists of selecting video in a folder or recognizing a human in security camera. However, some recent approaches have been in challenging problem due to the diversity of video types, frame transitions and camera positions. Besides, that an appropriate measures is selected for the problem is a question. In order to overcome all obstacles, we propose a content-based video retrieval system in some main steps resulting in a good performance. From a main video, we process extracting keyframes and principal objects using Segmentation of Aggregating Superpixels (SAS) algorithm. After that, Speeded Up Robust Features (SURF) are selected from those principal objects. Then, the model “Bag-of-words” in accompanied by SVM classification are applied to obtain the retrieval result. Our system is performed on over 300 videos in diversity from music, history, movie, sports, and natural scene to TV program show. The performance is evaluated in promising comparison to the other approaches.

Keywords: video retrieval, principal objects, keyframe, segmentation of aggregating superpixels, speeded up robust features, bag-of-words, SVM

Procedia PDF Downloads 304
18017 A Shift in Approach from Cereal Based Diet to Dietary Diversity in India: A Case Study of Aligarh District

Authors: Abha Gupta, Deepak K. Mishra

Abstract:

Food security issue in India has surrounded over availability and accessibility of cereal which is regarded as the only food group to check hunger and improve nutrition. Significance of fruits, vegetables, meat and other food products have totally been neglected given the fact that they provide essential nutrients to the body. There is a need to shift the emphasis from cereal-based approach to a more diverse diet so that aim of achieving food security may change from just reducing hunger to an overall health. This paper attempts to analyse how far dietary diversity level has been achieved across different socio-economic groups in India. For this purpose, present paper sets objectives to determine (a) percentage share of different food groups to total food expenditure and consumption by background characteristics (b) source of and preference for all food items and, (c) diversity of diet across socio-economic groups. A cross sectional survey covering 304 households selected through proportional stratified random sampling was conducted in six villages of Aligarh district of Uttar Pradesh, India. Information on amount of food consumed, source of consumption and expenditure on food (74 food items grouped into 10 major food groups) was collected with a recall period of seven days. Per capita per day food consumption/expenditure was calculated through dividing consumption/expenditure by household size and number seven. Food variety score was estimated by giving 0 values to those food groups/items which had not been eaten and 1 to those which had been taken by households in last seven days. Addition of all food group/item score gave result of food variety score. Diversity of diet was computed using Herfindahl-Hirschman index. Findings of the paper show that cereal, milk, roots and tuber food groups contribute a major share in total consumption/expenditure. Consumption of these food groups vary across socio-economic groups whereas fruit, vegetables, meat and other food consumption remain low and same. Estimation of dietary diversity show higher concentration of diet due to higher consumption of cereals, milk, root and tuber products and dietary diversity slightly varies across background groups. Muslims, Scheduled caste, small farmers, lower income class, food insecure, below poverty line and labour families show higher concentration of diet as compared to their counterpart groups. These groups also evince lower mean intake of number of food item in a week due to poor economic constraints and resultant lower accessibility to number of expensive food items. Results advocate to make a shift from cereal based diet to dietary diversity which not only includes cereal and milk products but also nutrition rich food items such as fruits, vegetables, meat and other products. Integrating a dietary diversity approach in food security programmes of the country would help to achieve nutrition security as hidden hunger is widespread among the Indian population.

Keywords: dietary diversity, food Security, India, socio-economic groups

Procedia PDF Downloads 341
18016 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters

Authors: Vikram Chowdhary, Marek Vins

Abstract:

The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.

Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID

Procedia PDF Downloads 115
18015 Pull-In Instability Determination of Microcapacitive Sensor for Measuring Special Range of Pressure

Authors: Yashar Haghighatfar, Shahrzad Mirhosseini

Abstract:

Pull-in instability is a nonlinear and crucial effect that is important for the design of microelectromechanical system devices. In this paper, the appropriate electrostatic voltage range is determined by measuring fluid flow pressure via micro pressure sensor based microbeam. The microbeam deflection contains two parts, the static and perturbation deflection of static. The second order equation regarding the equivalent stiffness, mass and damping matrices based on Galerkin method is introduced to predict pull-in instability due to the external voltage. Also the reduced order method is used for solving the second order nonlinear equation of motion. Furthermore, in the present study, the micro capacitive pressure sensor is designed for measuring special fluid flow pressure range. The results show that the measurable pressure range can be optimized, regarding damping field and external voltage.

Keywords: MEMS, pull-in instability, electrostatically actuated microbeam, reduced order method

Procedia PDF Downloads 230
18014 Different Approaches to the Study of Territorial Dispute between China and India

Authors: Albina Muratbekova

Abstract:

One of the main tensions and challenges in the development of Sino-Indian relation is the demarcation of its frontiers. The fact that throughout the history borders had never been demarcated on ground occur a dispute between China and India after receiving sovereignty. Boundaries of India and China are divided into three sectors: Eastern, Middle and Western. The middle sector runs from India’s Uttar Pradesh to the Punjab, 545 km length of the Line of Actual Control, the lines of which was confirmed at the 9th meeting of the Expert Group held in 2001, in New Delhi. Other two sectors are still not determined and cause disputes. A western sector of the frontier is the Aksai Chin plateau, covers areas of Ladakh, Tibet, and Sinkiang. Another disputed area lies in the Eastern sector in the Himalayan region, which after 1986 became the Indian state called Arunachal Pradesh. There are two different approaches in the ways of resolving the border dispute. Chinese side keeps an opinion that the border dispute must be resolved in a timely matter unless it is favorable for China, the resolution can be left to a later generation. While India’s government due to security reasons is eager to demarcate the border. In order to study this conflict was used as a descriptive-comparative-analytical method. Also, it was done a profound analyze of conflict nature.

Keywords: border dispute, China, India, territorial claim

Procedia PDF Downloads 311
18013 Towards A Framework for Using Open Data for Accountability: A Case Study of A Program to Reduce Corruption

Authors: Darusalam, Jorish Hulstijn, Marijn Janssen

Abstract:

Media has revealed a variety of corruption cases in the regional and local governments all over the world. Many governments pursued many anti-corruption reforms and have created a system of checks and balances. Three types of corruption are faced by citizens; administrative corruption, collusion and extortion. Accountability is one of the benchmarks for building transparent government. The public sector is required to report the results of the programs that have been implemented so that the citizen can judge whether the institution has been working such as economical, efficient and effective. Open Data is offering solutions for the implementation of good governance in organizations who want to be more transparent. In addition, Open Data can create transparency and accountability to the community. The objective of this paper is to build a framework of open data for accountability to combating corruption. This paper will investigate the relationship between open data, and accountability as part of anti-corruption initiatives. This research will investigate the impact of open data implementation on public organization.

Keywords: open data, accountability, anti-corruption, framework

Procedia PDF Downloads 339
18012 Challenges of Climate Change on Agricultural Productivity in Sub-Saharan Africa

Authors: Mohammed Sale Abubakar, Kabir Omar, Mohammed Umar Abba

Abstract:

The effects of climate change continue to ravage globe upsetting or even overturning the entire communities in its wake. It is therefore on the front burner of most global issues affecting the world today. Hardly any field of endeavor has escaped the manifestation of its effects. The effects of climate change on agricultural productivity calls for intense study because of the nexus between agriculture, global food security and provision of employment for the teaming population in sub-saharan Africa. This paper examines current challenges of climate change on agricultural productivity in this region. This challenge indicated that both long and short-term change in climate bring unpleasant repercussion on agricultural productivity as they manifest in the vulnerability of industrial work force. The paper also focused on the impact of agriculture and bio-environmental engineering as a separate entity that will help to fight these major challenges facing humanity currently associated with negative effects of climate change such as scarcity of water, declining agricultural yields, desert encroachment, and damage of coastal structures. Finally, a suggestion was put forward as an effort that should be directed towards mitigating the negative effects of climate change on our environment.

Keywords: climate change mitigation, desert encroachment, environment, global food security, greenhouse gases (GHGs)

Procedia PDF Downloads 360
18011 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 70
18010 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads

Authors: Gaurav Kumar Sinha

Abstract:

In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.

Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies

Procedia PDF Downloads 71
18009 Effects of Exhaust Gas Emitted by the Fleet on Public Health in the Region of Annaba (Algeria): Ecotoxicological Test on Durum Wheat (Triticum durum Desf.)

Authors: Aouissi Nora, Meksem Leila

Abstract:

This work focused on the study of air pollution generated by the transport sector in the region of Annaba. Our study is based on two parts: the first one concerns an epidemiological investigation in the area of Annaba situated in the east Algerian coast, which deals with the development of the fleet and its impact on public health. To get a more precise idea of the impact of road traffic on public health, we consulted the computing center office of the National Social Insurance Fund. The information we were given by this office refers to the number of reported asthma and heart disease after medical examination during the period 2006-2010. The second part was devoted to the study of the toxicity of exhaust gases on some physical and biochemical parameters of durum wheat (Triticum durum Desf.). After germination and three-leaf stage, the pots are placed in a box of volume (0,096 m3) having an input which is linked directly to the exhaust pipe of a truck, and an outlet to prevent asphyxiation plant. The experience deals with 30 pots: 10 pots are exposed for 5 minutes to exhaust smoke; the other 10 are exposed for 15 minutes, and the remaining 10 for 30 minutes. The epidemiological study shows that the levels of pollutants emitted by the fleet are responsible for the increase of people respiratory and cardiovascular diseases. As for biochemical analyses of vegetation, they clearly show the toxicity of pollutants emitted by the exhaust gases, with an increase in total protein, proline and stimulation of detoxification enzyme (catalase).

Keywords: air pollution, toxicity, epidemiology, biochemistry

Procedia PDF Downloads 336
18008 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 145
18007 Effects of Family Order and Informal Social Control on Protecting against Child Maltreatment: A Comparative Study of Seoul and Kathmandu

Authors: Thapa Sirjana, Clifton R. Emery

Abstract:

This paper examines the family order and Informal Social Control (ISC) by the extended families as a protective factor against Child Maltreatment. The findings are discussed using the main effects and the interaction effects of family order and informal social control by the extended families. The findings suggest that IPV mothers are associated with child abuse and child neglect. The children are neglected in the home more and physical abuse occurs in the case, if mothers are abused by their husbands. The mother’s difficulties of being abused may lead them to neglect their children. The findings suggest that ‘family order’ is a significant protective factor against child maltreatment. The results suggest that if the family order is neither too high nor too low than that can play a role as a protective factor. Soft type of ISC is significantly associated with child maltreatment. This study suggests that the soft type of ISC by the extended families is a helpful approach to develop child protection in both the countries. This study is analyzed the data collected from Seoul and Kathmandu families and neighborhood study (SKFNS). Random probability cluster sample of married or partnered women in 20 Kathmandu wards and in Seoul 34 dongs were selected using probability proportional to size (PPS) sampling. Overall, the study is to make a comparative study of Korea and Nepal and examine how the cultural differences and similarities associate with the child maltreatment.

Keywords: child maltreatment, intimate partner violence, informal social control and family order Seoul, Kathmandu

Procedia PDF Downloads 250
18006 Fixed Point Iteration of a Damped and Unforced Duffing's Equation

Authors: Paschal A. Ochang, Emmanuel C. Oji

Abstract:

The Duffing’s Equation is a second order system that is very important because they are fundamental to the behaviour of higher order systems and they have applications in almost all fields of science and engineering. In the biological area, it is useful in plant stem dependence and natural frequency and model of the Brain Crash Analysis (BCA). In Engineering, it is useful in the study of Damping indoor construction and Traffic lights and to the meteorologist it is used in the prediction of weather conditions. However, most Problems in real life that occur are non-linear in nature and may not have analytical solutions except approximations or simulations, so trying to find an exact explicit solution may in general be complicated and sometimes impossible. Therefore we aim to find out if it is possible to obtain one analytical fixed point to the non-linear ordinary equation using fixed point analytical method. We started by exposing the scope of the Duffing’s equation and other related works on it. With a major focus on the fixed point and fixed point iterative scheme, we tried different iterative schemes on the Duffing’s Equation. We were able to identify that one can only see the fixed points to a Damped Duffing’s Equation and not to the Undamped Duffing’s Equation. This is because the cubic nonlinearity term is the determining factor to the Duffing’s Equation. We finally came to the results where we identified the stability of an equation that is damped, forced and second order in nature. Generally, in this research, we approximate the solution of Duffing’s Equation by converting it to a system of First and Second Order Ordinary Differential Equation and using Fixed Point Iterative approach. This approach shows that for different versions of Duffing’s Equations (damped), we find fixed points, therefore the order of computations and running time of applied software in all fields using the Duffing’s equation will be reduced.

Keywords: damping, Duffing's equation, fixed point analysis, second order differential, stability analysis

Procedia PDF Downloads 298