Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4289

Search results for: security safe

1529 The Use of Space Syntax in Urban Transportation Planning and Evaluation: Limits and Potentials

Authors: Chuan Yang, Jing Bie, Yueh-Lung Lin, Zhong Wang

Abstract:

Transportation planning is an academic integration discipline combining research and practice with the aim of mobility and accessibility improvements at both strategic-level policy-making and operational dimensions of practical planning. Transportation planning could build the linkage between traffic and social development goals, for instance, economic benefits and environmental sustainability. The transportation planning analysis and evaluation tend to apply empirical quantitative approaches with the guidance of the fundamental principles, such as efficiency, equity, safety, and sustainability. Space syntax theory has been applied in the spatial distribution of pedestrian movement or vehicle flow analysis, however rare has been written about its application in transportation planning. The correlated relationship between the variables of space syntax analysis and authentic observations have declared that the urban configurations have a significant effect on urban dynamics, for instance, land value, building density, traffic, crime. This research aims to explore the potentials of applying Space Syntax methodology to evaluate urban transportation planning through studying the effects of urban configuration on cities transportation performance. By literature review, this paper aims to discuss the effects that urban configuration with different degrees of integration and accessibility have on three elementary components of transportation planning - transportation efficiency, transportation safety, and economic agglomeration development - via intensifying and stabilising the nature movements generated by the street network. And then the potential and limits of Space Syntax theory to study the performance of urban transportation and transportation planning would be discussed in the paper. In practical terms, this research will help future research explore the effects of urban design on transportation performance, and identify which patterns of urban street networks would allow for most efficient and safe transportation performance with higher economic benefits.

Keywords: transportation planning, space syntax, economic agglomeration, transportation efficiency, transportation safety

Procedia PDF Downloads 180
1528 Afghan Women’s Perceptions on Domestic Violence and Child Protection in Finland

Authors: Laleh Golamrej Eliasi

Abstract:

Finland is the second most violent country for women in the European Union (EU). 47% of women in Finland claimed to have experienced domestic violence against women (DVAW), compared to an average of 33% in the EU. Although the statistics in Finland are transparent, to the author’s best knowledge, there are no statisticsonDV by nationality in Finland. On the other hand, being a Muslim woman in a non-Muslim-majority country represents a position of double vulnerability to violence. There are 10404 Afghan refugees in Finland who are Muslim. Barriers such as unfamiliarity with support services, fear of the police, racism, language, economic and practical dependence, social isolation, and family commitments all lead to a lack of reporting of DVAW among migrants. Although witnessing and experiencing DV have devastating effects on women’s and children’s health and well-being, there is a lack of studies about DVAW among Afghan families in Finland. To fill this knowledge gap, Afghan women living in Finland are selected as the target group to assess their views on DVAW and child protection. This study is implemented in the socio-ecological approach framework to assess the impacts of individual characteristics, interpersonal relationships, community, and society components on DVAW in Afghan families. Interviews with Afghan women and content analysis are used to find out participants' views on DVAW, its risk factors, and approaches and methods to improve protection for women and children. Main purpose is to obtain information about participants' views on the subject. The findings can be used to improve culturally safe social work knowledge and practices with a bottom-up approach to reduce DV and increase child protection. Therefore, this research can have important effects on the sustainable development of services and supports the welfare and inclusion of immigrant families. The expected results will contribute to sustainable gender equality, which is in line with the fifth goal of the Sustainable Development Goals.

Keywords: domestic violence, immigrant women, immigrant child protection, social work

Procedia PDF Downloads 74
1527 Analysis of Access Pattern to School and Travel Risks among School Children in Benin City, Edo State, Nigeria

Authors: Barry Aifesehi Aiworo, Henry Oriakhi

Abstract:

This paper, examines the analysis of access pattern to school and travel risks among school children in Benin City, Edo State, Nigeria. The risk includes accident, molestation (sexually) and kidnapping. The objective of this paper are to examine the various means (modes) of transport to school; determine the type and incidences of risk experienced by school children in the study area; examine the risk incidences and ages of school children in the study area. Hypothesis which states that the types of risks encountered by school children are independent of means of transport was tested using the chi-square test (X2). A sampling ratio of twelve percent (12%) was taken from 396 schools in Benin City. By implication, 49 schools were randomly selected in Benin City for this research. A total of 42,053 students in the 49 schools constitute the sample frame for the research. Two percent (2%), 841 students were taken as the sample size. The use of stratified sampling method was applied by stratifying the study area (Benin City) into local governments- Egor, Ikpoba-Okha and Oredo. Thereafter, the lists of schools in the various local governments were obtained from the Ministry of Education before the schools for research were randomly chosen from each local government area. The analysis revealed that 6.7% of the total students interviewed have been involved in road accidents. 1.04% of the total respondents said at one time or the other that they have been kidnapped. Finally, the research found that travel is comparatively safe and believes this may be partly attributable to safer route to schools and school children being more familiar with the school journey. The research indicates that children aged between eleven and fifteen are most at risk of hit or knocked down on Benin City’s roads. These findings may help in planning and targeting road safety initiative (education, campaigns) in Benin City.

Keywords: accident, molestation (sexually), kidnapping, pedophile, pedestrian

Procedia PDF Downloads 199
1526 Correlates of Modes of Transportation to Work among Working Adults in Ernakulam District, Kerala

Authors: Anjaly Joseph, Elezebeth Mathews

Abstract:

Transportation and urban planning is the least recognised area for physical activity promotion in India, unlike developed regions. Identifying the preferred transportation modalities and factors associated with it is essential to address these lacunae. The objective of the study was to assess the prevalence of modes of transportation to work, and its correlates among working adults in Ernakulam District, Kerala. A cross sectional study was conducted among 350 working individuals in the age group of 18-60 years, selected through multi-staged stratified random sampling in Ernakulam district of Kerala. The inclusion criteria were working individuals 18-60 years, workplace at a distance of more than 1 km from the home and who worked five or more days a week. Pregnant women/women on maternity leave and drivers (taxi drivers, autorickshaw drivers, and lorry drivers) were excluded. An interview schedule was used to capture the modes of transportation namely, public, private and active transportation, socio demographic details, travel behaviour, anthropometric measurements and health status. Nearly two-thirds (64 percent) of them used private transportation to work, while active commuters were only 6.6 percent. The correlates identified for active commuting compared to other modes were low socio-economic status (OR=0.22, CI=0.5-0.85) and presence of a driving license (OR=4.95, CI= 1.59-15.45). The correlates identified for public transportation compared to private transportation were female gender (OR= 17.79, CI= 6.26-50.31), low income (OR=0.33, CI= 0.11-0.93), being unmarried (OR=5.19, CI=1.46-8.37), presence of no or only one private vehicle in the house (OR=4.23, CI=1.24-20.54) and presence of convenient public transportation facility to workplace (OR=3.97, CI= 1.66-9.47). The association between body mass index (BMI) and public transportation were explored and found that public transport users had lesser BMI than private commuters (OR=2.30, CI=1.23-4.29). Policies that encourage active and public transportation needs to be introduced such as discouraging private vehicle through taxes, introduction of convenient and safe public transportation facility, walking/cycling paths, and paid parking facility.

Keywords: active transportation, correlates, India, public transportation, transportation modes

Procedia PDF Downloads 153
1525 The Evaluation of Islamic Concept in Contemporary Mosque Design with the Case of Study: Jogokariyan Mosque Yogyakarta Indonesia

Authors: Ibrahim Malik, M. Ikramullah al Kambuna

Abstract:

Today the crisis of understanding in Islamic values has been extended to the architectural design. The majority of Muslim Architects when they designed Islamic Architectural building always stuck in cultural symbols, forms of facade, carvings calligraphy, and all of things which intimately associated with middle eastern culture. As well as the interpretation of symbols form, by designing a dome in every mosque, calligraphy carving in the interior of the mosque, and the other elements in the building which interpreted to the middle east culture. So here there are problems in understanding the meaning of Islam with Kaffah (overall), which appeared a distortion of understanding to distinguish between cultural and theological values in a design. This paper will try to evaluate the design of a contemporary mosque in Indonesia, with case studies in Jogokariyan Mosque Yogyakarta Indonesia. The building evaluation are focused in building function , aesthetic, comfort, and security. And finally from this research should be found the results of the integrated design evaluation of a contemporary mosque which based on the study of the Quran and Hadith.

Keywords: evaluation, islamic concept, mosque, Hadith, Quran

Procedia PDF Downloads 485
1524 Mobile WiMAX Network based Wireless Communication on Rail: An Analysis

Authors: Vinod Kumar Jatav, Dr. Vrijendra Singh

Abstract:

WiMAX is an emerging wireless technology designed by WiMAX forum. WiMAX technology delivers broadband internet access with QoS, mobility and robust security. WiMAX is among the prominent mobile broadband wireless technology which laid the foundation for the next generation networks (NGN). The next-generation communication system for railway should facilitate high level network availability, fast mobility for high speed trains with reliability, high handover rate, the firmness of train operations, and high QoS. The system should also be capable to provide various railway services by transmitting big data efficiently. One of the most promising technologies for the next generation railway wireless communication is Mobile WiMAX. This paper analyses some of the network architectures for railway wireless communication and considers the elementary concepts to facilitate the users with broadband internet access on trains. The paper aims to recognize the suitability of Mobile WiMAX technology for the special requirements of broadband internet facilities and wireless telecommunication services of Railways.

Keywords: Broadband internet, IEEE 802.16e, mobile WiMAX, Railway wireless communication

Procedia PDF Downloads 508
1523 'Sea Power: Concept, Influence and Securitization'; the Nigerian Navy's Role in a Developing State like Nigeria

Authors: William Abiodun Duyile

Abstract:

It is common knowledge that marine food has always been found from the sea, energy can also be found underneath and, to a growing extent; other mineral resources have come from the sea spaces. It is the importance of the sea and the sea lines of communication to littoral nations that has made concepts such as sea power, naval power, etc., significant to them. The study relied on documentary data. The documentary data were sourced from government annual departmental reports, newspapers and correspondence. The secondary sources used were subjected to internal and external criticism for authentication, and then to textual and contextual analyses. The study found that the differential level of seamanship amongst states defined their relationship. It was sea power that gave some states an edge over the others. The study proves that over the ages sea power has been core to the development of States or Empires. The study found that the Nigerian Navy was centre to Nigeria’s conquest of the littoral areas of Biafra, like Bonny, Port-Harcourt, and Calabar; it was also an important turning point of the Nigerian civil war since by it Biafra became landlocked. The research was able to identify succinctly the Nigerian Navy’s contribution to the security and development of the Nigerian State.

Keywords: sea power, naval power, land locked states, warship

Procedia PDF Downloads 126
1522 Comparison of the Indocyanine Green Dye Method versus the Combined Method of Indigo Carmine Blue Dye with Indocyanine Green Fluorescence Imaging for Sentinel Lymph Node Biopsy in Breast Conservative Therapy for Early Breast Cancer

Authors: Nobuyuki Takemoto, Ai Koyanagi, Masanori Yasuda, Hiroshi Yamamoto

Abstract:

Background: Fluorescence imaging (FI) is one of the methods to identify sentinel lymph nodes (SLNs). However, the procedure is technically complicated and requires procedural skills, as SLN biopsy must be conducted in dim light conditions. As an improved version of this method, we introduced a combined method (Combined mixed dye and fluorescence; CMF) consisting of indigo carmine blue dye and FI. The direct visualization of SLNs under shadowless surgical light conditions is facilitated by the addition of the blue dye. We compared the SLN detection rates of CMF with that of the indocyanine green (ICG) dye method (ICG-D). Methods: A total of 202 patients with stage ≤ IIA breast cancer who underwent breast conservative therapy with separate incision from January 2004 to February 2017 were reviewed. Details of the two methods are as follows: (1) ICG-D: 2ml of ICG (10mg) was used and the green-stained SLNs were resected via a 3-4cm axillary incision; (2) CMF: A combination of 1ml of ICG (5mg) and 1-3ml of indigo carmine (4-12mg) was used. Using Photodynamic Eye (PDE), a 1.5-2 cm incision was made near the point of disappearance of the fluorescence and SLNs with intermediate color of blue and green were resected. Results: There were 92 ICG-D and 110 CMF cases. CMF resulted in a significantly higher detection rate than ICG-D (96.4% vs. 83.7%; p=0.003). This difference was particularly notable in those aged ≥ 60 years (98.3% vs. 74.3%) and individuals with BMI ≥ 25kg/m2 (90.3% vs. 58.3%). Conclusion: CMF is an effective method to identify SLNs which is safe, efficient, and cost-effective. Furthermore, radiation exposure can be avoided, and it can be performed in institutes without nuclear medicine facilities. CMF achieves a high SLN identification rate, and most of this procedure is feasible under shadowless surgical light conditions. CMF can reliably perform SLN biopsy even in those aged ≥ 60 years and individuals with BMI ≥ 25 kg/m2.

Keywords: sentinel lymph node biopsy, identification rate, indocyanine green (ICG), indigocarmine, fluorescence

Procedia PDF Downloads 157
1521 Big Data Applications for Transportation Planning

Authors: Antonella Falanga, Armando Cartenì

Abstract:

"Big data" refers to extremely vast and complex sets of data, encompassing extraordinarily large and intricate datasets that require specific tools for meaningful analysis and processing. These datasets can stem from diverse origins like sensors, mobile devices, online transactions, social media platforms, and more. The utilization of big data is pivotal, offering the chance to leverage vast information for substantial advantages across diverse fields, thereby enhancing comprehension, decision-making, efficiency, and fostering innovation in various domains. Big data, distinguished by its remarkable attributes of enormous volume, high velocity, diverse variety, and significant value, represent a transformative force reshaping the industry worldwide. Their pervasive impact continues to unlock new possibilities, driving innovation and advancements in technology, decision-making processes, and societal progress in an increasingly data-centric world. The use of these technologies is becoming more widespread, facilitating and accelerating operations that were once much more complicated. In particular, big data impacts across multiple sectors such as business and commerce, healthcare and science, finance, education, geography, agriculture, media and entertainment and also mobility and logistics. Within the transportation sector, which is the focus of this study, big data applications encompass a wide variety, spanning across optimization in vehicle routing, real-time traffic management and monitoring, logistics efficiency, reduction of travel times and congestion, enhancement of the overall transportation systems, but also mitigation of pollutant emissions contributing to environmental sustainability. Meanwhile, in public administration and the development of smart cities, big data aids in improving public services, urban planning, and decision-making processes, leading to more efficient and sustainable urban environments. Access to vast data reservoirs enables deeper insights, revealing hidden patterns and facilitating more precise and timely decision-making. Additionally, advancements in cloud computing and artificial intelligence (AI) have further amplified the potential of big data, enabling more sophisticated and comprehensive analyses. Certainly, utilizing big data presents various advantages but also entails several challenges regarding data privacy and security, ensuring data quality, managing and storing large volumes of data effectively, integrating data from diverse sources, the need for specialized skills to interpret analysis results, ethical considerations in data use, and evaluating costs against benefits. Addressing these difficulties requires well-structured strategies and policies to balance the benefits of big data with privacy, security, and efficient data management concerns. Building upon these premises, the current research investigates the efficacy and influence of big data by conducting an overview of the primary and recent implementations of big data in transportation systems. Overall, this research allows us to conclude that big data better provide to enhance rational decision-making for mobility choices and is imperative for adeptly planning and allocating investments in transportation infrastructures and services.

Keywords: big data, public transport, sustainable mobility, transport demand, transportation planning

Procedia PDF Downloads 48
1520 Vibrancy in The City: The Problem of Sidi-Gaber Station Zone in Alexandria, Egypt

Authors: Gihan Mosaad, Bakr Gomaa, Rana Elbadri

Abstract:

Modern parts of Alexandria city lack in vibrancy, causing a number of problems such as urban areas with poor security measures as well as weak economic state. Vibrancy provides a livable, attractive and secure environments; it also boosts the city’s economy and social life. Vibrant city is a city full of energy and life. To achieve this, a number of resources are needed; namely specific urban density, the availability of alternative modes of transportation and finally diversity of land-uses. Literature review shows no comprehensive study that assesses vibrancy in the streets of modern Alexandria. This study aims to measure the vibrancy potential in Sidi-Gaber station area thought the assessment of existing resources performance. Methods include literature reviews, surveying of existing case, questionnaire as well as GIS techniques. Expected results include GIS maps defining the vibrancy potentials in land use, density and statistical study regarding public transportation use in the area.

Keywords: Alexandria, density, mixed use, transportation, vibrancy

Procedia PDF Downloads 274
1519 Iran and the Security of the Gulf Cooperation Council States

Authors: Ibrahim Alshalan

Abstract:

The Islamic Republic of Iran is one of the greatest and most powerful countries, not only in the Arabian Gulf but in the entire Middle East region. However, the Iranian regime, which came to power as a result of the 1979 revolution that resulted in overthrowing the Shah Mohammad Reza Pahlavi, has been the biggest source of threat to the stability of the Middle East since the revolution until this day. It has ambitions to dominate the neighboring Arab countries, especially Iraq, Syria, Lebanon, Yemen and Bahrain. Iran has bad relationships with countries of the Gulf Cooperation Council (GCC), which includes Saudi Arabia, United Arab Emirates, Kuwait, Qatar, Oman and Bahrain. The main objective of this paper is to shed light on the deteriorating political relations between the Iranian regime on one hand and the GCC on the other, especially Saudi Arabia which is witnessing more challenges as a result of Iran's determination to develop its nuclear program. Another important objective of this paper is to identify the Iranian role in the creation of the hotbeds of conflict in addition to its responsibility for some of the region's problems. It also aims to answer the question; why does Iran insist on developing its controversial nuclear program?

Keywords: Iran, GCC, Gulf, Saudi Arabia

Procedia PDF Downloads 557
1518 Exploring Strategies Used by Victims of Intimate Partner Violence to Increase Sense of Safety: A Systematic Review and Quantitative Study

Authors: Thomas Nally, Jane Ireland, Roxanne Khan, Philip Birch

Abstract:

Intimate Partner Violence (IPV), a significant societal problem, affects individuals worldwide. However, the strategies victims use to keep safe are under-researched. IPV is significantly under-reported, and services often are not able to be accessed by all victims. Thus they are likely to use their own strategies to manage their victimization before being able to seek support. Two studies were completed to understand these strategies. A systematic review of the literature and study completed with professionals who work with victims was undertaken to understand this area. In study one, a systematic review of the literature (n=61 papers), were analyzed using Thematic Analysis. The results indicated that victims use a large array of behaviors to increase their sense of safety and coping with emotions but also experience significant barriers to help-seeking. In study 2, sixty-nine professionals completed a measure exploring the likelihood and effectiveness of various victim strategies regarding increasing their sense of safety. Strategies included in the measure were obtained from those identified in study 1. Findings indicated that professionals perceived victims of IPV to be more likely to employ safety strategies and coping behaviors that may be ineffective but not help-seeking behaviors. Further, the responses were analyzed using Cluster Analysis. Safety strategies resulted in five clusters; perpetrator-directed strategies, prevention strategies, cognitive reappraisal, safety planning and avoidance strategies. Help-Seeking resulted in six clusters; information or practical support, abuse-related support, emotional support, secondary support and informal support. Finally, coping resulted in four clusters; emotional coping, self-directed coping, thought recording/change and cognitive coping. Both studies indicate that victims may use a variety of strategies to manage their safety besides seeking help. Professionals working with victims, using a strength-based approach, should understand what is used and is effective for victims who are unable to leave the relationships or access external support.

Keywords: intimate partner violence, help-seeking, professional support, victims, victim coping, victim safety

Procedia PDF Downloads 176
1517 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 73
1516 A Review of Hypnosis Uses for Anxiety and Phobias Treatment

Authors: Fleura Shkëmbi, Sevim Mustafa, Naim Fanaj

Abstract:

Hypnosis, often known as cognitive therapy, is a sort of mind-body psychotherapy. A professional and certified hypnotist or hypnotherapist guides the patient into this extreme level of focus and relaxation during the session by utilizing verbal cues, repetition, and imagery. In recent years, hypnotherapy has gained popularity in the treatment of a variety of disorders, including anxiety and particular phobias. The term "phobia" is commonly used to define fear of a certain trigger. When faced with potentially hazardous situations, the brain naturally experiences dread. While a little dread here and there may keep us safe, phobias can drastically reduce our quality of life. In summary, persons who suffer from anxiety are considered to see particular environmental situations as dangerous, but those who do not suffer from anxiety do not. Hypnosis is essential in the treatment of anxiety disorders. Hypnosis can help patients minimize their anxiety symptoms. This broad concept has aided in the development of models and therapies for anxiety disorders such as generalized anxiety disorder, panic attacks, hypochondria, and obsessional disorders. Hypnosis techniques are supposed to be attentive and mental pictures, which is conceivable; this is why they're associated with improved working memory and visuospatial abilities. In this sense, the purpose of this study is to determine how effectively specific therapeutic methods perform in treating persons with anxiety and phobias. In addition to cognitive-behavioral therapy and other therapies, the approaches emphasized the use of therapeutic hypnosis. This study looks at the use of hypnosis and related psychotherapy procedures in the treatment of anxiety disorders. Following a discussion of the evolution of hypnosis as a therapeutic tool, neurobiological research is used to demonstrate the influence of hypnosis on the change of perception in the brain. The use of hypnosis in the treatment of phobias, stressful situations, and posttraumatic stress disorder is examined, as well as similarities between the hypnotic state and dissociative reactions to trauma. Through an extensive literature evaluation, this study will introduce hypnotherapy procedures that result in more successful anxiety and phobia treatment.

Keywords: anxiety, hypnosis, hypnotherapy, phobia, technique, state

Procedia PDF Downloads 104
1515 A Review on Bioremediation of Waste Effluent Associated with Pulp and Paper Industry

Authors: Adamu Muhammed Tukur

Abstract:

Pulp and paper industry is one of the fastest growing industries due to an increased demand in paper products. For it to satisfy this ever increasing demand, it adopts new technological innovations some of which are proved to affect our environment negatively. Global consumption of paper has increased by 400% in the last four decades and this suggests that more research is required to assess the impact of industrial effluents to our environment and public health. Paper products are generally biodegradable, however, the processes involved in its production which involve the use of mainly bleaching agents and other non-biodegradable substances pose serious problem to the environment. There are more than 250 chemicals released in paper mill waste and some are xenobiotics. Different methods such as physical and chemical methods can be adopted for the remediation of the effluents but are proved to be costly and not safe to the environment. On the other hand, biological method is shown to be less costly and environmentally friendly. Microorganisms and their enzymes have shown a promising future for bioremediation of effluents related to paper mill. Many studies prove that one of the major pollutants in the paper mill effluent is phenol especially its chlorinated derivatives. Pentachlorophenol is extremely hazardous to living cells and therefore need to be removed from the environment. Microorganisms including bacteria and fungi have the potential to degrade phenolic compounds e.g. Bacillus stearothermiphilus, Pseudomonas putida, Coricus versicolor, Sphingomonas chlorophenolica, Fusarium sp, Bacillus subtilis and P. aeroginosa. Enzymes used for the degradation include phenol hydrooxylase, polyphenoloxylase, laccase, peroxidase among others. Lignin is another important pollutant and is resistant to microbial degradation but it has been proved that certain bacteria and fungi like can degrade it. Among the fungi white-rot fungi like Fomes lividus and Trametes vesicolor are the most important bioremediators. This review focused on use of microorganism to reduce or eradicate pollutants released from the paper industry. It can serve as a review for further research to be conducted especially in the field of Biotechnology.

Keywords: bioremediation, pulp and paper, pentachlorophenol, environment

Procedia PDF Downloads 309
1514 Evaluating The Effects of Fundamental Analysis on Earnings Per Share Concept in Stock Valuation in the Zimbabwe Stock Exchange Market

Authors: Brian Basvi

Abstract:

A technique for analyzing a security's intrinsic value is called fundamental analysis. It involves looking at relevant financial, economic, and other qualitative and quantitative aspects. Earnings Per Share (EPS), a crucial metric in fundamental analysis, is calculated by dividing a company's net income by the total number of outstanding shares. With more than 70 listed businesses, the Zimbabwe Stock Exchange (ZSE) is the primary stock exchange in Zimbabwe. This study applies the EPS financial ratio and stock valuation techniques to historical stock data from 68 companies listed on the Zimbabwe Stock Exchange. According to a ZSE study, EPS significantly affects share prices that are listed on the market. The study's objective was to assess how fundamental analysis affected the idea of EPS in ZSE stock valuation. It concluded that EPS is an important consideration for investors when they make judgments about their investments. According to the study's findings, fundamental analysis is a useful tool for ZSE investors since it offers insightful information about a company's financial performance and aids in decision-making. Investors can have a better understanding of a company's underlying worth and prospects for future growth by looking into EPS and other basic aspects.

Keywords: fundamental analysis, stock valuation, EPS, share pricing

Procedia PDF Downloads 12
1513 Needle Track Technique In Strabismus Surgery

Authors: Seema Dutt Bandhu, Yashi Bansal, Tania Moudgil, Barinder Kaur

Abstract:

Introduction: Scleral perforation during the passage of suture needle is a known complication of strabismus surgery. The present study was conducted to evolve a safe and easy technique of passing the suture needle through the sclera. A scleral tunnel was created with a 26-guage needle through which the suture needle was passed. The rest of the steps of strabismus surgery were carried out as usual. Material and Methods: After taking clearance from the Institutional Ethics Committee, an interventional study was carried out on twenty patients. The scleral tunnel technique was performed on the patients of strabismus after taking written informed consent. Before passing the suture needle through the sclera during strabismus surgery, a tunnel through approximately half the thickness of the sclera was created with the help of a bent 26-gauge needle. The suture needle was then passed through this tunnel. Rest of the steps of the surgery were carried out in the conventional manner. In a control group of same number of patients, the surgery was performed in the conventional method. Both the groups were followed up for any complications. Ease of passing suture and surgeons’ satisfaction with the technique was noted on a 10-point Likert scale. Results: None of the patients in either group suffered from any complications. Four surgeons participated in the study. The average Likert scale score of the surgeons for satisfaction with the technique was 4.5 on a scale of 5. The score for ease of passage of suture needle was 5 on a score of 5. Discussion: Scleral perforation during passing the sutures through the sclera is a known complication of strabismus surgery. Incidence reported is 7.8% It occurs due to inappropriate engagement of the scleral tissue or passage of the suture needle along a wrong axis during the process of passing the suture needle. The needle track technique eases the passage of passing the suture needle through the sclera as the engagement of the scleral tissue can be done with greater control with a 26-guage needle. The surgeons have reported that they are highly satisfied with the technique and they have reported that the technique eased the passage of the suture needle through the sclera.

Keywords: suture, scleral tunnel, strabismus, scleral perforation

Procedia PDF Downloads 68
1512 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 461
1511 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 348
1510 Global Gender Differences in Job Satisfaction in the Hospitality Industry

Authors: Jonathan Hinton Westover, Maureen S. Andrade, Doug Miller

Abstract:

Research has been inconclusive in determining if men or women experience more job satisfaction. A global comparison examining extrinsic and intrinsic factors, work relations, and work-life balance determinants found few differences; however, work relations and work-life balance factors were more significant for male than female workers across occupations. The current study uses International Social Survey Program data representing 37 countries to explore gender differences in job satisfaction in the hospitality industry. Findings demonstrate that mean job satisfaction scores for females are lower across hospitality occupations except for hotel receptionists, housekeeping supervisors, and hotel cleaners. Regression results revealed additional differences such as the significance of co-worker relations, the negative impact of being discriminated against and harassed at work, working weekends, marital status, and supervisory status for women with autonomy, work stress, education, and employment relationship being more salient for men. Interesting work, work being useful to society, job security, pay, relations with management, and work interfering with family were significant for both males and females.

Keywords: job satisfaction, gender, hospitality, global comparisons

Procedia PDF Downloads 122
1509 BOFSC: A Blockchain Based Decentralized Framework to Ensure the Transparency of Organic Food Supply Chain

Authors: Mifta Ul Jannat, Raju Ahmed, Al Mamun, Jannatul Ferdaus, Ritu Costa, Milon Biswas

Abstract:

Blockchain is an internet-based invention that is coveted in the permanent, scumbled record for its capacity to openly accept, record, and distribute transactions. In a traditional supply chain, there are no trustworthy participants for an organic product. Yet blockchain engineering may provide confidence, transparency, and traceability. Blockchain varies in how companies get real, checked, and lasting information from their supply chain and lock in customers. In an arrangement of cryptographic squares, Blockchain digitizes each connection by sparing it. No one person may alter the documents, and any alteration within the agreement is clear to all. The coming to the record is tamper proof and unchanging, offering a complete history of the object’s life cycle and minimizing opening for extorting. The primary aim of this analysis is to identify the underlying problem that the customer faces. In this post, we will minimize the allocation of fraud data through the ’Smart Contract’ and include a certificate of quality assurance.

Keywords: blockchain technology, food supply chain, Ethereum, smart contract, quality assurance, trustability, security, transparency

Procedia PDF Downloads 142
1508 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 281
1507 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 242
1506 Effects of Aerobic Dance Circuit Training Programme on Blood Pressure Variables of Obese Female College Students in Oyo State, Nigeria

Authors: Isiaka Oladele Oladipo, Olusegun Adewale Ajayi

Abstract:

The blood pressure fitness of female college students has been implicated in sedentary lifestyles. This study was designed to determine the effects of the Aerobic Dance Circuit Training Programme (ADCT) on blood pressure variables (Diastolic Blood Pressure (DBP) and Systolic Blood Pressure (SBP). Participants’ Pretest-Posttest control group quasi-experimental design using a 2x2x4 factorial matrix was adopted, while one (1) research question and two (2) research hypotheses were formulated. Seventy (70) untrained obese students-volunteers age 21.10±2.46 years were purposively selected from Oyo town, Nigeria; Emmanuel Alayande College of Education (experimental group and Federal College of Education (special) control group. The participants’ BMI, weight (kg), height (m), systolic bp(mmHg), and diastolic bp (mmHg) were measured before and completion of ADCT. Data collected were analysed using a pie chart, graph, percentage, mean, frequency, and standard deviation, while a t-test was used to analyse the stated hypotheses set at the critical level of 0.05. There were significant mean differences in baseline and post-treatment values of blood pressure variables in terms of SBP among the experimental group 136.49mmHg and 131.66mmHg; control group 130.82mmHg and 130.56mmHg (crit-t=2.00, cal.t=3.02, df=69, p<.0, the hypothesis was rejected; while DBP experimental group 88.65mmHg and 82.21mmHg; control group 69.91mmHg and 72.66mmHg (crit-t=2.00, cal.t=1.437, df=69, p>.05) in which the hypothesis was accepted). It was revealed from the findings that participants’ SBP decrease from week 4 to week 12 of ADCT indicated an effective reduction in blood pressure variables of obese female students. Therefore, the study confirmed that the use of ADCT is safe and effective in the management of blood pressure for the healthy benefit of obesity.

Keywords: aerobic dance circuit training, fitness lifestyles, obese college female students, systolic blood pressure, diastolic blood pressure

Procedia PDF Downloads 60
1505 Tripeptide Inhibitor: The Simplest Aminogenic PEGylated Drug against Amyloid Beta Peptide Fibrillation

Authors: Sutapa Som Chaudhury, Chitrangada Das Mukhopadhyay

Abstract:

Alzheimer’s disease is a well-known form of dementia since its discovery in 1906. Current Food and Drug Administration approved medications e.g. cholinesterase inhibitors, memantine offer modest symptomatic relief but do not play any role in disease modification or recovery. In last three decades many small molecules, chaperons, synthetic peptides, partial β-secretase enzyme blocker have been tested for the development of a drug against Alzheimer though did not pass the 3rd clinical phase trials. Here in this study, we designed a PEGylated, aminogenic, tripeptidic polymer with two different molecular weights based on the aggregation prone amino acid sequence 17-20 in amyloid beta (Aβ) 1-42. Being conjugated with poly-ethylene glycol (PEG) which self-assembles into hydrophilic nanoparticles, these PEGylated tripeptides constitute a very good drug delivery system crossing the blood brain barrier while the peptide remains protected from proteolytic degradation and non-specific protein interactions. Moreover, being completely aminogenic they would not raise any side effects. These peptide inhibitors were evaluated for their effectiveness against Aβ42 fibrillation at an early stage of oligomer to fibril formation as well as preformed fibril clearance via Thioflavin T (ThT) assay, dynamic light scattering analyses, atomic force microscopy and scanning electron microscopy. The inhibitors were proved to be safe at a higher concentration of 20µM by the reduction assay of 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) dye. Moreover, SHSY5Y neuroblastoma cells have shown a greater survivability when treated with the inhibitors following Aβ42 fibril and oligomer treatment as compared with the control Aβ42 fibril and/or oligomer treated neuroblastoma cells. These make the peptidic inhibitors a promising compound in the aspect of the discovery of alternative medication for Alzheimer’s disease.

Keywords: Alzheimer’s disease, alternative medication, amyloid beta, PEGylated peptide

Procedia PDF Downloads 196
1504 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 226
1503 Creation and Implementation of A New Palliative Care Drug Chart, via A Closed-Loop Audit

Authors: Asfa Hussain, Chee Tang, Mien Nguyen

Abstract:

Introduction: The safe usage of medications is dependent on clear, well-documented prescribing. Medical drug charts should be regularly checked to ensure that they are fit for purpose. Aims: The purpose of this study was to evaluate whether the Isabel Hospice drug charts were effective or prone to medical errors. The aim was to create a comprehensive palliative care drug chart in line with medico-legal guidelines and to minimise drug administration and prescription errors. Methodology: 50 medical drug charts were audited from March to April 2020, to assess whether they complied with medico-legal guidelines, in a hospice within East of England. Meetings were held with the larger multi-disciplinary team (MDT), including the pharmacists, nursing staff and doctors, to raise awareness of the issue. A preliminary drug chart was created, using the input from the wider MDT. The chart was revised and trialled over 15 times, and each time feedback from the MDT was incorporated into the subsequent template. In the midst of the COVID-19 pandemic in September 2020, the finalised drug chart was trialled. 50 new palliative drug charts were re-audited, to evaluate the changes made. Results: Prescribing and administration errors were high prior to the implementation of the new chart. This improved significantly after introducing the new drug charts, therefore improving patient safety and care. The percentage of inadequately documented allergies went down from 66% to 20% and incorrect oxygen prescription from 40% to 16%. The prescription drug-drug interactions decreased by 30%. Conclusion: It is vital to have clear standardised drug charts, in line with medico-legal standards, to allow ease of prescription and administration of medications and ensure optimum patient-centred care. This closed loop audit demonstrated significant improvement in documentation and prevention of possible fatal drug errors and interactions.

Keywords: palliative care, drug chart, medication errors, drug-drug interactions, COVID-19, patient safety

Procedia PDF Downloads 156
1502 A Review of the Effects of Exercise in Preventing Migraine Headaches

Authors: Afsaneh Soltani, Zahra Mohajer

Abstract:

Migraine is one of the most common chronic neurological diseases. Migraines affect different aspects of life. Severe migraine headaches lead to dysfunction, a reduced presence at work, and decreased ability to think and make decisions. Non-pharmacological treatments play a very important role in controlling and preventing migraine headaches. A healthy lifestyle helps control migraine headaches. Migraine headaches can be reduced by following these steps: Avoiding stress, eating regularly and avoiding hunger and thirst, avoiding stimulants such as chocolate, caffeine, and cigarettes, following a regular bedtime routine, or avoiding sleep deprivation. Exercise a lot, and do regular exercise (and prevent obesity). Non-pharmacological treatment is especially important in pregnant women and children because in these cases, medical treatments are not preferred due to the many side effects. Exercise is one of the most effective and uncomplicated non-pharmacological alternatives in the treatment of migraine headaches. Exercising for episodic migraines is a safe, effective, and promising complementary treatment option. Numerous studies have shown that aerobic exercise reduces the severity and duration of migraine headaches. Effective aerobic exercise includes cycling and brisk walking. Exercise improves the quality of life and reduces the use of medication in people with migraines. Patients who exercise have fewer migraine days, resulting in better personal, social, and occupational performance. Several studies have shown that pain intensity and frequency in patients who exercise regularly decreased significantly after exercise compared to controls who did not exercise. According to a study, regular exercise reduces the levels of interleukins, especially IL-12P70, which reduces anxiety and reduces the number of days of migraine in patients. An article has shown that endurance exercise reduces the number of migraine days and also increases cerebrovascular health in migraine patients. According to studies, the minimum duration of exercise to achieve a positive effect of exercise in patients with migraine is 3 months (12 weeks) and 40 minutes three times a week.

Keywords: exercise, headache, migraine, physical activity

Procedia PDF Downloads 92
1501 Leaching of Metal Cations from Basic Oxygen Furnace (BOF) Steelmaking Slag Immersed in Water

Authors: Umashankar Morya, Somnath Basu

Abstract:

Metalloids like arsenic are often present as contaminants in industrial effluents. Removal of the same is essential before the safe discharge of the wastewater into the environment. Otherwise, these pollutants tend to percolate into aquifers over a period of time and contaminate drinking water sources. Several adsorbents, including metal powders, carbon nanotubes and zeolites, are being used for this purpose, with varying degrees of success. However, most of these solutions are not only costly but also not always readily available. This restricts their use, especially among financially weaker communities. Slag generated globally from primary steelmaking operations exceeds 200 billion kg every year. Some of it is utilized for applications like road construction, filler in reinforced concrete, railway track ballast and recycled into iron ore agglomeration processes. However, these usually involve low-value addition, and a significant amount of the slag still ends up in a landfill. However, there is a strong possibility that the constituents in the steelmaking slag may immobilize metalloid contaminants present in wastewater through a combination of adsorption and precipitation of insoluble product(s). Preliminary experiments have already indicated that exposure to basic oxygen steelmaking slag does reduce pollutant concentration in wastewater. In addition, the slag is relatively inexpensive and available in large quantities and in several countries across the world. Investigations on the mechanism of interactions at the water-solid interfaces have been in progress for some time. However, at the same time, there are concerns about the possibility of leaching of metal ions from the slag particles in concentrations greater than what exists in the water bodies where the “treated” wastewater would eventually be discharged. The effect of such leached ions on the aquatic flora and fauna is yet uncertain. This has prompted the present investigation, which focuses on the leaching of metal ions from steelmaking slag particles in contact with wastewater, and the influence of these ions on the removal of contaminant species. Experiments were carried out to quantify the leaching behavior of different ionic species upon exposure of the slag particles to simulated wastewater, both with and without specific metalloid contaminants.

Keywords: slag, water, metalloid, heavy metal, wastewater

Procedia PDF Downloads 65
1500 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 366