Search results for: Exploitation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 536

Search results for: Exploitation

506 Medical Knowledge Management since the Integration of Heterogeneous Data until the Knowledge Exploitation in a Decision-Making System

Authors: Nadjat Zerf Boudjettou, Fahima Nader, Rachid Chalal

Abstract:

Knowledge management is to acquire and represent knowledge relevant to a domain, a task or a specific organization in order to facilitate access, reuse and evolution. This usually means building, maintaining and evolving an explicit representation of knowledge. The next step is to provide access to that knowledge, that is to say, the spread in order to enable effective use. Knowledge management in the medical field aims to improve the performance of the medical organization by allowing individuals in the care facility (doctors, nurses, paramedics, etc.) to capture, share and apply collective knowledge in order to make optimal decisions in real time. In this paper, we propose a knowledge management approach based on integration technique of heterogeneous data in the medical field by creating a data warehouse, a technique of extracting knowledge from medical data by choosing a technique of data mining, and finally an exploitation technique of that knowledge in a case-based reasoning system.

Keywords: data warehouse, data mining, knowledge discovery in database, KDD, medical knowledge management, Bayesian networks

Procedia PDF Downloads 359
505 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings

Authors: Vanda Božić, Željko Nikač

Abstract:

Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.

Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights

Procedia PDF Downloads 334
504 Literature as a Strategic Tool to Conscientise Africans: An Attempt by Postcolonial Writers and Critics to Reverse the Socio-Economics Imbalances of Colonialism

Authors: Lutendo Nendauni

Abstract:

Colonialism breaks things, colonisers exploded native cultural solidarity, producing the spiritual confusion, psychic wounding, and economic exploitation of a new and dominated ‘other’. Colonialism as the cultural and economic exploitation began when the West defended in their seizure of foreign territories for the exploitation of its natural resources; this resulted in brutal socio-economic imbalances. The Western profited at the detriment of the weak Africa. However, colonialism has since passed, but the effects are still evident culturally, socially, and economically. This paper explored how postcolonial writers and critics attempt to reverse the socio-economic imbalances resulting from the fragmentation of colonialism, with a focus on the play 'I will Marry When I Want' by Ngugi wa Thiong’o and Ngugi wa Mirii, as a primary text. Using qualitative discourse-textual analysis as the research methodology, the researcher purposively extracts discourse segments from the text for analysis and interpretation. The findings reveal that Postcolonial critics and writers attempt to reverse the socio-economic effects of colonialism through various counter discourses; their literature is concerned with the destruction of colonised identity, the search for this identity, and its assertion. It is manifest in the text that writers offer corrective views about Africans; they stress that they write their literary texts to conscientise their fellow Africans. Postcolonial writers and critics argue that language is a carrier of culture and that the only way to break free from colonial influence is by not adopting a foreign language. They further through their poems, novels, plays, and music strategically shine the spotlight on the previously nameless and destitute people so that they can develop the human spirit’s desire to overcome defeat, socio-political deprivation, and isolation.

Keywords: colonialism, postcoloniality, critics, socio-economic imbalances

Procedia PDF Downloads 126
503 Oil Exploration in the Niger Delta and the Right to a Healthy Environment

Authors: Olufunke Ayilara Aje-Famuyide

Abstract:

The centrality of the Petroleum Industry in the world energy is undoubted. The world economy almost runs and depends on petroleum. Petroleum industry is a multi-trillion industry; it turns otherwise poor and underdeveloped countries into wealthy nations and thrusts them at the center of international diplomacy. Although these developing nations lack the necessary technology to explore and exploit petroleum resources they are not without help as developed nations, represented by their multinational corporations are ready and willing to provide both the technical and managerial expertise necessary for the development of this natural resource. However, the exploration of these petroleum resources comes with, sometimes, grave, concomitant consequences. These consequences are especially pronounced with respect to the environment. From the British Petroleum Oil rig explosion and the resultant oil spillage and pollution in New Mexico, United States to the Mobil Oil spillage along Nigerian coast, the story and consequence is virtually the same. Nigeria’s Niger Delta Region produces Nigeria’s petroleum which accounts for more than ninety-five percent of Nigeria’s foreign exchange earnings. Between 1999 and 2007, Nigeria earned more than $400 billion from petroleum exports. Nevertheless, petroleum exploration and exploitation has devastated the Niger Delta environment. From oil spillage which pollutes the rivers, farms and wetlands to gas flaring by the multi-national corporations; the consequences is similar-a region that has been devastated by petroleum exploitation. This paper thus seeks to examine the consequences and impact of petroleum pollution in the Niger Delta of Nigeria with particular reference on the right of the people of Niger Delta to a healthy environment. The paper further seeks to examine the relevant international, regional instrument and Nigeria’s municipal laws that are meant to protect the result of the people of the Niger Delta and their enforcement by the Nigerian State. It is quite worrisome that the Niger Delta Region and its people have suffered and are still suffering grave violations of their right to a healthy environment as a result of petroleum exploitation in their region. The Nigerian effort at best is half-hearted in its protection of the people’s right.

Keywords: environment, exploration, petroleum, pollution

Procedia PDF Downloads 403
502 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 139
501 A Critical Discourse Study of Gender Identity Issues in Daniyal Mueenuddin’s Short Story “Saleema”

Authors: Zafar Ali

Abstract:

The aim of this research is to highlight problems that are faced by women at the hands of men. Males in Pakistani society have power and use this power for the exploitation of women. Further, the purpose of the study is to make societies like Pakistan and especially the young generation, aware and enable them to resist such issues, and the role of discourse in this regard is to minimize its political and social repercussions. The study finds out different discursive techniques and manipulative language used in the short story to construct gender identity. The study also investigates socio-economic roles in the construction of gender identity. This study has been completed with the help of Critical Discourse Analysis (CDA) principles. CDA principles have been applied to the text of the selected short story Saleema from Daniyal Mueenuddin’s collection In Other Rooms, Other Wonders. Related passages, structures, expressions, and text are analyzed from the point of view of CDA, especially Norman Fairclough’s CDA approach. It was found from the analysis that women have no identity of their own in patriarchal societies like Pakistan. Further, it was found women are mistreated, and they have a very limited and defined role in Pakistan. They cannot go beyond the limit defined to them by men.

Keywords: gender issues, resourceful groups, CDA, exploitation

Procedia PDF Downloads 103
500 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 327
499 Exploitation behind the Development of Home Batik Industry in Lawean, Solo, Central Java

Authors: Mukhammad Fatkhullah, Ayla Karina Budita, Cut Rizka Al Usrah, Kanita Khoirun Nisa, Muhammad Alhada Fuadilah Habib, Siti Muslihatul Mukaromah

Abstract:

Batik industry has become one of the leading industries in the economy of Indonesia. Since the recognition of batik as one of cultural wealth and national identity of Indonesia by UNESCO, batik production keeps increasing as a result of increasing demands for batik, whether from domestically or abroad. One of the rapid development batik industries in Indonesia is batik industry in Lawean Village, Solo, Central Java, Indonesia. This batik industry generally uses putting-out system where batik workers work in their own houses. With the implementation of this system, therefore employers don’t have to prepare Environmental Impact Analysis (EIA), social security for workers, overtime payment, space for working, and equipment for working. The implementation of putting-out system causes many problems, starting from environmental pollution, the loss of social rights of workers, and even exploitation of workers by batik entrepreneurs. The data used to describe this reality is the primary data from qualitative research with in-depth interview data collection technique. Informants were determined purposively. The theory used to perform data interpretation is the phenomenology of Alfred Schutz. Both qualitative and phenomenology are used in this study to describe batik workers exploitation in terms of the implementation of putting-out system on home batik industry in Lawean. The research result showed that workers in batik industry sector in Lawean were exploited with the implementation of putting-out system. The workers were strictly employed by the entrepreneurs, so that their job cannot be called 'part-time' job anymore. In terms of labor and time, the workers often work more than 12 hours per day and they often work overtime without receiving any overtime payment. In terms of work safety, the workers often have contact with chemical substances contained in batik making materials without using any protection, such as clothes work, which is worsened by the lack of standard or procedure in work that can cause physical damage, such as burnt and peeled off skin. Moreover, exposure and contamination of chemical materials make the workers and their families vulnerable to various diseases. Meanwhile, batik entrepreneurs did not give any social security (including health cost aid). Besides that, the researchers found that batik industry in home industry sector is not environmentally friendly, even damaging ecosystem because industrial waste disposed without EIA.

Keywords: exploitation, home batik industry, occupational health and safety, putting-out system

Procedia PDF Downloads 291
498 Microseismics: Application in Hydrocarbon Reservoir Management

Authors: Rahul Kumar Singh, Apurva Sharma, Dilip Kumar Srivastava

Abstract:

Tilting of our interest towards unconventional exploitation of hydrocarbons has raised a serious concern to environmentalists. Emerging technologies like horizontal/multi-lateral drilling with subsequent hydraulic fracturing or fracking etc., for exploitation of different conventional/unconventional hydrocarbon reservoirs, are related to creating micro-level seismic events below the surface of the earth. Monitoring of these micro-level seismic events is not possible by the conventional methodology of the seismic method. So, to tackle this issue, a new technology that is microseismic is very much in discussions around the globe. Multiple researches are being carried out these days around the globe in order to prove microseismic as a new essential in the E & P industry, especially for unconventional reservoir management. Microseismic monitoring is now used for reservoir surveillance, and the best application is checking the integrity of the caprock and containment of fluid in it. In general, in whatever terms we want to use micro-seismic related events monitoring and understanding the effectiveness of stimulation, this technology offers a lot of value in terms of insight into the subsurface characteristics and processes, and this makes it really a good geophysical method to be used in future.

Keywords: microseismic, monitoring, hydraulic fracturing or fracking, reservoir surveillance, seismic hazards

Procedia PDF Downloads 158
497 Theory of Constraints: Approach for Performance Enhancement and Boosting Overhaul Activities

Authors: Sunil Dutta

Abstract:

Synchronization is defined as ‘the sequencing and re-sequencing of all relative and absolute activities in time and space and continuous alignment of those actions with purposeful objective in a complex and dynamic atmosphere. In a complex and dynamic production / maintenance setup, no single group can work in isolation for long. In addition, many activities in projects take place simultaneously at the same time. Work of every section / group is interwoven with work of others. The various activities / interactions which take place in production / overhaul workshops are interlinked because of physical requirements (information, material, workforces, equipment, and space) and dependencies. The activity sequencing is determined by physical dependencies of various department / sections / units (e.g., inventory availability must be ensured before stripping and disassembling of equipment), whereas resource dependencies do not. Theory of constraint facilitates identification, analyses and exploitation of the constraint in methodical manner. These constraints (equipment, manpower, policies etc.) prevent the department / sections / units from getting optimum exploitation of available resources. The significance of theory of constraints for achieving synchronization at overhaul workshop is illustrated in this paper.

Keywords: synchronization, overhaul, throughput, obsolescence, uncertainty

Procedia PDF Downloads 323
496 Social Media Mining with R. Twitter Analyses

Authors: Diana Codat

Abstract:

Tweets' analysis is part of text mining. Each document is a written text. It's possible to apply the usual text search techniques, in particular by switching to the bag-of-words representation. But the tweets induce peculiarities. Some may enrich the analysis. Thus, their length is calibrated (at least as far as public messages are concerned), special characters make it possible to identify authors (@) and themes (#), the tweet and retweet mechanisms make it possible to follow the diffusion of the information. Conversely, other characteristics may disrupt the analyzes. Because space is limited, authors often use abbreviations, emoticons to express feelings, and they do not pay much attention to spelling. All this creates noise that can complicate the task. The tweets carry a lot of potentially interesting information. Their exploitation is one of the main axes of the analysis of the social networks. We show how to access Twitter-related messages. We will initiate a study of the properties of the tweets, and we will follow up on the exploitation of the content of the messages. We will work under R with the package 'twitteR'. The study of tweets is a strong focus of analysis of social networks because Twitter has become an important vector of communication. This example shows that it is easy to initiate an analysis from data extracted directly online. The data preparation phase is of great importance.

Keywords: data mining, language R, social networks, Twitter

Procedia PDF Downloads 151
495 Population and Age Structure of the Goby Stigmatogobius pleurostigma in the Mekong Delta, Vietnam

Authors: Quang M. Dinh

Abstract:

Stigmatogobius pleurostigma is a commercial fish being caught increasingly in the Mekong Delta. Although it plays an important role for food supply, little is known about this species including morphology, distribution and growth pattern. Meanwhile, its population and age structure is unknown. The present study was conducted in the Mekong Delta to provide new data on population parameters of this goby species. The von Bertalanffy growth parameters were L∞= 8.6 cm, K = 0.83 yr⁻¹, and t0 = -0.07 yr⁻¹ basing on length frequency data analysis of 601 individuals. The fish total length at first capture was 3.8 cm; and fishing, natural and total mortalities of the fish population were 2.31 yr⁻¹, 1.17 yr⁻¹, and 3.48 yr⁻¹ respectively. The maximum fish yield (Eₘₐₓ), economic yield (E₀.₁) and yield of 50% reduction of exploitation (E₅₀) rates were 0.704, 0.555 and 0.335 based on the relative yield-per-recruit and biomass-per-recruit analyses. The fish longevity was 3.61 yr, and growth performance was 1.79. Three fish age groups were recorded in this study (0+, 1+ and 2+). The species is a potential aquaculture candidate because of its high growth parameter. This goby stock was overexploited in the Mekong Delta as its exploitation rate (E=0.34) was higher than E₅₀ (0.335). The mesh size of gillnets should be increased and avoid catching fish in June, recruitment time, for future sustainable fishery management.

Keywords: Stigmatogobius pleurostigma, age, population structure, Vietnam

Procedia PDF Downloads 164
494 Assessment of Exploitation Vulnerability of Quantum Communication Systems with Phase Encryption

Authors: Vladimir V. Nikulin, Bekmurza H. Aitchanov, Olimzhon A. Baimuratov

Abstract:

Quantum communication technology takes advantage of the intrinsic properties of laser carriers, such as very high data rates and low power requirements, to offer unprecedented data security. Quantum processes at the physical layer of encryption are used for signal encryption with very competitive performance characteristics. The ultimate range of applications for QC systems spans from fiber-based to free-space links and from secure banking operations to mobile airborne and space-borne networking where they are subjected to channel distortions. Under practical conditions, the channel can alter the optical wave front characteristics, including its phase. In addition, phase noise of the communication source and photo-detection noises alter the signal to bring additional ambiguity into the measurement process. If quantized values of photons are used to encrypt the signal, exploitation of quantum communication links becomes extremely difficult. In this paper, we present the results of analysis and simulation studies of the effects of noise on phase estimation for quantum systems with different number of encryption bases and operating at different power levels.

Keywords: encryption, phase distortion, quantum communication, quantum noise

Procedia PDF Downloads 526
493 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 122
492 Age and Population Structure of the Goby Parapocryptes Serperaster in the Mekong Delta, Vietnam, Based on Length-Frequency and Otolith Analyses

Authors: Quang Minh Dinh, Jian Guang Qin, Sabine Dittmann, Dinh Dac Tran

Abstract:

The age and population structure the dermal gopy Parapocryptes serperaster were studied using length distributions, otolith and von Bertalanffy model in the Mekong Delta over a whole year through monthly sampling. The sex ratio of P. serperaster was near 1:1, and von Bertalanffy growth parameters were L∞= 25.2 cm, K = 0.74 yr-1, and t0 = -0.22 yr-1. Fish size at first entry to fishery was 14.6 cm, and fishing mortality (1.57 yr-1) and natural mortality (1.51 yr-1) accounted for 51% and 49% of the total mortality (3.07 yr-1), respectively. Relative yield-per-recruit and biomass-per-recruit analyses revealed the levels of maximum exploitation yield (Emax = 0.83), maximum economic yield (E0.1 = 0.71) and the yield at 50% reduction of exploitation (E0.5 = 0.37). Otoliths from 164 female and 196 male gobies were readable, and the otolith morphometry data were used for age identification. The mean age estimated by reading otolith annual rings and by analysing length frequency distribution was consistent. This study shows that the otolith morphometry is a reliable method for aging this goby and possibly also applicable for other tropical gobies. The fishery analysis indicates that this goby stock has not been overexploited in the Mekong Delta.

Keywords: Parapcryptes serperaster, otolith, age, pulation structure, Vietnam

Procedia PDF Downloads 620
491 Concerted Strategies for Sustainable Water Resource Management in Semi-Arid Rajasthan State of India

Authors: S. K. Maanju, K. Saha, Sonam Yadav

Abstract:

Rapid urbanization growth and multi-faceted regional level industrialization is posing serious threat to natural groundwater resource in State of Rajasthan which constitute major semi-arid part of India. The groundwater resources of the State are limited and cannot withstand the present rate of exploitation for quite a long time. Recharging of groundwater particularly in the western part, where annual precipitation does not exceed a few centimeters, is extremely slow and cannot replenish the exploited quantum. Hence, groundwater in most of the parts of this region has become an exhausting resource. In major parts water table is lowering down rapidly and continuously. The human beings of this semi-arid region are used to suffering from extreme climatic conditions of arid to semi-arid nature and acute shortage of water. The quality of groundwater too in many areas of this region is not up to the standards prescribed by the health organizations like WHO and BIS. This semi-arid region is one of the highly fluoride contaminated area of India as well as have excess, nitrates, sulphates, chlorides and total dissolved solids at various locations. Therefore, concerted efforts are needed towards sustainable development of groundwater in this State of India.

Keywords: Rajasthan, water, exploitation, sustainable, development and resource

Procedia PDF Downloads 320
490 A New Perspective: The Use of Low-Cost Phase Change Material in Building Envelope System

Authors: Andrey A. Chernousov, Ben Y. B. Chan

Abstract:

The use of the low-cost paraffinic phase change material can be rather effective in smart building envelopes in the South China region. Particular attention has to be paid to the PCM optimization as an exploitation conditions and the envelope insulation changes its thermal characteristics. The studied smart building envelope consists of a reinforced aluminum exterior, polymeric insulation foam, phase change material and reinforced interior gypsum board. A prototype sample was tested to validate the numerical scheme using EnergryPlus software. Three scenarios of insulation thermal resistance loss (ΔR/R = 0%, 25%, 50%) were compared with the different PCM thicknesses (tP=0, 1, 2.5, 5 mm). The comparisons were carried out for a west facing enveloped office building (50 storey). PCM optimization was applied to find the maximum efficiency for the different ΔR/R cases. It was found, during the optimization, that the PCM is an important smart component, lowering the peak energy demand up to 2.7 times. The results are not influenced by the insulation aging in terms of ΔR/R during long-term exploitation. In hot and humid climates like Hong Kong, the insulation core of the smart systems is recommended to be laminated completely. This can be very helpful in achieving an acceptable payback period.

Keywords: smart building envelope, thermal performance, phase change material, energy efficiency, large-scale sandwich panel

Procedia PDF Downloads 701
489 Trafficking of Women in Assam: The Untold Violation of Women's Human Rights

Authors: Mridula Devi

Abstract:

Trafficking of women is a slur on human dignity and a shameful act to human civilization and development. Trafficking of women is one of worst brazen abuses which violate the women’s human rights. In India, more particularly in Assam, human trafficking and infringement of human rights of individual includes mainly the women and girl child of the State. Trafficking in North East region of India, more particularly in Assam occurs in two different ways – one is the internal trafficking of women and girl child from conflict affected rural areas of Assam for domestic work and prostitution. Secondly, there is trafficking of women to other south-East Asiatic countries like Bangladesh, Bhutan, Bangkok, Myanmar (Burma) for various purposes such as drug trafficking, labor, bar girl and prostitution.Historically, trafficking in human beings is associated with slavery and bonded or forced labor. Since the period of Roman Civilization, there was the practice of traffic in persons in the form of slave trade among the nations. With the rise of new imperialism, slavery had become an integral part of the colonial system of European Countries. With time, it almost became synonymous with prostitution or commercial sexual exploitation. Finally, the United Nation adopted the Convention for the Suppression of the Traffic in Persons and of the Prostitution of others, 1949 by the G.A.Res.No.-317(iv). The Convention totally denounces the traffic in persons for the purpose of prostitution. However, it is important to note that, now a days trafficking is not confined to commercial sexual exploitation of women and children alone. It has myriad forms and the number of victims has been steadily on the rise over the past few decades. In Assam, it takes place through and for marriage, sexual exploitation, begging, organ trading, militancy conflicts, drug padding and smuggling, labour, adoption, entertainment, and sports. In this paper, empirical methodology has been used. The study is based on primary and secondary sources. Data’s are collected from different books, publications, newspaper, journals etc. For empirical analysis, some random samples are collected and systematized for better result. India suffers from the ignominy of being one of the biggest hubs of women trafficking in the world. Over the years, Assam: the north east part of India has been bearing the brunt of the rapidly rising evil of trafficking of women which threaten the life, dignity and human rights of women. Though different laws are adopted at international and national level to restore trafficking, still the menace of trafficking of women in Assam is not decreased, rather it increased. This causes a serious violation of women’s human right in Assam. Human trafficking or women’s trafficking is a serious crime against society. To curb this in Assam it is required to take some effective and dedicated measure at state level as well as national and international level.

Keywords: Assam, human trafficking, sexual exploitation, India

Procedia PDF Downloads 494
488 The Effect of Artificial Intelligence on Petroleum Industry and Production

Authors: Mina Shokry Hanna Saleh Tadros

Abstract:

The centrality of the Petroleum Industry in the world energy is undoubted. The world economy almost runs and depends on petroleum. Petroleum industry is a multi-trillion industry; it turns otherwise poor and underdeveloped countries into wealthy nations and thrusts them at the center of international diplomacy. Although these developing nations lack the necessary technology to explore and exploit petroleum resources they are not without help as developed nations, represented by their multinational corporations are ready and willing to provide both the technical and managerial expertise necessary for the development of this natural resource. However, the exploration of these petroleum resources comes with, sometimes, grave, concomitant consequences. These consequences are especially pronounced with respect to the environment. From the British Petroleum Oil rig explosion and the resultant oil spillage and pollution in New Mexico, United States to the Mobil Oil spillage along Egyptian coast, the story and consequence is virtually the same. Egypt’s delta Region produces Nigeria’s petroleum which accounts for more than ninety-five percent of Nigeria’s foreign exchange earnings. Between 1999 and 2007, Egypt earned more than $400 billion from petroleum exports. Nevertheless, petroleum exploration and exploitation has devastated the Delta environment. From oil spillage which pollutes the rivers, farms and wetlands to gas flaring by the multi-national corporations; the consequences is similar-a region that has been devastated by petroleum exploitation. This paper thus seeks to examine the consequences and impact of petroleum pollution in the Egypt Delta with particular reference on the right of the people of Niger Delta to a healthy environment. The paper further seeks to examine the relevant international, regional instrument and Nigeria’s municipal laws that are meant to protect the result of the people of the Egypt Delta and their enforcement by the Nigerian State. It is quite worrisome that the Egypt Delta Region and its people have suffered and are still suffering grave violations of their right to a healthy environment as a result of petroleum exploitation in their region. The Egypt effort at best is half-hearted in its protection of the people’s right.

Keywords: crude oil, fire, floating roof tank, lightning protection systemenvironment, exploration, petroleum, pollutionDuvernay petroleum system, oil generation, oil-source correlation, Re-Os

Procedia PDF Downloads 30
487 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 159
486 Recommendations for Environmental Impact Assessment of Geothermal Projects on Mature Oil Fields

Authors: Daria Karasalihovic Sedlar, Lucija Jukic, Ivan Smajla, Marija Macenic

Abstract:

This paper analyses possible geothermal energy production from a mature oil reservoir based on exploitation of underlying aquifer thermal energy for the purpose of heating public buildings. Research was conducted based on the case study of the City of Ivanic-Grad public buildings energy demand and Ivanic oil filed that is situated in the same area. Since the City of Ivanic is one of the few cities in the EU where hydrocarbon exploitation has been taking place for decades almost entirely in urban area, decommissioning of oil wells is inevitable; therefore, the research goal was to investigate how to extend the life-time of the reservoir by exploiting geothermal brine beneath the oil reservoir in an environmental friendly manner. This kind of a project is extremely complex in all segments, from documentation preparation, implementation of technological solutions, and providing ecological measures for environmentally acceptable geothermal energy production and utilization. New mining activities that will be needed for the development of geothermal project at the observed Hydrocarbon Exploitation Field Ivanic will be carried out in order to prepare wells for increasing geothermal brine production. These operations involve the conversion of existing wells (well completion for conversion of the observation wells to production ones) along with workover activities, installation of new heat exchangers, and pipelines. Since the wells are in the urban area of the City of Ivanic-Grad in high density populated area, the inhabitants will be exposed to the different environmental impacts during preparation phase of the project. For the purpose of performing workovers, it will be necessary to secure access to wellheads of existing wells. This paper gives guidelines for describing potential impacts on environment components that could occur during geothermal production preparation on existing mature oil filed, recommends possible protection measures to mitigate these impacts, and gives recommendations for environmental monitoring.

Keywords: geothermal energy production, mature oil filed, environmental impact assessment, underlying aquifer thermal energy

Procedia PDF Downloads 121
485 Development of Building Information Modeling in Property Industry: Beginning with Building Information Modeling Construction

Authors: B. Godefroy, D. Beladjine, K. Beddiar

Abstract:

In France, construction BIM actors commonly evoke the BIM gains for exploitation by integrating of the life cycle of a building. The standardization of level 7 of development would achieve this stage of the digital model. The householders include local public authorities, social landlords, public institutions (health and education), enterprises, facilities management companies. They have a dual role: owner and manager of their housing complex. In a context of financial constraint, the BIM of exploitation aims to control costs, make long-term investment choices, renew the portfolio and enable environmental standards to be met. It assumes a knowledge of the existing buildings, marked by its size and complexity. The information sought must be synthetic and structured, it concerns, in general, a real estate complex. We conducted a study with professionals about their concerns and ways to use it to see how householders could benefit from this development. To obtain results, we had in mind the recurring interrogation of the project management, on the needs of the operators, we tested the following stages: 1) Inculcate a minimal culture of BIM with multidisciplinary teams of the operator then by business, 2) Learn by BIM tools, the adaptation of their trade in operations, 3) Understand the place and creation of a graphic and technical database management system, determine the components of its library so their needs, 4) Identify the cross-functional interventions of its managers by business (operations, technical, information system, purchasing and legal aspects), 5) Set an internal protocol and define the BIM impact in their digital strategy. In addition, continuity of management by the integration of construction models in the operation phase raises the question of interoperability in the control of the production of IFC files in the operator’s proprietary format and the export and import processes, a solution rivaled by the traditional method of vectorization of paper plans. Companies that digitize housing complex and those in FM produce a file IFC, directly, according to their needs without recourse to the model of construction, they produce models business for the exploitation. They standardize components, equipment that are useful for coding. We observed the consequences resulting from the use of the BIM in the property industry and, made the following observations: a) The value of data prevail over the graphics, 3D is little used b) The owner must, through his organization, promote the feedback of technical management information during the design phase c) The operator's reflection on outsourcing concerns the acquisition of its information system and these services, observing the risks and costs related to their internal or external developments. This study allows us to highlight: i) The need for an internal organization of operators prior to a response to the construction management ii) The evolution towards automated methods for creating models dedicated to the exploitation, a specialization would be required iii) A review of the communication of the project management, management continuity not articulating around his building model, it must take into account the environment of the operator and reflect on its scope of action.

Keywords: information system, interoperability, models for exploitation, property industry

Procedia PDF Downloads 122
484 Dynamic Reliability for a Complex System and Process: Application on Offshore Platform in Mozambique

Authors: Raed KOUTA, José-Alcebiades-Ernesto HLUNGUANE, Eric Châtele

Abstract:

The search for and exploitation of new fossil energy resources is taking place in the context of the gradual depletion of existing deposits. Despite the adoption of international targets to combat global warming, the demand for fuels continues to grow, contradicting the movement towards an energy-efficient society. The increase in the share of offshore in global hydrocarbon production tends to compensate for the depletion of terrestrial reserves, thus constituting a major challenge for the players in the sector. Through the economic potential it represents, and the energy independence it provides, offshore exploitation is also a challenge for States such as Mozambique, which have large maritime areas and whose environmental wealth must be considered. The exploitation of new reserves on economically viable terms depends on available technologies. The development of deep and ultra-deep offshore requires significant research and development efforts. Progress has also been made in managing the multiple risks inherent in this activity. Our study proposes a reliability approach to develop products and processes designed to live at sea. Indeed, the context of an offshore platform requires highly reliable solutions to overcome the difficulties of access to the system for regular maintenance and quick repairs and which must resist deterioration and degradation processes. One of the characteristics of failures that we consider is the actual conditions of use that are considered 'extreme.' These conditions depend on time and the interactions between the different causes. These are the two factors that give the degradation process its dynamic character, hence the need to develop dynamic reliability models. Our work highlights mathematical models that can explicitly manage interactions between components and process variables. These models are accompanied by numerical resolution methods that help to structure a dynamic reliability approach in a physical and probabilistic context. The application developed makes it possible to evaluate the reliability, availability, and maintainability of a floating storage and unloading platform for liquefied natural gas production.

Keywords: dynamic reliability, offshore plateform, stochastic process, uncertainties

Procedia PDF Downloads 97
483 Recovery of the Demolition and Construction Waste, Casablanca (Morocco)

Authors: Morsli Mourad, Tahiri Mohamed, Samdi Azzeddine

Abstract:

Casablanca is the biggest city in Morocco. It concentrates more than 60% of the economic and industrial activity of the kingdom. Its building and public works (BTP) sector is the leading source of inert waste scattered in open areas. This inert waste is a major challenge for the city of Casablanca, as it is not properly managed, thus causing a significant nuisance for the environment and the health of the population. Hence the vision of our project is to recycle and valorize concrete waste. In this work, we present concrete results in the exploitation of this abundant and permanent deposit. Typical wastes are concrete, clay and concrete bricks, ceramic tiles, marble panels, gypsum, scrap metal, wood . The work performed included: geolocation with a combination of artificial intelligence and Google Earth, estimation of the amount of waste per site, sorting, crushing, grinding, and physicochemical characterization of the samples. Then, we proceeded to the exploitation of the types of substrates to be developed: light cement, coating, and glue for ceramics... The said products were tested and characterized by X-ray fluorescence, specific surface, resistance to bending and crushing, etc. We will present in detail the main results of our research work and also describe the specific properties of each material developed.

Keywords: déchets de démolition et des chantiers de construction, logiciels de combinaison SIG, valorisation de déchets inertes, enduits, ciment leger, casablanca

Procedia PDF Downloads 84
482 A Phase Change Materials Thermal Storage for Ground-Source Heat Pumps: Computational Fluid Dynamics Analysis of Innovative Layouts

Authors: Emanuele Bonamente, Andrea Aquino, Franco Cotana

Abstract:

The exploitation of the low-temperature geothermal resource via ground-source heat pumps is often limited by the high investment cost mainly due to borehole drilling. From the monitoring of a prototypal system currently used by a commercial building, it was found that a simple upgrade of the conventional layout, obtained including a thermal storage between the ground-source heat exchangers and the heat pump, can optimize the ground energy exploitation requiring for shorter/fewer boreholes. For typical applications, a reduction of up to 66% with respect to the conventional layout can be easily achieved. Results from the monitoring campaign of the prototype are presented in this paper, and upgrades of the thermal storage using phase change materials (PCMs) are proposed using computational fluid dynamics simulations. The PCM thermal storage guarantees an improvement of the system coefficient of performance both for summer cooling and winter heating (up to 25%). A drastic reduction of the storage volume (approx. 1/10 of the original size) is also achieved, making it possible to easily place it within the technical room, avoiding extra costs for underground displacement. A preliminary optimization of the PCM geometry is finally proposed.

Keywords: computational fluid dynamics (CFD), geothermal energy, ground-source heat pumps, phase change materials (PCM)

Procedia PDF Downloads 239
481 Gender Inequality and Human Trafficking

Authors: Kimberly McCabe

Abstract:

The trafficking of women and children for abuse and exploitation is not a new problem under the umbrella of human trafficking; however, over the last decade, the problem has attracted increased attention from international governments and non-profits attempting to reduce victimization and provide services for survivors. Research on human trafficking suggests that the trafficking of human beings is, largely, a symptom of poverty. As the trafficking of human beings may be viewed as a response to the demand for people for various forms of exploitation, a product of poverty, and a consequence of the subordinate positions of women and children in society, it reaches beyond randomized victimization. Hence, human trafficking, and especially the trafficking of women and children, goes beyond the realm of poorness. Therefore, to begin to understand the reasons for the existence of human trafficking, one must identify and consider not only the immediate causes but also those underlying structural determinants that facilitate this form of victimization. Specifically, one must acknowledge the economic, social, and cultural factors that support human trafficking. This research attempts to study human trafficking at the country level by focusing on economic, social, and cultural characteristics. This study focuses on inequality and, in particular, gender inequality as related to legislative attempts to address human trafficking. Within the design of this project is the use of the US State Department’s tier classification system for Trafficking in Persons (TIP) and the USA CIA Fact Sheet of country characteristics for over 150 countries in an attempt to model legal outcomes as related to human trafficking. Results of this research demonstrate the significance of characteristics beyond poverty as related to country-level responses to human trafficking.

Keywords: child trafficking, gender inequality, human trafficking, inequality

Procedia PDF Downloads 199
480 Geochemical Characterization of the Fahdene Formation in the Kef-Tedjerouine Area (Northwestern Tunisia)

Authors: Tahani Hallek, Dhaou Akrout, Riadh Ahmadi, Mabrouk Montacer

Abstract:

The present work is an organo-geochemical study of the Fahdene Formation outcrops at the Mahjouba region belonging to the Eastern part of the Kalaat Senan structure in northwestern Tunisia (the Kef-Tedjerouine area). The analytical study of the organic content of the samples collected, allowed us to point out that the Formation in question is characterized by an average to good oil potential. This fossilized organic matter has a planktonic marine origin (type II), as indicated by the relatively high values of hydrogen index. Tmax values are in the range 440°C and attest a thermal stage of the oil window beginning. Mineralogical study found the existence of macro and micro fractures that are parallel to rock stratification or oblique with a high density. Fill standpoint, the major component of the mineralized veins is the fibrous calcite with bitumen traces. The composition of these fractures is mainly due to the availability of chemical elements scattered in the surrounding rock. As for the origin of these fractures, we assume that fluid pressure processes are heavily involved, together with the regional compressional tectonic stress regime. The Fahdene Formation has a great importance in conventional oil development as a potential source rock, and even in terms of unconventional oil exploitation through the intense fracturing allowing the percolation of gas shale and facilitating its exploitation.

Keywords: fluid pressure, fracturation, oil exploration, organic matter

Procedia PDF Downloads 229
479 Assessment of Population Trends of Birds at Taunsa Barrage Wildlife Sanctuary, Pakistan

Authors: Fehmeada Bibi, Shafqat Nawaz Qaisrani, Masood Akhtar, Zulfiqar Ali

Abstract:

Population trends learning is an important tool for conservation programs in rare as well as in common species of birds. A study was conducted to assess annual decline in species of birds and to identify the causes of this decline at Taunsa Barrage wildlife Sanctuary, Punjab, Pakistan. Data were collected by direct census method during wintering and breeding periods (2001 to 2002 and 2008 to 2011). The results indicated an increasing trend in 157, whereas a decreasing trend in 14 species of birds. Among the species with declining trend, there was a 92% decrease in White-backed Vulture (Gyps bengalensis), 60% in Greater Painted Snipe (Rostratula benghalensis), 57% in Garganey (Anas querquedula), Pallas’s Fish Eagle and Long-legged Buzzard (Buteo rufinus) 50% each, 41% in Grey Heron (Ardea cinerea), 39% in Little Cormorant (Phalacrocorax niger), 37% in Gadwall (Anas strepera), 33% in Marsh Harrier (Circus aeruginosus), 30% in Black Drongo (Dicrurus macrocercus) and 26% in Red-crested Pochard (Netta rufina) population. Habitat exploitation, hunting and grazing were found the main causes of this decline. In conclusion, conservation and management of the study area is foremost to interests of declining bird population. It is suggested, therefore, to take immediate steps for the protection of the sanctuary to conserve the declining population of birds.

Keywords: population trends, wildlife sanctuary, bird, habitat exploitation

Procedia PDF Downloads 250
478 Succeeding through Disruption: Exploring the Factors Influencing the Adoption of Disruptive Technologies in the Mobile Telecommunications Industry in Zimbabwe

Authors: Africa Makasi

Abstract:

The research explored factors influencing the adoption of disruptive technologies in the mobile telecommunications industry in Zimbabwe. Data was gathered from the second biggest competitor in the industry with over 3 million subscribers as the main case of study. The survey was conducted by purposively selecting 70 respondents from a population of 3,000,000 (three million) active subscribers from the company’s database. A skip interval of 42,857 was used to randomly select the sample. Customer representatives were selected from the company’s five regional offices using a two-stage cluster sampling technique. Employee participants were purposively selected from the company’s head office. Self-administered questionnaires were used in the research. A pilot test was conducted and the assessment of the reliability of the research instruments used in the research performed. Results of the pilot study were analyzed to test for reliability using SPSS. The results confirmed that the style of leadership and its thrust may help speed up or reduce the adoption of disruptive technologies. This was reflected by a p–value of 0.01 which is less than 0.05. The null hypothesis was thus rejected and the strong relationship between leadership and adoption of disruptive technology is confirmed. Similar results were also obtained with respect to staff competence, availability of funding and the type of infrastructure available Future research should look at organizational ambidexterity as well as exploitation and exploration paradigms in organizations in the telecommunications industry and their impact on the adoption of disruptive technologies.

Keywords: disruptive innovation, adoption, mobile telecommunication industry, exploration and exploitation

Procedia PDF Downloads 337
477 The Impact of External Technology Acquisition and Exploitation on Firms' Process Innovation Performance

Authors: Thammanoon Charmjuree, Yuosre F. Badir, Umar Safdar

Abstract:

There is a consensus among innovation scholars that knowledge is a vital antecedent for firm’s innovation; e.g., process innovation. Recently, there has been an increasing amount of attention to more open approaches to innovation. This open model emphasizes the use of purposive flows of knowledge across the organization boundaries. Firms adopt open innovation strategy to improve their innovation performance by bringing knowledge into the organization (inbound open innovation) to accelerate internal innovation or transferring knowledge outside (outbound open innovation) to expand the markets for external use of innovation. Reviewing open innovation research reveals the following. First, the majority of existing studies have focused on inbound open innovation and less on outbound open innovation. Second, limited research has considered the possible interaction between both and how this interaction may impact the firm’s innovation performance. Third, scholars have focused mainly on the impact of open innovation strategy on product innovation and less on process innovation. Therefore, our knowledge of the relationship between firms’ inbound and outbound open innovation and how these two impact process innovation is still limited. This study focuses on the firm’s external technology acquisition (ETA) and external technology exploitation (ETE) and the firm’s process innovation performance. The ETA represents inbound openness in which firms rely on the acquisition and absorption of external technologies to complement their technology portfolios. The ETE, on the other hand, refers to commercializing technology assets exclusively or in addition to their internal application. This study hypothesized that both ETA and ETE have a positive relationship with process innovation performance and that ETE fully mediates the relationship between ETA and process innovation performance, i.e., ETA has a positive impact on ETE, and turn, ETE has a positive impact on process innovation performance. This study empirically explored these hypotheses in software development firms in Thailand. These firms were randomly selected from a list of Software firms registered with the Department of Business Development, Ministry of Commerce of Thailand. The questionnaires were sent to 1689 firms. After follow-ups and periodic reminders, we obtained 329 (19.48%) completed usable questionnaires. The structure question modeling (SEM) has been used to analyze the data. An analysis of the outcome of 329 firms provides support for our three hypotheses: First, the firm’s ETA has a positive impact on its process innovation performance. Second, the firm’s ETA has a positive impact its ETE. Third, the firm’s ETE fully mediates the relationship between the firm’s ETA and its process innovation performance. This study fills up the gap in open innovation literature by examining the relationship between inbound (ETA) and outbound (ETE) open innovation and suggest that in order to benefits from the promises of openness, firms must engage in both. The study went one step further by explaining the mechanism through which ETA influence process innovation performance.

Keywords: process innovation performance, external technology acquisition, external technology exploitation, open innovation

Procedia PDF Downloads 175