Search results for: armed attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 766

Search results for: armed attack

196 An Investigation into the Use of an Atomistic, Hermeneutic, Holistic Approach in Education Relating to the Architectural Design Process

Authors: N. Pritchard

Abstract:

Within architectural education, students arrive fore-armed with; their life-experience; knowledge gained from subject-based learning; their brains and more specifically their imaginations. The learning-by-doing that they embark on in studio-based/project-based learning calls for supervision that allows the student to proactively undertake research and experimentation with design solution possibilities. The degree to which this supervision includes direction is subject to debate and differing opinion. It can be argued that if the student is to learn-by-doing, then design decision making within the design process needs to be instigated and owned by the student so that they have the ability to personally reflect on and evaluate those decisions. Within this premise lies the problem that the student's endeavours can become unstructured and unfocused as they work their way into a new and complex activity. A resultant weakness can be that the design activity is compartmented and not holistic or comprehensive, and therefore, the student's reflections are consequently impoverished in terms of providing a positive, informative feedback loop. The construct proffered in this paper is that a supportive 'armature' or 'Heuristic-Framework' can be developed that facilitates a holistic approach and reflective learning. The normal explorations of architectural design comprise: Analysing the site and context, reviewing building precedents, assimilating the briefing information. However, the student can still be compromised by 'not knowing what they need to know'. The long-serving triad 'Firmness, Commodity and Delight' provides a broad-brush framework of considerations to explore and integrate into good design. If this were further atomised in subdivision formed from the disparate aspects of architectural design that need to be considered within the design process, then the student could sieve through the facts more methodically and reflectively in terms of considering their interrelationship conflict and alliances. The words facts and sieve hold the acronym of the aspects that form the Heuristic-Framework: Function, Aesthetics, Context, Tectonics, Spatial, Servicing, Infrastructure, Environmental, Value and Ecological issues. The Heuristic could be used as a Hermeneutic Model with each aspect of design being focused on and considered in abstraction and then considered in its relation to other aspect and the design proposal as a whole. Importantly, the heuristic could be used as a method for gathering information and enhancing the design brief. The more poetic, mysterious, intuitive, unconscious processes should still be able to occur for the student. The Heuristic-Framework should not be seen as comprehensive prescriptive formulaic or inhibiting to the wide exploration of possibilities and solutions within the architectural design process.

Keywords: atomistic, hermeneutic, holistic, approach architectural design studio education

Procedia PDF Downloads 236
195 Root Cause Analysis of Surveillance Quality in Tanjung Priok Port to Prevent Epidemic Potential Disease as a Form of Bioterrorism Threat

Authors: Dina A. Amu, Fifi N. Afifah, Catur Rosidati, Tirton Nefianto

Abstract:

Indonesia was shaken up by the avian influenza cases that had caused the country suffered losses of millions of dollars. The avian influenza case had even been suspected as a bioterrorism attack since it was an uncommon case in epidemiology. Furthermore, this avian influenza virus is a high pathogenic one and Indonesia has the highest case of fatality rate in the world. Bioterrorism threats or epidemic potential disease outbreaks currently does not exist in Tanjung Priok port yet. However, the surveillance system enhancement on epidemic potential diseases should be taken as a prevention, especially because Indonesia is currently facing the ASEAN Economic Society (AES). Therefore, this research evaluates the health surveillance system which is organized by Control, Quarantine and Surveillance Department, Health Office of Tanjung Priok Port. This study uses qualitative-evaluative method which utilizes Urgency Seriousness Growth (USG) method to determine priority issues and Root Cause analysis to determine the cause of prior problem. The result of this research shows that the implementation of epidemic potential disease surveillance in Tanjung Priok port has not done in the best possible way. It is because the lack of time allocation and the succinctness of the check list of ship's environmental health inspection. Therefore, Health Ministry of Indonesia should recruit more employees at the health office of Tanjung Priok port, hold a simulation of ship's inspection and simplify the list for ship's environmental health inspection.

Keywords: surveillance, epidemic potential disease, port health, bioterrorism

Procedia PDF Downloads 338
194 Framing Mahsa Amini and Iran Protest: A Comparative Analysis of Tehran times and the Wall Street Journal

Authors: Nimmy Maria Joseph, Muhammed Hafiludheen

Abstract:

On September 16, a 22-year-old Iranian woman, Mahsa Amini, died in Tehran after she was arrested by the ‘Morality police’ for an accusation of not wearing a hijab according to the standards laid down by the Iran Government. Suspicions aroused as the incident happened while Mahsa Amini was under the custody of Iran police. People of Iran accused that she was severely beaten up by the police, which led to her death. This initiated an array of women-led protests in Iran, leading to the ignition of massive uproars in the country. The Law Enforcement Command of Iran reported that she collapsed due to a heart attack and not due to police brutality. However, as a result, Iran faced a series of conflicts between the Government of Iran and the civilians, especially women. The research paper presents the framing analysis of online news stories on Mahsa Amini’s death and the resultant protest in Iran. The researcher analysed the online news stories of two popular newspapers, Tehran Times (Iran) and The Wall Street Journal (USA). The focus of the study is to have a comparative analysis of the frames of the news stories used and find out their agenda-setting pattern. It helps to comprehend how the news stories of popular news organisations try to channelise the perception of their audience on social issues. The researcher analysed the news stories considering their frames, valence, polysemy, rhetoric devices, and technical devices.

Keywords: mahsa amini, iran protest, framing analysis, valence, rhetoric device, tehran times, the wall street journal

Procedia PDF Downloads 69
193 Comparative Study of the Abundance of Winter Nests of the Pine Processionary Caterpillar in Different Forests of Pinus Halepensis, pinus Pinaster, Pinus Pinea and Cedrus Atlantica, in Algeria

Authors: Boudjahem Ibtissem, Aouati Amel

Abstract:

Thaumetopoea pityocampa is one of the major insect pests of pine forests in Algeria, the Mediterranean region, and central Europe. This pest is responsible for several natural and human damages these last years. The caterpillar can feed itself during the larval stage on several species of pine or cedar. The forests attack by the insect can reduce their resistance against other forest enemies, fires, or drought conditions. In this case, the tree becomes more vulnerable to other pests. To understand the eating behavior of the insect in its ecological conditions, and its nutritional preference, we realized a study of the abundance of winter nests of the pine processionary caterpillar in four different forests: Pinus halepensis; Pinus pinaster; Pinus pinea, and Cedrus atlantica. A count of the sites affected by the processionary caterpillar was carried out on a hundred trees from the forests in different regions in Algeria; Alkala region, Mila region, Annaba region, and Blida region; the total rate and average abundance are calculated for each forest. Ecological parameters are also estimated for each infestation. The results indicated a higher rate of infestation in Pinus halepensis trees (85%) followed by Cedrus atlantica (66%) and Pinus pinaster (50%) trees. The Pinus pinea forest is the least attacked region by the pine processionary caterpillar (23%). The abundance of the pine processionary caterpillar can be influenced by the height of the trees, the climate of the region, the age of the forest but also the quality of needles.

Keywords: Thaumetopoea pityocampa, Pinus halepensis, needles, winter nests

Procedia PDF Downloads 127
192 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country

Authors: Meszár Tárik

Abstract:

The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.

Keywords: Middle East, Iraq, Islamic State, minorities

Procedia PDF Downloads 63
191 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 501
190 Performance of Autoclaved Aerated Concrete Containing Recycled Ceramic and Gypsum Waste as Partial Replacement for Sand

Authors: Efil Yusrianto, Noraini Marsi, Noraniah Kassim, Izzati Abdul Manaf, Hafizuddin Hakim Shariff

Abstract:

Today, municipal solid waste (MSW), noise pollution, and attack fire are three ongoing issues for inhabitants of urban including in Malaysia. To solve these issues, eco-friendly autoclaved aerated concrete (AAC) containing recycled ceramic and gypsum waste (CGW) as a partial replacement for sand with different ratios (0%, 5%, 10%, 15%, 20%, and 25% wt) has been prepared. The performance of samples, such as the physical, mechanical, sound absorption coefficient, and direct fire resistance, has been investigated. All samples showed normal color behavior, i.e., grey and free crack. The compressive strength was increased in the range of 6.10% to 29.88%. The maximum value of compressive strength was 2.13MPa for 15% wt of CGW. The positive effect of CGW on the compressive strength of AAC has also been confirmed by crystalline phase and microstructure analysis. The acoustic performances, such as sound absorption coefficients of samples at low frequencies (500Hz), are higher than the reference sample (RS). AAC-CGW samples are categorized as AAC material classes B and C. The fire resistance results showed the physical surface of the samples had a free crack and was not burned during the direct fire at 950ºC for 300s. The results showed that CGW succeeded in enhancing the performance of fresh AAC, such as compressive strength, crystalline phase, sound absorption coefficient, and fire resistance of samples.

Keywords: physical, mechanical, acoustic, direct fire resistance performance, autoclaved aerated concrete, recycled ceramic-gypsum waste

Procedia PDF Downloads 97
189 Aeroacoustics Investigations of Unsteady 3D Airfoil for Different Angle Using Computational Fluid Dynamics Software

Authors: Haydar Kepekçi, Baha Zafer, Hasan Rıza Güven

Abstract:

Noise disturbance is one of the major factors considered in the fast development of aircraft technology. This paper reviews the flow field, which is examined on the 2D NACA0015 and 3D NACA0012 blade profile using SST k-ω turbulence model to compute the unsteady flow field. We inserted the time-dependent flow area variables in Ffowcs-Williams and Hawkings (FW-H) equations as an input and Sound Pressure Level (SPL) values will be computed for different angles of attack (AoA) from the microphone which is positioned in the computational domain to investigate effect of augmentation of unsteady 2D and 3D airfoil region noise level. The computed results will be compared with experimental data which are available in the open literature. As results; one of the calculated Cp is slightly lower than the experimental value. This difference could be due to the higher Reynolds number of the experimental data. The ANSYS Fluent software was used in this study. Fluent includes well-validated physical modeling capabilities to deliver fast, accurate results across the widest range of CFD and multiphysics applications. This paper includes a study which is on external flow over an airfoil. The case of 2D NACA0015 has approximately 7 million elements and solves compressible fluid flow with heat transfer using the SST turbulence model. The other case of 3D NACA0012 has approximately 3 million elements.

Keywords: 3D blade profile, noise disturbance, aeroacoustics, Ffowcs-Williams and Hawkings (FW-H) equations, k-ω-SST turbulence model

Procedia PDF Downloads 184
188 Chaupadi Practice: A Cruel Discrimination against Women a Case Study of Achham District of Nepal

Authors: Santosh Thapa, Sankar Gurung

Abstract:

Chaupadi is a tradition widely practiced in the far and mid-western region of Nepal. It is a practice where girls and women are not allowed to inter the house and touch the food, water and milk during their menstruation period of 4-7 days. They have to spend all the nights during the period in a specific hut (Chhaupadi Goth) which is a bit far from their residence where they faces various kinds of risk and violence like bullying, snakes and insect bite, wild animal attack etc. Sometimes the girls even do not go to school during their menstruation periods. After childbirth, the woman must stay in a cow shed for 11 days in such Chhaupadi practiced areas. This study limits the Achham district of the far western region which is the most vulnerable Chhaupadi practicing district. Several governmental and non-governmental organizations have been involving and spending huge amount of money for capacity building and awareness raising campaign for last 2 decades but still 9 out of 75 Village Development Committees (VDCs) have been partially practicing Chaupadi in the district. This study shows that the school attendance rate of the girls during the period have visibly increased which helps to increase the number of the girl graduation as well. Similarly, the practice of Chhaupadi is one of the reasons for increasing the number of cases of uterus prolapsus and poor reproductive health of women and girls. Triggering tools are the one of the best ways to accelerate the awareness campaign in the VDCs. This study recommends that the local bodies should coordinate and lead the overall awareness campaign program to sustain the Chaupadi free VDCs.

Keywords: awareness campaign, chaupadi practice, gender discrimination, violence

Procedia PDF Downloads 282
187 Synthesis of Montmorillonite/CuxCd1-xS Nanocomposites and Their Application to the Photodegradation of Methylene Blue

Authors: H. Boukhatem, L. Djouadi, H. Khalaf, R. M. Navarro, F. V. Ganzalez

Abstract:

Synthetic organic dyes are used in various industries, such as textile industry, leather tanning industry, paper production, hair dye production, etc. Wastewaters containing these dyes may be harmful to the environment and living organisms. Therefore, it is very important to remove or degrade these dyes before discharging them into the environment. In addition to standard technologies for the degradation and/or removal of dyes, several new specific technologies, the so-called advanced oxidation processes (AOPs), have been developed to eliminate dangerous compounds from polluted waters. AOPs are all characterized by the same chemical feature: production of radicals (•OH) through a multistep process, although different reaction systems are used. These radicals show little selectivity of attack and are able to oxidize various organic pollutants due to their high oxidative capacity (reduction potential of HO• Eo = 2.8 V). Heterogeneous photocatalysis, as one of the AOPs, could be effective in the oxidation/degradation of organic dyes. A major advantage of using heterogeneous photocatalysis for this purpose is the total mineralization of organic dyes, which results in CO2, H2O and corresponding mineral acids. In this study, nanomaterials based on montmorillonite and CuxCd1-xS with different Cu concentration (0.3 < x < 0.7) were utilized for the degradation of the commercial cationic textile dye Methylene blue (MB), used as a model pollutant. The synthesized nanomaterials were characterized by fourier transform infrared (FTIR) and thermogravimetric-differential thermal analysis (TG–DTA). Test results of photocatalysis of methylene blue under UV-Visible irradiation show that the photoactivity of nanomaterials montmorillonite/ CuxCd1-xS increases with the increasing of Cu concentration. The kinetics of the degradation of the MB dye was described with the Langmuir–Hinshelwood (L–H) kinetic model.

Keywords: heterogeneous photocatalysis, methylene blue, montmorillonite, nanomaterial

Procedia PDF Downloads 345
186 Working Conditions and Occupational Health: Analyzing the Stressing Factors in Outsourced Employees

Authors: Cledinaldo A. Dias, Isabela C. Santos, Marcus V. S. Siqueira

Abstract:

In the contemporary globalization, the competitiveness generated in the search of new markets aiming at the growth of productivity and, consequently, of profits, implies the redefinition of productive processes and new forms of work organization. As a result of this structuring, unemployment, labor force turnover and the increase in outsourcing and informal work occur. Considering the different relationships and working conditions of outsourced employees, this study aims to identify the most present stressors among outsourced service providers from a Federal Institution of Higher Education in Brazil. To reach this objective, a descriptive exploratory study with a quantitative approach was carried out. The qualitative approach was chosen to provide an in-depth analysis of the occupational conditions of outsourced workers since this method seeks to focus on the social as a world of investigated meanings and the language or speech of each subject as the object of this approach. The survey was conducted in the city of Montes Claros - Minas Gerais (Brazil) and involved eighty workers from companies hired by the institution, including armed security guards, porters, cleaners, drivers, gardeners, and administrative assistants. The choice of professionals obeyed non-probabilistic criteria for convenience or accessibility. Data collection was performed by means of a structured questionnaire composed of sixty questions, in a Likert-type frequency interval scale format, in order to identify potential organizational stressors. The results obtained evidence that the stress factors pointed out by the workers are, in most cases, a determining factor due to the low productive performance at work. Amongst the factors associated with stress, the ones that stood out most were those related to organizational communication failures, the incentive to competition, lack of expectations of professional growth, insecurity and job instability. Based on the results, the need for greater concern and organizational responsibility with the well-being and mental health of the outsourced worker and the recognition of their physical and psychological limitations, and care that goes beyond the functional capacity for the work. Specifically for the preservation of mental health, physical and quality of life, it is concluded that it is necessary for the professional to be inserted in the external world that favors it internally since this set is complemented so that the individual remains in balance and obtain satisfaction in your work.

Keywords: occupational health, outsourced, organizational studies, stressors

Procedia PDF Downloads 74
185 Opinion Mining to Extract Community Emotions on Covid-19 Immunization Possible Side Effects

Authors: Yahya Almurtadha, Mukhtar Ghaleb, Ahmed M. Shamsan Saleh

Abstract:

The world witnessed a fierce attack from the Covid-19 virus, which affected public life socially, economically, healthily and psychologically. The world's governments tried to confront the pandemic by imposing a number of precautionary measures such as general closure, curfews and social distancing. Scientists have also made strenuous efforts to develop an effective vaccine to train the immune system to develop antibodies to combat the virus, thus reducing its symptoms and limiting its spread. Artificial intelligence, along with researchers and medical authorities, has accelerated the vaccine development process through big data processing and simulation. On the other hand, one of the most important negatives of the impact of Covid 19 was the state of anxiety and fear due to the blowout of rumors through social media, which prompted governments to try to reassure the public with the available means. This study aims to proposed using Sentiment Analysis (AKA Opinion Mining) and deep learning as efficient artificial intelligence techniques to work on retrieving the tweets of the public from Twitter and then analyze it automatically to extract their opinions, expression and feelings, negatively or positively, about the symptoms they may feel after vaccination. Sentiment analysis is characterized by its ability to access what the public post in social media within a record time and at a lower cost than traditional means such as questionnaires and interviews, not to mention the accuracy of the information as it comes from what the public expresses voluntarily.

Keywords: deep learning, opinion mining, natural language processing, sentiment analysis

Procedia PDF Downloads 146
184 The Role of Physical Education and Fitness for Active Ageing

Authors: A. Lakshya

Abstract:

The main aim of this paper is to interpret physical education for children from 5 to 18 years. Schools have the ability to promote positive mental health by developing physical education, which helps to build individual growth, goal setting, decision making, helps in muscular development, self-discipline, stresses relief, leadership qualities that can arise with new skills, prosocial behavior and problem-solving skills. But mostly the children at these early ages ought to hold the disorders as heart attack, diabetes and obesity disorders may increase in large number. The data of P.E has got a very least place, where children are with feeble minds and they acquired a state of inactiveness. Globally, 81% of adolescents aged 11-18 years were insufficiently physically active in the year 2016. Adolescent girls were less active than boys, with the percentage of 85% vs. 78% as well. A recent study of California schools found that students are sedentary most of the time during PE classes, with just four minutes of every half-hour spent in vigorous physical activity. Additionally, active PE time decreases with larger class sizes. Students in classes with more than forty-five students are half as active as students in smaller class sizes. The children in adolescence age they acquire more creative ideas hence they create new hairstyles, cooking styles and dressing styles. Instead, all the children are engaging themselves to TV (television) and video games. The development of physical quality not only improves students ’ physical fitness but is also conducive to the psychological development of the students. Physical education teaching should pay more attention to the training of physical quality in the future.

Keywords: physical education, prosocial behavior, leadership, goal setting

Procedia PDF Downloads 114
183 Mob Justice in Ghana: Implication for Peace

Authors: Ishaq Alhassan Meriga

Abstract:

This study examined the phenomenon of mob violence and its implication for peace in Ghana. The study used the archival study of media reports and content analysis of other secondary data as well as eyewitness accounts. The study examined trends and patterns of vigilante violence within the Ghanaian context. Results showed a considerable increase in the occurrence of mob violence within the last 10 years. Theft and robbery emerged as the most frequently suspected crimes for which victims were attacked, while the LGBT community is not left out. Cases of mob violence were most frequently reported in urban areas. This study has shown that the patterns, scope, nature, and implication of mob justice in Ghana are fairly and comparatively similar to those found in other parts of Africa and the globe. Mob violence is identified as undermining the rule of law and thereby infringing on the fundamental human rights of the victims. It is confirmed to have a cycle of effects that is an impediment to the peace of the country. The study underscores the implications of mob violence in terms of disdaining human life and dignity, revisiting our justice systems and punishment procedures, resourcing, and empowering law enforcers to fight the menace of vigilantism. First, the archival study had a limitation regarding missing data. The majority of the cases used for the study lack information mostly on perpetrators and the steps taken by public authorities and security agencies after reports of a mob attack have been lodged with them. The study recommends for further research to be undertaken on the perpetrators and survivors of mob actions in order to get a holistic understanding of the phenomenon. This will give a more comprehensive view of the issue of mob violence in Ghana. From the findings, it can be concluded that mob justice is a social canker in Ghanaian communities, which has a great impact on the peace of the country.

Keywords: LGBT, mob justice, peace, vigilantism

Procedia PDF Downloads 44
182 The Effect of Geographical Differentials of Epidemiological Transition on Health-Seeking Behavior in India

Authors: Sumit Kumar Das, Laishram Ladusingh

Abstract:

Aim: The aim of the study is to examine the differential of epidemiological transition across fifteen agro-climatic zones of India and its effect on health-seeking behavior. Data and Methods: Unit level data on consumption expenditure on health of India from three decadal rounds conducted by National Sample Survey Organization are used for the analysis. These three rounds are 52nd (1995-96), 60th (2004-05) and 71st (2014-15). The age-adjusted prevalence rate for communicable diseases and non-communicable diseases are estimated for fifteen agro-climatic zones of India for three time periods. Bivariate analysis is used to find out determinants of health-seeking behavior. Multilevel logistic regression is used to examine factors effecting on household health-seeking behavior. Result: The prevalence of communicable diseases is increasing in most of the zones of India. Every South Indian zones, Gujarat plains, and lower Gangetic plain are facing the severe attack of dual burden of diseases. Demand for medical advice has increased in southern zones, and east zones, reliance on private healthcare facilities are increasing in most of the zone. Demographic characteristics of the household head have a significant impact on health-seeking behavior. Conclusion: Proper program implementation is required considering the disease prevalence and differential in the pattern of health seeking behavior. Along with initiation and strengthening of programs for non-communicable, existing programs for communicable diseases need to monitor and supervised strictly.

Keywords: agro-climatic zone, epidemiological transition, health-seeking behavior, multilevel regression

Procedia PDF Downloads 156
181 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 255
180 Expounding the Evolution of the Proto-Femme Fatale and Its Correlation with the New Woman: A Close Study of David Mamet's Oleanna

Authors: Silvia Elias

Abstract:

The 'Femme Fatale' figure has become synonymous with a mysterious and seductive woman whose charms captivate her lovers into bonds of irresistible desire, often leading them to compromise or downfall. Originally, a Femme Fatale typically uses her beauty to lead men to their destruction but in modern literature, she represents a direct attack on traditional womanhood and the nuclear family as she refuses to abide by the pillars of mainstream society creating an image of a strong independent woman who defies the control of men and rejects the institution of the family. This research aims at discussing the differences and similarities between the femme fatale and the New Woman and how they are perceived by the audience. There is often confusion between the characteristics that define a New Woman and a Femme Fatale since both women desire independence, challenge typical gender role casting, push against the limits of the patriarchal society and take control of their sexuality. The study of the femme fatale remains appealing in modern times because the fear of gender equality gives life to modern femme fatale versions and post-modern literary works introduce their readers to new versions of the deadly seductress. One that does not fully depend on her looks to destroy men. The idea behind writing this paper was born from reading David Mamet's two-character play Oleanna (1992) and tracing the main female protagonist/antagonist's transformation from a helpless inarticulate girl into a powerful controlling negotiator who knows how to lead a bargain and maintain the upper hand.

Keywords: Circe, David, Eve, evolution, feminist, femme fatale, gender, Mamet, new, Odysseus, Oleanna, power, Salome, schema, seduction, temptress, woman

Procedia PDF Downloads 415
179 The Image of Victim and Criminal in Love Crimes on Social Media in Egypt: Facebook Discourse Analysis

Authors: Sherehan Hamdalla

Abstract:

Egypt has experienced a series of terrifying love crimes in the last few months. This ‘trend’ of love crimes started with a young man caught on video slaughtering his ex-girlfriend in the street in the city of El Mansoura. The crime shocked all Egyptian citizens at all levels; unfortunately, not less than three similar crimes took place in other different Egyptian cities with the same killing trigger. The characteristics and easy access and reach of social media consider the reason why it is one of the most crucial online communication channels; users utilize social media platforms for sharing and exchanging ideas, news, and many other activities; they can freely share posts that reflect their mindset or personal views regarding any issues, these posts are going viral in all social media account by reposting or numbers of shares for these posts to support the content included, or even to attack. The repetition of sharing certain posts could mobilize other supporters with the same point of view, especially when that crowd’s online participation is confronting a public opinion case’s consequences. The death of that young woman was followed by similar crimes in other cities, such as El Sharkia and Port Said. These love crimes provoked a massive wave of contention among all social classes in Egypt. Strangely, some were supporting the criminal and defending his side for several reasons, which the study will uncover. Facebook, the most popular social media platform for Egyptians, reflects the debate between supporters of the victim and supporters of the criminal. Facebook pages were created specifically to disseminate certain viewpoints online, for example, asking for the maximum penalty to be given to criminals. These pages aimed to mobilize the maximum number of supporters and to affect the outcome of the trials.

Keywords: love crimes, victim, criminal, social media

Procedia PDF Downloads 49
178 The Effect of Transparent Oil Wood Stain on the Colour Stability of Spruce Wood during Weathering

Authors: Eliska Oberhofnerova, Milos Panek, Stepan Hysek, Martin Lexa

Abstract:

Nowadays the use of wood, both indoors and outdoors, is constantly increasing. However wood is a natural organic material and in the exterior is subjected to a degradation process caused by abiotic factors (solar radiation, rain, moisture, wind, dust etc.). This process affects only surface layers of wood but neglecting some of the basic rules of wood protection leads to increased possibility of biological agents attack and thereby influences a function of the wood element. The process of wood degradation can be decreased by proper surface treatment, especially in the case of less naturally durable wood species, as spruce. Modern coating systems are subjected to many requirements such as colour stability, hydrophobicity, low volatile organic compound (VOC) content, long service life or easy maintenance. The aim of this study is to evaluate the colour stability of spruce wood (Picea abies), as the basic parameter indicating the coating durability, treated with two layers of transparent natural oil wood stain and exposed to outdoor conditions. The test specimens were exposed for 2 years to natural weathering and 2000 hours to artificial weathering in UV-chamber. The colour parameters were measured before and during exposure to weathering by the spectrophotometer according to CIELab colour space. The comparison between untreated and treated wood and both testing procedures was carried out. The results showed a significant effect of coating on the colour stability of wood, as expected. Nevertheless, increasing colour changes of wood observed during the exposure to weathering differed according to applied testing procedure - natural and artificial.

Keywords: colour stability, natural and artificial weathering, spruce wood, transparent coating

Procedia PDF Downloads 195
177 University Under Terror: Explaining the Deviant Activities in the Tribhuvan University

Authors: Tek Nath Subedi

Abstract:

Violent activities used previously to erupt in specific societies owing to unequal, oppressive and unjust social practices have crossed out of their usual place of occurrence and entered the peace-zones such as schools and universities. The recent history of Universities in Nepal is marked with violent activities of students targeting to professors and other university officials. A student in a university is supposed to involve in scholarly activities and cooperate the teacher so as to achieve the academic degree and to enhance knowledge. Besides, the relationship between a teacher and a student is supposed to be the most sacred, which, in other words, is explained as the relationship between deity and devotee in a spiritual ground, carer and the kid in a moral ground, and mutually dependent in a functionalist view. Above all, the interdependence between teacher and student is illustrated as the two sides of the same coin. But the targeted attack on teachers and the degrading relationship between university and students raises serious questions on what makes a student violent and why the academia is terrorized. Therefore, this research aims to find the nexus of deviant activities of students to other social, political, economic and cultural areas of their life. To find possible answer of a few analytical questions, this paper takes an in-depth interview into consideration based on a snowball sampling and inquires some professors and officials how and why they are terrorized. It also reaches to some students who have witnessed or been part of any terror, following the same research method and ask them why violence has become recurring in the university and how university can be converted into a peace-zone. This research has simply hypothesized that the terror-inspired activities carried out by students in the university are the extended version of their deviant activities out of the university premises. But, it was found that the deviant activities of students were connected in particular to their culture and political identity.

Keywords: deviance, relationship, student, teacher, terror, university

Procedia PDF Downloads 40
176 Polymerization of Epsilon-Caprolactone Using Lipase Enzyme for Medical Applications

Authors: Sukanya Devi Ramachandran, Vaishnavi Muralidharan, Kavya Chandrasekaran

Abstract:

Polycaprolactone is polymer belonging to the polyester family that has noticeable characteristics of biodegradability and biocompatibility which is essential for medical applications. Polycaprolactone is produced by the ring opening polymerization of the monomer epsilon-Caprolactone (ε-CL) which is a closed ester, comprising of seven-membered ring. This process is normally catalysed by metallic components such as stannous octoate. It is difficult to remove the catalysts after the reaction, and they are also toxic to the human body. An alternate route of using enzymes as catalysts is being employed to reduce the toxicity. Lipase enzyme is a subclass of esterase that can easily attack the ester bonds of ε-CL. This research paper throws light on the extraction of lipase from germinating sunflower seeds and the activity of the biocatalyst in the polymerization of ε-CL. Germinating Sunflower seeds were crushed with fine sand in phosphate buffer of pH 6.5 into a fine paste which was centrifuged at 5000rpm for 10 minutes. The clear solution of the enzyme was tested for activity at various pH ranging from 5 to 7 and temperature ranging from 40oC to 70oC. The enzyme was active at pH6.0 and at 600C temperature. Polymerization of ε-CL was done using toluene as solvent with the catalysis of lipase enzyme, after which chloroform was added to terminate the reaction and was washed in cold methanol to obtain the polymer. The polymerization was done by varying the time from 72 hours to 6 days and tested for the molecular weight and the conversion of the monomer. The molecular weight obtained at 6 days is comparably higher. This method will be very effective, economical and eco-friendly to produce as the enzyme used can be regenerated as such at the end of the reaction and can be reused. The obtained polymers can be used for drug delivery and other medical applications.

Keywords: lipase, monomer, polycaprolactone, polymerization

Procedia PDF Downloads 272
175 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 80
174 Time-Domain Expressions for Bridge Self-Excited Aerodynamic Forces by Modified Particle Swarm Optimizer

Authors: Hao-Su Liu, Jun-Qing Lei

Abstract:

This study introduces the theory of modified particle swarm optimizer and its application in time-domain expressions for bridge self-excited aerodynamic forces. Based on the indicial function expression and the rational function expression in time-domain expression for bridge self-excited aerodynamic forces, the characteristics of the two methods, i.e. the modified particle swarm optimizer and conventional search method, are compared in flutter derivatives’ fitting process. Theoretical analysis and numerical results indicate that adopting whether the indicial function expression or the rational function expression, the fitting flutter derivatives obtained by modified particle swarm optimizer have better goodness of fit with ones obtained from experiment. As to the flutter derivatives which have higher nonlinearity, the self-excited aerodynamic forces, using the flutter derivatives obtained through modified particle swarm optimizer fitting process, are much closer to the ones simulated by the experimental. The modified particle swarm optimizer was used to recognize the parameters of time-domain expressions for flutter derivatives of an actual long-span highway-railway truss bridge with double decks at the wind attack angle of 0°, -3° and +3°. It was found that this method could solve the bounded problems of attenuation coefficient effectively in conventional search method, and had the ability of searching in unboundedly area. Accordingly, this study provides a method for engineering industry to frequently and efficiently obtain the time-domain expressions for bridge self-excited aerodynamic forces.

Keywords: time-domain expressions, bridge self-excited aerodynamic forces, modified particle swarm optimizer, long-span highway-railway truss bridge

Procedia PDF Downloads 292
173 Rhizosphere Microbiome Involvement in the Natural Suppression of Soybean Cyst Nematode in Disease Suppressive Soil

Authors: M. Imran Hamid, Muzammil Hussain, Yunpeng Wu, Meichun Xiang, Xingzhong Liu

Abstract:

The rhizosphere microbiome elucidate multiple functioning in the soil suppressiveness against plant pathogens. Soybean rhizosphere microbial communities may involve in the natural suppression of soybean cyst nematode (SCN) populations in disease suppressive soils. To explore these ecological mechanisms of microbes, a long term monoculture suppressive soil were taken into account for further investigation to test the disease suppressive ability by using different treatments. The designed treatments are as, i) suppressive soil (S), ii) conducive soil (C), iii) conducive soil mixed with 10% (w/w) suppressive soil (CS), iv) suppressive soil treated at 80°C for 1 hr (S80), and v) suppressive soil treated with formalin (SF). By using an ultra-high-throughput sequencing approach, we identified the key bacterial and fungal taxa involved in SCN suppression. The Phylum-level investigation of bacteria revealed that Actinobacteria, Bacteroidetes, and Proteobacteria in the rhizosphere soil of soybean seedlings were more abundant in the suppressive soil than in the conducive soil. The phylum-level analysis of fungi in rhizosphere soil indicated that relative abundance of Ascomycota was higher in suppressive soil than in the conducive soil, where Basidiomycota was more abundant. Transferring suppressive soil to conducive soil increased the population of Ascomycota in the conducive soil by lowering the populations of Basidiomycota. The genera, such as, Pochonia, Purpureocillium, Fusarium, Stachybotrys that have been well documented as bio-control agents of plant nematodes were far more in the disease suppressive soils. Our results suggested that the plants engage a subset of functional microbial groups in the rhizosphere for initial defense upon nematode attack and protect the plant roots later on by nematodes to response for suppression of SCN in disease-suppressive soils.

Keywords: disease suppressive soil, high-throughput sequencing, rhizosphere microbiome, soybean cyst nematode

Procedia PDF Downloads 128
172 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 136
171 Fast Aerodynamic Evaluation of Transport Aircraft in Early Phases

Authors: Xavier Bertrand, Alexandre Cayrel

Abstract:

The early phase of an aircraft development is instrumental as it really drives the potential of a new concept. Any weakness in the high-level design (wing planform, moveable surfaces layout etc.) will be extremely difficult and expensive to recover later in the aircraft development process. Aerodynamic evaluation in this very early development phase is driven by two main criteria: a short lead-time to allow quick iterations of the geometrical design, and a high quality of the calculations to get an accurate & reliable assessment of the current status. These two criteria are usually quite contradictory. Actually, short lead time of a couple of hours from end-to-end can be obtained with very simple tools (semi-empirical methods for instance) although their accuracy is limited, whereas higher quality calculations require heavier/more complex tools, which obviously need more complex inputs as well, and a significantly longer lead time. At this point, the choice has to be done between accuracy and lead-time. A brand new approach has been developed within Airbus, aiming at obtaining quickly high quality evaluations of the aerodynamic of an aircraft. This methodology is based on a joint use of Surrogate Modelling and a lifting line code. The Surrogate Modelling is used to get the wing sections characteristics (e.g. lift coefficient vs. angle of attack), whatever the airfoil geometry, the status of the moveable surfaces (aileron/spoilers) or the high-lift devices deployment. From these characteristics, the lifting line code is used to get the 3D effects on the wing whatever the flow conditions (low/high Mach numbers etc.). This methodology has been applied successfully to a concept of medium range aircraft.

Keywords: aerodynamics, lifting line, surrogate model, CFD

Procedia PDF Downloads 321
170 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 60
169 The Shrinking Nature of Parliamentary Immunity in Kenya: A Proposal for Judicial Restraint

Authors: Oscar Sang, Shadrack David Rotich

Abstract:

Parliamentary immunity is grounded on the notion that parliaments need certain rights or immunities to ensure they can operate independently make fair and impartial decisions without capitulating to political pressure or intimidation. The 2013 election in Kenya marked an important milestone in the development of the law of parliamentary privilege. Such importance relates to the dramatic increase in the number of legislatures in the country from one unicameral parliament, to a bicameral national parliament and forty-seven other regional legislative assemblies. The increase in legislatures has resulted in a dramatic increase in political contestations which have led to legal wrangles. The judiciary in Kenya, once considered submissive, has been invited to arbitrate on various matters pitting individual rights and parliamentary privilege and have invalidated a number of legislative action. While judicial intervention is indeed necessary to ensure that legislatures in Kenya live true to the constitutional aspirations of the Kenyan people, certain judicial decisions have had an effect on eroding parliamentary immunity. This paper highlights a number of instances in which it could be argued that parliamentary privilege came under attack by the courts in Kenya. The paper aims to make a case that while Kenya’s progressive constitution necessitates the scope and extent of legislature’s immunities and privilege to be determined by the courts, it is important that courts exercise restraint in its review of legislative action. The paper makes the argument that unrestrained judicial action in Kenya on questions within the realm parliamentary privilege may undermine the functioning of Kenya’s legislatures. The paper explores approaches taken by a number of jurisdictions in establishing a proper balance between maintaining a viable parliamentary privilege regime in a rights-based constitutional system.

Keywords: Kenya, constitution, judicial restraint, parliamentary privilege

Procedia PDF Downloads 137
168 Study of Microbial Diversity Associated with Tarballs and Their Exploitation in Crude Oil Degradation

Authors: Varsha Shinde, Belle Damodara Shenoy

Abstract:

Tarballs are crude oil remnants found in oceans after long term weathering process and are a global concern since several decades as potential marine pollutant. Being complicated in structure microbial remediation of tarballs in natural environment is a slow process. They are rich in high molecular weight alkanes and poly aromatic hydrocarbons which are resistant to microbial attack and other environmental factors, therefore remain in environment for long time. However, it has been found that many bacteria and fungi inhabit on tarballs for nutrients and shelter. Many of them are supposed to be oil degraders, while others are supposed to be getting benefited by byproducts formed during hydrocarbon metabolism. Thus tarballs are forming special interesting ecological niche of microbes. This work aimed to study diversity of bacteria and fungi from tarballs and to see their potential application in crude oil degradation. The samples of tarballs were collected from Betul beach of south Goa (India). Different methods were used to isolate culturable fraction of bacteria and fungi from it. Those were sequenced for 16S rRNA gene and ITS for molecular level identification. The 16S rRNA gene sequence analysis revealed the presence of 13 bacterial genera/clades (Alcanivorax, Brevibacterium, Bacillus, Cellulomonas, Enterobacter, Klebsiella, Marinobacter, Nitratireductor, Pantoea, Pseudomonas, Pseudoxanthomonas, Tistrella and Vibrio), while the ITS sequence analysis placed the fungi in 8 diverse genera/ clades (Aspergillus, Byssochlamys, Monascus, Paecilomyces, Penicillium, Scytalidium/ Xylogone, Talaromyces and Trichoderma). All bacterial isolates were screened for oil degradation capacity. Potential strains were subjected to crude oil degradation experiment for quantification. Results were analyzed by GC-MS-MS.

Keywords: bacteria, biodegradation, crude oil, diversity, fungi, tarballs

Procedia PDF Downloads 198
167 Youth Participation in Peace Building and Development in Northern Uganda

Authors: Eric Awich Ochen

Abstract:

The end of the conflict in Northern Uganda in 2006 brought about an opportunity for the youth to return to their original home and contribute to the peace building and development process of their communities. Post-conflict is used here to refer to the post-armed conflict situation and activities of rebels of Joseph Kony in northern Uganda. While the rebels remain very much active in the Sudan and Central African Republic, in Uganda the last confrontations occurred around 2006 or earlier, and communities have returned to their homes and began the process of rebuilding their lives. It is argued that socio-economic reconstruction is at the heart of peacebuilding and sustenance of positive peace in the aftermath of conflict, as it has a bearing on post-conflict stability and good governance. We recognize that several post-conflict interventions within Northern Uganda have targeted women and children with a strong emphasis on family socio-economic empowerment and capacity building, including access to micro finance. The aim of this study was to examine the participation of the youth in post-conflict peace building and development in Northern Uganda by assessing the breadth and width of their engagement and the stages of programming cycle that they are involved in, interrogating the space for participation and how they are facilitating or constraining participation. It was further aimed at examining the various dimensions of participation at play in Northern Uganda and where this fits within the conceptual debates on peace building and development in the region. Supporting young people emerging out of protracted conflict to re-establish meaningful socio-economic engagements and livelihoods is fundamental to their participation in the affairs of the community. The study suggests that in the post-conflict development context of Northern Uganda, participation has rarely been disaggregated or differentiated by sectors or groups. Where some disaggregation occurs, then the main emphasis has always been on either women or children. It appears therefore that little meaningful space has thus been created for young people to engage and participate in peace building initiatives within the region. In other cases where some space is created for youth participation, this has been in pre-conceived programs or interventions conceived by the development organizations with the youth or young people only invited to participate at particular stages of the project implementation cycle. Still within the implementation of the intervention, the extent to which young people participate is bounded, with little power to influence the course of the interventions or make major decisions. It is thus visible that even here young people mainly validate and legitimize what are predetermined processes only act as pawns in the major chess games played by development actors (dominant peace building partners). This paper, therefore, concludes that the engagement of the youth in post-conflict peace building has been quite problematic and tokenistic and has not given the adequate youth space within which they could ably participate and express themselves in the ensuing interventions.

Keywords: youth, conflict, peace building, participation

Procedia PDF Downloads 374