Search results for: authorization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 50

Search results for: authorization

20 Cytogenetic Characterization of the VERO Cell Line Based on Comparisons with the Subline; Implication for Authorization and Quality Control of Animal Cell Lines

Authors: Fumio Kasai, Noriko Hirayama, Jorge Pereira, Azusa Ohtani, Masashi Iemura, Malcolm A. Ferguson Smith, Arihiro Kohara

Abstract:

The VERO cell line was established in 1962 from normal tissue of an African green monkey, Chlorocebus aethiops (2n=60), and has been commonly used worldwide for screening for toxins or as a cell substrate for the production of viral vaccines. The VERO genome was sequenced in 2014; however, its cytogenetic features have not been fully characterized as it contains several chromosome abnormalities and different karyotypes coexist in the cell line. In this study, the VERO cell line (JCRB0111) was compared with one of the sublines. In contrast to 59 chromosomes as the modal chromosome number in the VERO cell line, the subline had two peaks of 56 and 58 chromosomes. M-FISH analysis using human probes revealed that the VERO cell line was characterized by a translocation t(2;25) found in all metaphases, which was absent in the subline. Different abnormalities detected only in the subline show that the cell line is heterogeneous, indicating that the subline has the potential to change its genomic characteristics during cell culture. The various alterations in the two independent lineages suggest that genomic changes in both VERO cells can be accounted for by progressive rearrangements during their evolution in culture. Both t(5;X) and t(8;14) observed in all metaphases of the two cell lines might have a key role in VERO cells and could be used as genetic markers to identify VERO cells. The flow karyotype shows distinct differences from normal. Further analysis of sorted abnormal chromosomes may uncover other characteristics of VERO cells. Because of the absence of STR data, cytogenetic data are important in characterizing animal cell lines and can be an indicator of their quality control.

Keywords: VERO, cell culture passage, chromosome rearrangement, heterogeneous cells

Procedia PDF Downloads 388
19 Dialectics of Modern Law: Perspectives and Strategies of Resistance from the Margins

Authors: Nisar Alungal Chungath

Abstract:

“No human being is illegal" has become a dictum strongly upheld in the context of global immigration and migration, highlighting the ethical and moral dimensions of how societies and governments treat individuals and communities who have crossed political borders or are living in a country without legal authorization. It seeks to shift the focus from categorizing human beings as illegal immigrants to recognizing their inherent human rights and the complexities of their circumstances. As a complex social phenomenon, law has been a crucial instrument in shaping, regulating and governing human societies and vice versa. The law has now become a humongous political project of the modern majoritarian regimes to democratically illegitimize and illegalize the unpopular sections and minorities. Drawing from the theoretical frameworks of dialectics, the paper explores the philosophical underpinnings of the historical evolution and dynamic nature of modern law. The paper employs a phenomenological approach to analyze the dialectical relations between individuals, societies, and legal systems, aiming to shed light on the ethical and political implications of these interactions. By examining the historical essence of law, its relationship with social and cultural norms, and the role of power dynamics, this article argues for constantly maintaining the dialectics of law—the dynamic interplay between legal norms, social practices, cultural values, and historical contexts through a philosophical and phenomenological lens, in order to bridge the gap between universal principles and particular contexts. The paper will shed light to the dialectics of the law in the context of instances of the legal persecutions of the modern secular democracies such as Citizenship Amendment Act-2019, India.

Keywords: phenomenology, dialectic, modern law, politics, resistance, margins

Procedia PDF Downloads 37
18 Environment Management Practices at Oil and Natural Gas Corporation Hazira Gas Processing Complex

Authors: Ashish Agarwal, Vaibhav Singh

Abstract:

Harmful emissions from oil and gas processing facilities have long remained a matter of concern for governments and environmentalists throughout the world. This paper analyses Oil and Natural Gas Corporation (ONGC) gas processing plant in Hazira, Gujarat, India. It is the largest gas-processing complex in the country designed to process 41MMSCMD sour natural gas & associated sour condensate. The complex, sprawling over an area of approximate 705 hectares is the mother plant for almost all industries at Hazira and enroute Hazira Bijapur Jagdishpur pipeline. Various sources of pollution from each unit starting from Gas Terminal to Dew Point Depression unit and Caustic Wash unit along the processing chain were examined with the help of different emission data obtained from ONGC. Pollution discharged to the environment was classified into Water, Air, Hazardous Waste and Solid (Non-Hazardous) Waste so as to analyze each one of them efficiently. To protect air environment, Sulphur recovery unit along with automatic ambient air quality monitoring stations, automatic stack monitoring stations among numerous practices were adopted. To protect water environment different effluent treatment plants were used with due emphasis on aquaculture of the nearby area. Hazira plant has obtained the authorization for handling and disposal of five types of hazardous waste. Most of the hazardous waste were sold to authorized recyclers and the rest was given to Gujarat Pollution Control Board authorized vendors. Non-Hazardous waste was also handled with an overall objective of zero negative impact on the environment. The effect of methods adopted is evident from emission data of the plant which was found to be well under Gujarat Pollution Control Board limits.

Keywords: sulphur recovery unit, effluent treatment plant, hazardous waste, sour gas

Procedia PDF Downloads 198
17 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 279
16 The Essence and Attribution of Intellectual Property Rights Generated in the Digitization of Intangible Cultural Heritage

Authors: Jiarong Zhang

Abstract:

Digitizing intangible cultural heritage is a complex and comprehensive process from which sorts of intellectual property rights may be generated. Digitizing may be a repacking process of cultural heritage, which creates copyrights; recording folk songs and indigenous performances can create 'related rights'. At the same time, digitizing intangible cultural heritage may infringe the intellectual property rights of others unintentionally. Recording religious rituals of indigenous communities without authorization can violate the moral right of the ceremony participants of the community; making digital copies of rock paintings may infringe the right of reproduction. In addition, several parties are involved in the digitization process: indigenous peoples, museums, and archives can be holders of cultural heritage; companies and research institutions can be technology providers; internet platforms can be promoters and sellers; the public and groups above can be beneficiaries. When diverse intellectual property rights versus various parties, problems and disputes can arise easily. What are the types of intellectual property rights generated in the digitization process? What is the essence of these rights? Who should these rights belong to? How to use intellectual property to protect the digitalization of cultural heritage? How to avoid infringing on the intellectual property rights of others? While the digitization has been regarded as an effective approach to preserve intangible cultural heritage, related intellectual property issues have not received the attention and full discussion. Thus, parties involving in the digitization process may face intellectual property infringement lawsuits. The article will explore those problems from the intersection perspective of intellectual property law and cultural heritage. From a comparative approach, the paper will analysis related legal documents and cases, and shed some lights of those questions listed. The findings show, although there are no intellectual property laws targeting the cultural heritage in most countries, the involved stakeholders can seek protection from existing intellectual property rights following the suggestions of the article. The research will contribute to the digitization of intangible cultural heritage from a legal and policy aspect.

Keywords: copyright, digitization, intangible cultural heritage, intellectual property, Internet platforms

Procedia PDF Downloads 112
15 Study on Principals Using Change Leadership to Promote School Innovation: A Case Study of a Primary School in Taiwan

Authors: Chih-Wen Fan

Abstract:

Backgrounds/ Research goals : School improvement requires change leadership, which often means discomfort. Principals are the key people that determine the effectiveness of schools. In an era of organization’s pursuit of speed and effectiveness, school administration has to be accountable and innovative. Effective principals work to improve achievement by focusing on the administrative and teaching quality of improvement. However, there is a lack of literature addressing the relevant case studies on school change leadership. This article explores how principals can use change leadership to drive school change. It analyze the driving factors of principal changes in the case school, the beliefs of change leadership, specific methods, and what impact they have. Methods: This study applies the case study research method to the selected primary school located in an urban area for case study, which has achieved excellent performance after reform and innovation. The researchers selected an older primary school located in an urban area that was transformed into a high-performance primary school after changes were enacted by the principal. The selected case was recommended by three supervisors of the Education Department. The case school underwent leadership change by the new principal during his term, and won an award from the Ministry of Education. Total of 8 teachers are interviewed. The data encoding includes interviews and documents. Expected results/ conclusions: The conclusions of the study are, as follows: (1) The influence for Principal Lin's change leadership is from internal and external environmental development and change pressures. (2) The principal's belief in change leadership is to recognize the sense of crisis, and to create a climate of change and demand for change. (3) The principal's specific actions are intended to identify key members, resolve resistance, use innovative thinking, and promote organizational learning. (4) Principal Lin's change leadership can enhance the professional functions of all employees through appropriate authorization. (5) The effectiveness of change leadership lies in teachers' participation in decision-making; the school's reputation has been enhanced through featured courses.

Keywords: change leadership, empowerment, crisis awareness, case study

Procedia PDF Downloads 104
14 Optimizing Pavement Construction Procedures in the Southern Desert of Libya

Authors: Khlifa El Atrash, Gabriel Assaf

Abstract:

Libya uses a volumetric analysis in designing asphalt mixtures, which can also be upgraded in hot, arid weather. However, in order to be effective, it should include many important aspects which are materials, environment, and method of construction. However, the quality of some roads was below a satisfactory level. This paper examines the factors that contribute to low quality of road performance in Libya. To evaluate these factors, a questionnaire survey and a laboratory comparative study were performed for a few mixes under-represented of temperature and traffic load. In laboratory, rutting test conducted on two different asphalt mixture, these mixes included, an asphalt concrete mix using local aggregate and asphalt binder B(60/70) at the optimum Marshall asphalt content, another mixes designed using Superpave design procedure with the same materials and performance asphalt binder grade PG (70-10). In the survey, the questionnaire was distributed to 55 engineers and specialists in this field. The interview was conducted to a few others, and the factors that were leading to poor performance of asphalt roads were listed as; 1) Owner Experience and technical staff 2) Asphalt characteristics 3) Updating and development of Asphalt Mix Design methods 4) Lack of data collection by authorization Agency 5) Construction and compaction process 6) Mentoring and controlling mixing procedure. Considering and improving these factors will play an important role to improve the pavement performances, longer service life, and lower maintenance costs. This research summarized some recommendations for making asphalt mixtures used in hot, dry areas. Such asphalt mixtures should use asphalt binder which is less affected by pavement temperature change and traffic load. The properties of the mixture, such as durability, deformation, air voids, and performance, largely depend on the type of materials, environment, and mixing method. These properties, in turn, affect the pavement performance.

Keywords: volumetric analysis, pavement performances, hot climate, traffic load, pavement temperature, asphalt mixture, environment, design and construction

Procedia PDF Downloads 238
13 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 348
12 A Review of Benefit-Risk Assessment over the Product Lifecycle

Authors: M. Miljkovic, A. Urakpo, M. Simic-Koumoutsaris

Abstract:

Benefit-risk assessment (BRA) is a valuable tool that takes place in multiple stages during a medicine's lifecycle, and this assessment can be conducted in a variety of ways. The aim was to summarize current BRA methods used during approval decisions and in post-approval settings and to see possible future directions. Relevant reviews, recommendations, and guidelines published in medical literature and through regulatory agencies over the past five years have been examined. BRA implies the review of two dimensions: the dimension of benefits (determined mainly by the therapeutic efficacy) and the dimension of risks (comprises the safety profile of a drug). Regulators, industry, and academia have developed various approaches, ranging from descriptive textual (qualitative) to decision-analytic (quantitative) models, to facilitate the BRA of medicines during the product lifecycle (from Phase I trials, to authorization procedure, post-marketing surveillance and health technology assessment for inclusion in public formularies). These approaches can be classified into the following categories: stepwise structured approaches (frameworks); measures for benefits and risks that are usually endpoint specific (metrics), simulation techniques and meta-analysis (estimation techniques), and utility survey techniques to elicit stakeholders’ preferences (utilities). All these approaches share the following two common goals: to assist this analysis and to improve the communication of decisions, but each is subject to its own specific strengths and limitations. Before using any method, its utility, complexity, the extent to which it is established, and the ease of results interpretation should be considered. Despite widespread and long-time use, BRA is subject to debate, suffers from a number of limitations, and currently is still under development. The use of formal, systematic structured approaches to BRA for regulatory decision-making and quantitative methods to support BRA during the product lifecycle is a standard practice in medicine that is subject to continuous improvement and modernization, not only in methodology but also in cooperation between organizations.

Keywords: benefit-risk assessment, benefit-risk profile, product lifecycle, quantitative methods, structured approaches

Procedia PDF Downloads 117
11 Clinical Evidence of the Efficacy of ArtiCovid (Artemisia Annua Extract) on Covid-19 Patients in DRC

Authors: Md, MCS, MPH Munyangi Wa Nkola Jerome

Abstract:

The pandemic of COVID-19, a recently discovered contagious respiratory disease called SARS-CoV-2 (Severe Acute Respiratory Syndrome-Coronavirus 2 Majority of people infected with SARS-CoV-2: Asymptomatic or mildly ill 14% of patients will develop severe illness requiring hospitalization and oxygen support, and 5% of these will be transferred to an intensive care unit, Urgent need for new treatments that can be used quickly to avoid transfer of patients to intensive care and death. Objective: To evaluate the clinical activity (efficacy) of ArtiCovid Hypothesis: Administration of 3 times a teaspoon per day by COVID patients (symptomatic, mild, or moderate forms) results in the disappearance of symptoms and improvement of biological parameters (including viral suppression). Clinical efficacy: the disappearance of clinical signs after seven days of treatment; reduction in the rate of patients transferred to intensive care units for mechanical ventilation and a decrease in mortality related to this infection Paraclinical efficacy: improvement of biological parameters (mainly d-dimer, CRP) Virological efficacy: suppression of the viral load after seven days of treatment (control test on the seventh day is negative) Pilot study using a standardized solution based on Artemisia annua (ARTICOVID) Obtaining authorization from the health authorities of the province of Central Kongo Recruitment of volunteer patients, mainly in the Kinkanda HospitalCarrying out tests before and after treatment as well as analyses before and after treatment. The protocol obtained the approval of the ethics committee 50 patients who completed the treatment were aged between 2 and 70 years, with an average age of 36 yearsMore half were male (56%). One in four patients was a health professional (25%) Of the 12 health professionals, 4 were physicians. For those who reported the date of onset of the disease, the average duration between the appearance of the first symptoms and the medical consultation was 5 days. The 50 patients put on ARTICOVID were discharged alive with CRP levels substantially normalizedAfter seven to eight days, the control test came back negative. This pilot study suggests that ARTICOVID may be effective against COVID-19 infection.

Keywords: artiCovid, DRC, Covid-19, SARS_COV_2

Procedia PDF Downloads 90
10 Customer Experiences and Perspectives on Mobile Money Service Fraud: A Case Study of the University of Education, Winneba

Authors: Mavis Ofosuah Asante, Abena Abokoma Asemanyi, Belinda Osei-mensah, Stephen Osei Akyiaw

Abstract:

The study examined mobile money service fraud experiences and perspectives on control practices at University of Education, Winneba. The objectives of the study included to examine the forms of MoMo fraud strategies experienced by customers of MoMo on UEW Campus, to examine and classify the main perpetrators of the MoMo fraud among UEW students as well as the framework for fraud detection put together by the Telco’s and consumers on UEW Campus. The study adopted the case study research design. The purposive sampling technique was used to select the UEW Campus. Using the convenience sampling technique, five respondents were sampled for the study. The outcome of the in-depth interviews conducted revealed Mobile money fraud was committed in various forms, such as anonymous calls and text messages from scammers, fraudsters calling to deceive subscribers that they are to deliver goods from abroad or from a close relative under false pretexts. Finally, fraudsters sending false cash-out messages to merchants for authorization of which the physical cash is issued by the merchant to the fraudster without the equivalent e-cash. Mobile money fraud has been perpetuated in diverse forms such as mobile money network systems fraud, false promotion fraud, and reversal of erroneous transactions, fortuitous scams, and mobile money agents' fraud. Finally, the frameworks that have been used to detect mobile money fraud include the display of national identifies cards for the transaction, digital identification systems, the use of firewall to protect mobile money accounts, effective information technology architecture for mobile money services, reporting of mobile money fraud to telecoms and the sanctioning of mobile money fraudsters. The study suggested there should be public education and awareness creation on the activities of mobile money fraudsters in Ghana by telecommunication companies in conjunction with the National Communications Authority and the Bank of Ghana. The study, therefore, concluded that the menace of mobile money fraud threatens the integrity of the mobile money financial services.

Keywords: mobile money, fraud, telecommunication, merchant

Procedia PDF Downloads 35
9 Effect of Celebrity Endorsements and Social Media Influencers on Brand Loyalty: A Comparative Study

Authors: Dhruv Saini, Megha Sharma, Sharad Gupta

Abstract:

This research is showing the use of celebrity endorsement and social media influencers and how they help in enhancing the brand loyalty of the consumers. The study aims at keeping brand image of the brand as the link between the two. However, choosing the right celebrity or social media influencer is not an easy task and it is very essential for a brand to select the right ambassador for advertising their products and for selling the product to the ultimate consumer. The purpose of the study is to create a relationship of Celebrity endorsement with brand image and with brand loyalty and creating a relationship of Social media influencers with brand image and with brand loyalty and then making a comparison between the two by measuring the effects of both simultaneously. And then by analyzing which among the two has a greater impact on brand loyalty of the consumers. The study mainly focuses on four major variables namely Celebrity endorsement, Social media influencers, Brand image and Brand loyalty. The study also focuses on interdependence and relationships that these variables have with each other and how they are linked with each other. The study also aims at looking which among Celebrity endorsement and Social media influencer has a greater impact on increasing or enhancing the loyalty for a brand. Earlier celebrity endorsers had a major impact on brand loyalty of the consumers but with time social media influencers are also playing a very vital role in impacting the brand loyalty of the consumers and are giving a fight to the celebrity endorsers as well. Also, Brand image also has a very vital role to play in enhancing the brand loyalty of a brand in the minds of the consumers as a well-known and a better perception of a brand leads to retention of more and more consumers. Also, both Celebrity endorsement and Social media influencers are two-way swords as both have a number of positives and a number of negatives as well, so these are to be compared keeping in mind their adverse effects. Examination of the current market situation has shown that the recommendations of celebrities when properly integrated by comparing product strengths. Advertisers agree that celebrity authorization does not guarantee sales but it can create buzz and make the consumer feel better by-product, which is also what customers should expect as a real star by delivering the promise. On the other hand, depending on the results of the studies, there should be a variety of conclusions planned. Some of the influential people on social media had a positive impact on the product portrait. One of the conclusions is that the product image had a positive impact on consumers. Moreover, the results of the following study states that the most influential influencers consumers in their intended purpose of the purchase, but instead produced a positive result indirectly with Brand image which would further lead to brand loyalty .

Keywords: brand image, brand loyalty, celebrity endorsement, social media influencer

Procedia PDF Downloads 163
8 The Situation in Afghanistan as a Step Forward in Putting an End to Impunity

Authors: Jelena Radmanovic

Abstract:

On 5 March 2020, the International Criminal Court has decided to authorize the investigation into the crimes allegedly committed on the territory of Afghanistan after 1 May 2003. The said determination has raised several controversies, including the recently imposed sanctions by the United States, furthering the United States' long-standing rejection of the authority of the International Criminal Court. The purpose of this research is to address the said investigation in light of its importance for the prevention of impunity in the cases where the perpetrators are nationals of Non-Party States to the Rome Statute. Difficulties that the International Criminal Court has been facing, concerning the establishment of its jurisdiction in those instances where an involved state is not a Party to the Rome Statute, have become the most significant stumbling block undermining the importance, integrity, and influence of the Court. The Situation in Afghanistan raises even further concern, bearing in mind that the Prosecutor’s Request for authorization of an investigation pursuant to article 15 from 20 November 2017 has initially been rejected with the ‘interests of justice’ as an applied rationale. The first method used for the present research is the description of the actual events regarding the aforementioned decisions and the following reactions in the international community, while with the second method – the method of conceptual analysis, the research will address the decisions pertaining to the International Criminal Court’s jurisdiction and will attempt to address the mentioned Decision of 5 March 2020 as an example of good practice and a precedent that should be followed in all similar situations. The research will attempt parsing the reasons used by the International Criminal Court, giving rather greater attention to the latter decision that has authorized the investigation and the points raised by the officials of the United States. It is a find of this research that the International Criminal Court, together with other similar judicial instances (Nuremberg and Tokyo Tribunals, The International Criminal Tribunal for the former Yugoslavia, The International Criminal Tribunal for Rwanda), has presented the world with the possibility of non-impunity, attempting to prosecute those responsible for the gravest of crimes known to the humanity and has shown that such persons should not enjoy the benefits of their immunities, with its focus primarily on the victims of such crimes. Whilst it is an issue that will most certainly be addressed further in the future, with the situations that will be brought before the International Criminal Court, the present research will make an attempt at pointing to the significance of the situation in Afghanistan, the International Criminal Court as such and the international criminal justice as a whole, for the purpose of putting an end to impunity.

Keywords: Afghanistan, impunity, international criminal court, sanctions, United States

Procedia PDF Downloads 99
7 A webGIS Methodology to Support Sediments Management in Wallonia

Authors: Nathalie Stephenne, Mathieu Veschkens, Stéphane Palm, Christophe Charlemagne, Jacques Defoux

Abstract:

According to Europe’s first River basin Management Plans (RBMPs), 56% of European rivers failed to achieve the good status targets of the Water Framework Directive WFD. In Central European countries such as Belgium, even more than 80% of rivers failed to achieve the WFD quality targets. Although the RBMP’s should reduce the stressors and improve water body status, their potential to address multiple stress situations is limited due to insufficient knowledge on combined effects, multi-stress, prioritization of measures, impact on ecology and implementation effects. This paper describes a webGis prototype developed for the Walloon administration to improve the communication and the management of sediment dredging actions carried out in rivers and lakes in the frame of RBMPs. A large number of stakeholders are involved in the management of rivers and lakes in Wallonia. They are in charge of technical aspects (client and dredging operators, organizations involved in the treatment of waste…), management (managers involved in WFD implementation at communal, provincial or regional level) or policy making (people responsible for policy compliance or legislation revision). These different kinds of stakeholders need different information and data to cover their duties but have to interact closely at different levels. Moreover, information has to be shared between them to improve the management quality of dredging operations within the ecological system. In the Walloon legislation, leveling dredged sediments on banks requires an official authorization from the administration. This request refers to spatial information such as the official land use map, the cadastral map, the distance to potential pollution sources. The production of a collective geodatabase can facilitate the management of these authorizations from both sides. The proposed internet system integrates documents, data input, integration of data from disparate sources, map representation, database queries, analysis of monitoring data, presentation of results and cartographic visualization. A prototype of web application using the API geoviewer chosen by the Geomatic department of the SPW has been developed and discussed with some potential users to facilitate the communication, the management and the quality of the data. The structure of the paper states the why, what, who and how of this communication tool.

Keywords: sediments, web application, GIS, rivers management

Procedia PDF Downloads 384
6 Understanding the Social Movements around the ‘Rohingya Crisis’ within the Political Process Model

Authors: Aklima Jesmin, Ubaidur Rob, M. Ashrafur Rahman

Abstract:

Rohingya population of Arakan state in Myanmar are one the most persecuted ethnic minorities in this 21st century. According to the Universal Declaration of Human Rights (UDHR), all human beings are born free, equal in dignity and rights. However, these populations are systematically excluded from this universal proclamation of human rights as they are Rohingya, which signify ‘other’. Based on the accessible and available literatures about Rohingya issue, this study firstly found there are chronological pattern of human rights violations against the ethnic Rohingya which follows the pathology of the Holocaust in this 21st century of human civilization. These violations have been possible due to modern technology, bureaucracy which has been performed through authorization, routinization and dehumanization; not only in formal institutions but in the society as a whole. This kind of apparently never-ending situation poses any author with the problem of available many scientific articles. The most important sources are, therefore the international daily newspapers, social media and official webpage of the non-state actors for nitty-gritty day to day update. Although it challenges the validity and objectivity of the information, but to address the critical ongoing human rights violations against Rohingya population can become a base for further work on this issue. One of the aspects of this paper is to accommodate all the social movements since August 2017 to date. The findings of this paper is that even though it seemed only human rights violations occurred against Rohingya historically but, simultaneously the process of social movements had also started, can be traced more after the military campaign in 2017. Therefore, the Rohingya crisis can be conceptualized within one ‘campaign’ movement for justice, not as episodic events, especially within the Political Process Model than any other social movement theories. This model identifies that the role of international political movements as well as the role of non-state actors are more powerful than any other episodes of violence conducted against Rohinyga in reframing issue, blaming and shaming to Myanmar government and creating the strategic opportunities for social changes. The lack of empowerment of the affected Rohingya population has been found as the loop to utilize this strategic opportunity. Their lack of empowerment can also affect their capacity to reframe their rights and to manage the campaign for their justice. Therefore, this should be placed at the heart of the international policy agenda within the broader socio-political movement for the justice of Rohingya population. Without ensuring human rights of Rohingya population, achieving the promise of the united nation’s sustainable development goals - no one would be excluded – will be impossible.

Keywords: civilization, holocaust, human rights violation, military campaign, political process model, Rohingya population, sustainable development goal, social justice, social movement, strategic opportunity

Procedia PDF Downloads 251
5 Violence against Women: A Study on the Aggressors' Profile

Authors: Giovana Privatte Maciera, Jair Izaías Kappann

Abstract:

Introduction: The violence against woman is a complex phenomenon that accompanies the woman throughout her life and is a result of a social, cultural, political and religious construction, based on the differences among the genders. Those differences are felt, mainly, because of the patriarchal system that is still present which just naturalize and legitimate the asymmetry of power. As consequence of the women’s lasting historical and collective effort for a legislation against the impunity of violence against women in the national scenery, it was ordained, in 2006, a law known as Maria da Penha. The law was created as a protective measure for women that were victims of violence and consequently for the punishment of the aggressor. Methodology: Analysis of police inquiries is established by the Police Station of Defense of the Woman of Assis city, by formal authorization of the justice, in the period of 2013 to 2015. For the evaluating of the results will be used the content analysis and the theoretical referential of Psychoanalysis. Results and Discussion: The final analysis of the inquiries demonstrated that the violence against women is reproduced by the society and the aggressor, in most cases it is a member of their own family, mainly the current or former-spouse. The most common kinds of aggression were: the threat bodily harm, and the physical violence, that normally happens accompanied by psychological violence, being the most painful for the victims. The biggest part of the aggressors was white, older than the victim, worker and had primary school. But, unlike the expected, the minority of the aggressors were users of alcohol and/or drugs and possessed children in common with the victim. There is a contrast among the number of victims who already admitted have suffered some type of violence earlier by the same aggressor and the number of victims who has registered the occurrence before. The aggressors often use the discourse of denial in their testimony or try to justify their act like the blame was of the victim. It is believed in the interaction of several factors that can influence the aggressor to commit the abuse, including psychological, personal and sociocultural factors. One hypothesis is that the aggressor has a violence history in the family origin. After the aggressor being judged, condemned or not, usually there is no rehabilitation plan or supervision that enable his change. Conclusions: It has noticed the importance of studying the aggressor’s characteristics and the reasons that took him to commit such violence, making possible the implementation of an appropriate treatment to prevent and reduce the aggressions, as well the creation of programs and actions that enable communication and understanding concerning the theme. This is because the recurrence is still high, since the punitive system is not enough and the law is still ineffective and inefficient in certain aspects and in its own functioning. It is perceived a compulsion in repeat so much for the victims as for the aggressors, because they end involving, almost always, in disturbed and violent relationships, with the relation of subordination-dominance as characteristic.

Keywords: aggressors' profile, gender equality, Maria da Penha law, violence against women

Procedia PDF Downloads 308
4 Stress and Overload in Mothers and Fathers of Hospitalized Children: A Comparative Study

Authors: Alessandra Turini Bolsoni Silva, Nilson Rogério Da Silva

Abstract:

The hospitalization process for long periods and the experience of invasive and painful clinical procedures can trigger a set of stressors in children, family members and professionals, leading to stress. Mothers are, in general, the main caregivers and, therefore, have a high degree of sadness and stress with an impact on mental health. However, the father, in the face of the mother's absence, needs to assume other responsibilities such as domestic activities and healthy children in addition to work activities. In addition, he has to deal with changes in family and work relationships during the child's hospitalization, with disagreements and changes in the relationship with the partner, changes in the relationship with the children, and finding it difficult to reconcile the new tasks as a caregiver and work. A consequence of the hospitalization process is the interruption of the routine activities of both the child and the family members responsible for the care, who can go through stressful moments due to the consequences of family breakdown, attention focused only on the child and sleepless nights. In this sense, both the mother and the father can have their health affected by their child's hospitalization. The present study aims to compare the prevalence of stress and overload in mothers and fathers of hospitalized children, as well as possible associations with activities related to care. The participants were 10 fathers and 10 mothers of children hospitalized in a hospital located in a medium-sized city in the interior of São Paulo. Three instruments were used for data collection: 1) Script to characterize the participants; 2) The Lipp Stress Symptom Inventory (ISSL, 2000) 3) Zarit Burden Interview Protocol – ZBT. Contact was made with the management of the hospital in order to present the objectives of the project, then authorization was requested for the participation of the parents; after an agreement, the time and place were convenient for the participant to carry out the interview. Thus, they signed the Free and Informed Consent Term. Data were analyzed according to the instrument application manuals and organized in Figures and Tables. The results revealed that fathers and mothers have their family and professional routine affected by the hospitalization of their children, with the consequent presence of stress and overload indicators. However, the study points to a greater presence of stress and overload in mothers due to their role as the main caregiver, often interrupting their professional life to exercise care. In the case of the father, the routine is changed due to taking on household chores and taking care of the other children, with the professional life being less affected. It is hoped that the data can guide future interventions that promote and develop strategies that favor care and, at the same time, preserve the health of caregivers and that include mothers and fathers, considering that both are affected, albeit in a different way.

Keywords: stress, overload, caregivers, parents

Procedia PDF Downloads 36
3 Relationship between Thumb Length and Pointing Performance on Portable Terminal with Touch-Sensitive Screen

Authors: Takahiro Nishimura, Kouki Doi, Hiroshi Fujimoto

Abstract:

Touch-sensitive screens that serve as displays and input devices have been adopted in many portable terminals such as smartphones and personal media players, and the market of touch-sensitive screens has expanded greatly. One of the advantages of touch-sensitive screen is the flexibility in the graphical user interface (GUI) design, and it is imperative to design an appropriate GUI to realize an easy-to-use interface. Moreover, it is important to evaluate the relationship between pointing performance and GUI design. There is much knowledge regarding easy-to-use GUI designs for portable terminals with touch-sensitive screens, and most have focused on GUI design approaches for women or children with small hands. In contrast, GUI design approaches for users with large hands have not received sufficient attention. In this study, to obtain knowledge that contributes to the establishment of individualized easy-to-use GUI design guidelines, we conducted experiments to investigate the relationship between thumb length and pointing performance on portable terminals with touch-sensitive screens. In this study, fourteen college students who participated in the experiment were divided into two groups based on the length of their thumbs. Specifically, we categorized the participants into two groups, thumbs longer than 64.2 mm into L (Long) group, and thumbs longer than 57.4 mm but shorter than 64.2 mm into A (Average) group, based on Japanese anthropometric database. They took part in this study under the authorization of Waseda University’s ‘Ethics Review Committee on Research with Human Subjects’. We created an application for the experimental task and implemented it on the projected capacitive touch-sensitive screen portable terminal (iPod touch (4th generation)). The display size was 3.5 inch and 960 × 640 - pixel resolution at 326 ppi (pixels per inch). This terminal was selected as the experimental device, because of its wide use and market share. The operational procedure of the application is as follows. First, the participants placed their thumb on the start position. Then, one cross-shaped target in a 10 × 7 array of 70 positions appeared at random. The participants pointed the target with their thumb as accurately and as fast as possible. Then, they returned their thumb to the start position and waited. The operation ended when this procedure had been repeated until all 70 targets had each been pointed at once by the participants. We adopted the evaluation indices for absolute error, variable error, and pointing time to investigate pointing performance when using the portable terminal. The results showed that pointing performance varied with thumb length. In particular, on the lower right side of the screen, the performance of L group with long thumb was low. Further, we presented an approach for designing easy-to- use button GUI for users with long thumbs. The contributions of this study include revelation of the relationship between pointing performance and user’s thumb length when using a portable terminal in terms of accuracy, precision, and speed of pointing. We hope that these findings contribute to an easy-to-use GUI design for users with large hands.

Keywords: pointing performance, portable terminal, thumb length, touch-sensitive screen

Procedia PDF Downloads 137
2 Automated System: Managing the Production and Distribution of Radiopharmaceuticals

Authors: Shayma Mohammed, Adel Trabelsi

Abstract:

Radiopharmacy is the art of preparing high-quality, radioactive, medicinal products for use in diagnosis and therapy. Radiopharmaceuticals unlike normal medicines, this dual aspect (radioactive, medical) makes their management highly critical. One of the most convincing applications of modern technologies is the ability to delegate the execution of repetitive tasks to programming scripts. Automation has found its way to the most skilled jobs, to improve the company's overall performance by allowing human workers to focus on more important tasks than document filling. This project aims to contribute to implement a comprehensive system to insure rigorous management of radiopharmaceuticals through the use of a platform that links the Nuclear Medicine Service Management System to the Nuclear Radio-pharmacy Management System in accordance with the recommendations of World Health Organization (WHO) and International Atomic Energy Agency (IAEA). In this project we attempt to build a web application that targets radiopharmacies, the platform is built atop the inherently compatible web stack which allows it to work in virtually any environment. Different technologies are used in this project (PHP, Symfony, MySQL Workbench, Bootstrap, Angular 7, Visual Studio Code and TypeScript). The operating principle of the platform is mainly based on two parts: Radiopharmaceutical Backoffice for the Radiopharmacian, who is responsible for the realization of radiopharmaceutical preparations and their delivery and Medical Backoffice for the Doctor, who holds the authorization for the possession and use of radionuclides and he/she is responsible for ordering radioactive products. The application consists of sven modules: Production, Quality Control/Quality Assurance, Release, General Management, References, Transport and Stock Management. It allows 8 classes of users: The Production Manager (PM), Quality Control Manager (QCM), Stock Manager (SM), General Manager (GM), Client (Doctor), Parking and Transport Manager (PTM), Qualified Person (QP) and Technical and Production Staff. Digital platform bringing together all players involved in the use of radiopharmaceuticals and integrating the stages of preparation, production and distribution, Web technologies, in particular, promise to offer all the benefits of automation while requiring no more than a web browser to act as a user client, which is a strength because the web stack is by nature multi-platform. This platform will provide a traceability system for radiopharmaceuticals products to ensure the safety and radioprotection of actors and of patients. The new integrated platform is an alternative to write all the boilerplate paperwork manually, which is a tedious and error-prone task. It would minimize manual human manipulation, which has proven to be the main source of error in nuclear medicine. A codified electronic transfer of information from radiopharmaceutical preparation to delivery will further reduce the risk of maladministration.

Keywords: automated system, management, radiopharmacy, technical papers

Procedia PDF Downloads 124
1 The Employment of Unmanned Aircraft Systems for Identification and Classification of Helicopter Landing Zones and Airdrop Zones in Calamity Situations

Authors: Marielcio Lacerda, Angelo Paulino, Elcio Shiguemori, Alvaro Damiao, Lamartine Guimaraes, Camila Anjos

Abstract:

Accurate information about the terrain is extremely important in disaster management activities or conflict. This paper proposes the use of the Unmanned Aircraft Systems (UAS) at the identification of Airdrop Zones (AZs) and Helicopter Landing Zones (HLZs). In this paper we consider the AZs the zones where troops or supplies are dropped by parachute, and HLZs areas where victims can be rescued. The use of digital image processing enables the automatic generation of an orthorectified mosaic and an actual Digital Surface Model (DSM). This methodology allows obtaining this fundamental information to the terrain’s comprehension post-disaster in a short amount of time and with good accuracy. In order to get the identification and classification of AZs and HLZs images from DJI drone, model Phantom 4 have been used. The images were obtained with the knowledge and authorization of the responsible sectors and were duly registered in the control agencies. The flight was performed on May 24, 2017, and approximately 1,300 images were obtained during approximately 1 hour of flight. Afterward, new attributes were generated by Feature Extraction (FE) from the original images. The use of multispectral images and complementary attributes generated independently from them increases the accuracy of classification. The attributes of this work include the Declivity Map and Principal Component Analysis (PCA). For the classification four distinct classes were considered: HLZ 1 – small size (18m x 18m); HLZ 2 – medium size (23m x 23m); HLZ 3 – large size (28m x 28m); AZ (100m x 100m). The Decision Tree method Random Forest (RF) was used in this work. RF is a classification method that uses a large collection of de-correlated decision trees. Different random sets of samples are used as sampled objects. The results of classification from each tree and for each object is called a class vote. The resulting classification is decided by a majority of class votes. In this case, we used 200 trees for the execution of RF in the software WEKA 3.8. The classification result was visualized on QGIS Desktop 2.12.3. Through the methodology used, it was possible to classify in the study area: 6 areas as HLZ 1, 6 areas as HLZ 2, 4 areas as HLZ 3; and 2 areas as AZ. It should be noted that an area classified as AZ covers the classifications of the other classes, and may be used as AZ, HLZ of large size (HLZ3), medium size (HLZ2) and small size helicopters (HLZ1). Likewise, an area classified as HLZ for large rotary wing aircraft (HLZ3) covers the smaller area classifications, and so on. It was concluded that images obtained through small UAV are of great use in calamity situations since they can provide data with high accuracy, with low cost, low risk and ease and agility in obtaining aerial photographs. This allows the generation, in a short time, of information about the features of the terrain in order to serve as an important decision support tool.

Keywords: disaster management, unmanned aircraft systems, helicopter landing zones, airdrop zones, random forest

Procedia PDF Downloads 146