Search results for: cyber villages
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 653

Search results for: cyber villages

143 High Unmet Need and Factors Associated with Utilization of Contraceptive Methods among Women from the Digo Community of Kwale, Kenya

Authors: Mochache Vernon, Mwakusema Omar, Lakhani Amyn, El Busaidy Hajara, Temmerman Marleen, Gichangi Peter

Abstract:

Background: Utilization of contraceptive methods has been associated with improved maternal and child health (MCH) outcomes. Unfortunately, there has been sub-optimal uptake of contraceptive services in the developing world despite significant resources being dedicated accordingly. It is imperative to granulate factors that could influence uptake and utilization of contraception. Methodology: Between March and December 2015, we conducted a mixed-methods cross-sectional study among women of reproductive age (18-45 years) from a pre-dominantly rural coastal Kenyan community. Qualitative approaches involved focus group discussions as well as a series of key-informant interviews. We also administered a sexual and reproductive health survey questionnaire at the household level. Results: We interviewed 745 women from 15 villages in Kwale County. The median (interquartile range, IQR) age was 29 (23-37) while 76% reported being currently in a marital union. Eighty-seven percent and 85% of respondents reported ever attending school and ever giving birth, respectively. Respondents who had ever attended school were more than twice as likely to be using contraceptive methods [Odds Ratio, OR = 2.1, 95% confidence interval, CI: 1.4-3.4, P = 0.001] while those who had ever given birth were five times as likely to be using these methods [OR = 5.0, 95% CI: 1.7-15.0, P = 0.004]. The odds were similarly high among women who reported attending antenatal care (ANC) [OR = 4.0, 95% CI: 1.1-14.8, P = 0.04] as well as those who expressly stated that they did not want any more children or wanted to wait longer before getting another child [OR = 6.7, 95% CI: 3.3-13.8, P<0.0001]. Interviewees reported deferring to the ‘wisdom’ of an older maternal figure in the decision-making process. Conclusions: Uptake and utilization of contraceptive methods among Digo women from Kwale, Kenya is positively associated with demand-side factors including educational attainment, previous birth experience, ANC attendance and a negative future fertility desire. Interventions to improve contraceptive services should focus on engaging dominant maternal figures in the community.

Keywords: unmet need, utilization of contraceptive methods, women, Digo community

Procedia PDF Downloads 159
142 The Research on Decentralization Supervision Mechanism of Town and Village Culture Based On Authenticity Evaluation

Authors: Chao Ma

Abstract:

In this paper, the evaluation criteria of authenticity evaluation system model are taken as the foundation so as to discuss the establishment problems about decentralization supervision system and mechanism of historical cultural town and village. The filtration of fitting towns and village's authenticity is conducted from the level, characteristic index and authentic assessment of evaluation model, thereby, supervising subject -interest related- coordinate organization can be taken as the venation in the management level, thus supervision mechanism of town and village's cultural inheritance can be combed, and the cultural inheritance management system and mechanism which is suitable to historical and cultural Chinese town and village will be provided. As the settlement with strong self-organizing characteristic, town and village don't recognize the management system as deeply as city. Therefore, it is necessary to establish town and village cultural evaluation system based on authenticity evaluation criteria. In this paper, authenticity evaluation system is established by taking this village's value evaluation criteria and protection as the cores, and the classification of participating options is beneficial to distribute local limited resources, protect hierarchically and accord with the local characters of town and village, build the evaluation system to run through the whole process of cultural inheritance, moreover, provide abundant information resources and make sure the value judgment criteria, thus supervision and management can be strengthened to effectively guard risk. By the above judgement and filtration of participating options, the management object with clear functions and supervision and coordination organization are established, thereby, the managerial logic of interest-related persons' decentralization can be clarified, evaluation system can be established, and the more targeted decentralization supervision system and mechanism of historical and cultural village will be built ultimately. Taking this method as a fundamental in cultural protection of town and village, not only can it be carried forward in the mass media, but also can cultivate the identity sense of indigenous people to come back historical and cultural villages, and resist the replacement of city culture.

Keywords: authenticity, rural culture, inheritance, supervision

Procedia PDF Downloads 320
141 Relocation of Livestocks in Rural of Canakkale Province Using Remote Sensing and GIS

Authors: Melis Inalpulat, Tugce Civelek, Unal Kizil, Levent Genc

Abstract:

Livestock production is one of the most important components of rural economy. Due to the urban expansion, rural areas close to expanding cities transform into urban districts during the time. However, the legislations have some restrictions related to livestock farming in such administrative units since they tend to create environmental concerns like odor problems resulted from excessive manure production. Therefore, the existing animal operations should be moved from the settlement areas. This paper was focused on determination of suitable lands for livestock production in Canakkale province of Turkey using remote sensing (RS) data and GIS techniques. To achieve the goal, Formosat 2 and Landsat 8 imageries, Aster DEM, and 1:25000 scaled soil maps, village boundaries, and village livestock inventory records were used. The study was conducted using suitability analysis which evaluates the land in terms of limitations and potentials, and suitability range was categorized as Suitable (S) and Non-Suitable (NS). Limitations included the distances from main and crossroads, water resources and settlements, while potentials were appropriate values for slope, land use capability and land use land cover status. Village-based S land distribution results were presented, and compared with livestock inventories. Results showed that approximately 44230 ha area is inappropriate because of the distance limitations for roads and etc. (NS). Moreover, according to LULC map, 71052 ha area consists of forests, olive and other orchards, and thus, may not be suitable for building such structures (NS). In comparison, it was found that there are a total of 1228 ha S lands within study area. The village-based findings indicated that, in some villages livestock production continues on NS areas. Finally, it was suggested that organized livestock zones may be constructed to serve in more than one village after the detailed analysis complemented considering also political decisions, opinion of the local people, etc.

Keywords: GIS, livestock, LULC, remote sensing, suitable lands

Procedia PDF Downloads 263
140 Projects and Limits of Memory Engineering: A Case of Lithuanian Partisan War

Authors: Mingaile Jurkute, Vilnius University

Abstract:

The memory of the Lithuanian partisan war (1944-1953) underwent extremely dramatic transformations. During this war, the image of the resistance and a partisan was one of the key elements of Lithuanian identity. Its importance is evidenced by the extremely large legacy of songs about partisans, no other topic has collected so much folklore in Lithuania. In the Soviet years, this resistance was practically forced to be forgotten. Terror and Soviet laws have forced people to stop talking about the events, even in the family circle. In addition, the Soviets created their own propaganda story, reinterpreting the Lithuanian partisan war, presenting partisans as bandits who brutally tortured and murdered locals. But even in the Soviet years, the memory could neither be completely suppressed, nor completely transformed into wishful shape. The analysis of fiction and cinema shows that the traumatic memory of real events rushed to the surface, thus transforming the very propagandistic narrative. After the restoration of the Republic of Lithuania in 1990, the Lithuanian partisan war was gradually returned to the central place of Lithuanian history. After 2014 the nationalist heroic narrative about Lithuanian partisans became the central narrative of modern Lithuanian history. Nevertheless, interviews I conducted in Lithuanian villages reveal that the memory of local communities and families preserves quite different experiences that do not fit into neither the Soviet narrative nor the heroic one. Such experiences include, for example, partisan violence against local families. This paper is about the efforts of two political ideologies (the Soviet and the Lithuanian patriotic) to use the history of the Lithuanian partisans for their own needs, and the attempts of small communities (mostly families) to resist these efforts. The research reveals that family memory, even when opposed to aggressive state memory policies, can preserve counter-narratives by exploiting unexpected objects beyond the control of the state, such as nature and wildlife. Basically, the paper analyses the limits of the instrumentalization of memory, even by extremely aggressive political regimes.

Keywords: collective memory, post-memory, violence, military conflict, family memory

Procedia PDF Downloads 71
139 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation

Authors: Carlos Riascos, Peter Thomson

Abstract:

Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.

Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy

Procedia PDF Downloads 276
138 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 516
137 Effect of Information and Communication Technology (ICT) Usage by Cassava Farmers in Otukpo Local Government Area of Benue State, Nigeria

Authors: O. J. Ajayi, J. H. Tsado, F. Olah

Abstract:

The study analyzed the effect of information and communication technology (ICT) usage on cassava farmers in Otukpo local government area of Benue state, Nigeria. Primary data was collected from 120 randomly selected cassava farmers using multi-stage sampling technique. A structured questionnaire and interview schedule was employed to generate data. Data were analyzed using descriptive (frequency, mean and percentage) and inferential statistics (OLS (ordinary least square) and Chi-square). The result revealed that majority (78.3%) were within the age range of 21-50 years implying that the respondents were within the active age for maximum production. 96.8% of the respondents had one form of formal education or the other. The sources of ICT facilities readily available in area were radio(84.2%), television(64.2%) and mobile phone(90.8%) with the latter being the most relied upon for cassava farming. Most of the farmers were aware (98.3%) and had access (95.8%) to these ICT facilities. The dependence on mobile phone and radio were highly relevant in cassava stem selection, land selection, land preparation, cassava planting technique, fertilizer application and pest and disease management. The value of coefficient of determination (R2) indicated an 89.1% variation in the output of cassava farmers explained by the inputs indicated in the regression model implying that, there is a positive and significant relationship between the inputs and output. The results also indicated that labour, fertilizer and farm size were significant at 1% level of probability while ICT use was significant at 10%. Further findings showed that finance (78.3%) was the major constraint associated with ICT use. Recommendations were made on strengthening the use of ICT especially contemporary ones like the computer and internet among farmers for easy information sourcing which can boost agricultural production, improve livelihood and subsequently food security. This may be achieved by providing credit or subsidies and information centres like telecentres and cyber cafes through government assistance or partnership.

Keywords: ICT, cassava farmers, inputs, output

Procedia PDF Downloads 286
136 Reclamation of Saline and Alkaline Soils through Aquaculture: A Review and Prospects for Future Research

Authors: M. Shivakumar, S. R. Somashekhar, C. V. Raju

Abstract:

Secondary salinization of agricultural lands in any command areas of the world is the major issue in the recent past. Currently, it is estimated that the 954 mh of saline and alkaline soil is present in the world. Thousands of hectares of land, getting added every year. Argentina, Bangladesh and Australia are most affected countries. In India, out of 142.80 million hectare (mh) cropped area, 56 mh is irrigated area. Of which, more than 9 mh (about 16.%) of land is found to be alkaline/saline. Due to continuous utilization of same land for same agricultural activities, excessive usage of fertilizers and water, most of the soils have become alkaline, saline or water logged. These lands are low productive and at times totally unfit for agricultural activities. These soils may or may not posses good physical condition, but plants may suffer from its inability to absorb water from salty solution. Plants suffer from dehydration and loose water to the soil, shrink, resulting death of plant. This process is called plasmolysis. It is the fact that soil is an independent, organic body of nature that acquires properties in accordance with forces which act upon it. Aquaculture is one of the solutions to utilize such problematic soils for food production. When the impoundments are constructed in an area 10-15% of the affected areas, the excess water along with the salts gets into impoundments and management of salt is easier in water than in the soil. Due to high organic input in aquaculture such as feed, manure and continuous deposition of fecal matter, pH of the soil gets reduced and over the period of time such soils can be put back into the original activity. Under National Agricultural Development Program (NADP), the project was implemented in 258 villages of Mandya District, Karnataka State, India and found that these lands can be effectively utilized for fish culture and increase the proteinacious food production by many folds while conserving the soils. The findings of the research can be adopted and up scaled in any country.

Keywords: saline and alkaline soils, Aquaculture, Problematic soils, Reclamation

Procedia PDF Downloads 111
135 Contributions of Women to the Development of Hausa Literature as an Effective Means of Public Enlightenment: The Case of a 19th Century Female Scholar Maryam Bint Uthman Ibn Foduye

Authors: Balbasatu Ibrahim

Abstract:

In the 19th century, Hausaland an Islamic revolution known as the Sokoto Jihad took place that led to the establishment of the Sokoto Caliphate in 1804 under the leadership of the famous Sheik Uthman Bn Fodiye. Before the Jihad movement in Hausaland (now Northern Nigeria), women were left in ignorance and were used and dumped like old kitchen utensils. The sheik and his followers did their best to actualising women’s right to education by using their female family members as role models who were highly educated and renowned scholars. After the Jihad with the establishment of an Islamic state, the women scholars initiated different strategies to teach the generality of the women. The most efficient strategy was the ‘Yantaru Movement founded by Nana Asma’u the daughter of Sheikh Uthman Bn Fodiye in collaboration with her sisters around 1840. The ‘Yantaru movement is a women’s educational movement aimed at enlightening women in rural and urban areas. The move helped in massively mobilizing women for education. In addition to town pupils, women from villages and throughout the nooks and crannies of metropolitan Sokoto participated in the movement in the search for knowledge. Thus, the birth of the ‘Yantaru system of women’s education. The ‘Yantaru operates the three-tier system at village, town and the metropolitan capital of Sokoto. ‘Yantaru functions include imparting knowledge to elderly women and young girls. Step down enlightenment program on returning home. The most effective medium of communication in the ‘Yantaru movement was through poetry where scholars composed educational poems which were memorized by the ‘Yantaru, who on return recite it to fellow women at home. Through this system, many women were educated. This paper translated and examines one of such educative poems written by the second leader of the ‘Yantaru Movement Maryam Bn Uthman Bn Fodiye in 1855.

Keywords: English, Hausa language, public enlightenment, Maryam Bint Uthman Ibn Foduye

Procedia PDF Downloads 334
134 Integrated Livestock and Cropping System and Sustainable Rural Development in India: A Case Study

Authors: Nizamuddin Khan

Abstract:

Integrated livestock and cropping system is very old agricultural practice since antiquity. It is an eco-friendly and sustainable farming system in which both the resources are optimally and rationally utilized through the recycling and re-utilization of their by-products. Indian farmers follow in- farm integrated farming system unlike in developed countries where both farm and off-farm system prevailed. The data on different components of the integrated farming system is very limited and that too is not widely available in published form. The primary source is the only option for understanding the mechanism, process, evaluation and performance of integrated livestock cropping system. Researcher generated data through the field survey of sampled respondents from sampled villages from Bulandshahr district of Uttar Pradesh. The present paper aims to understand the component group of system, degree, and level of integration, level of generation of employment, income, improvement in farm ecology, the economic viability of farmers and check in rural-urban migration. The study revealed that area witnessed intra farm integration in which both livestock and cultivation of crops take place on the same farm. Buffalo, goat, and poultry are common components of integration. Wheat, paddy, sugarcane and horticulture are among the crops. The farmers are getting 25% benefit more than those who do not follow the integrated system. Livestock husbandry provides employment and income through the year, especially during agriculture offseason. 80% of farmers viewed that approximately 35% of the total expenditure incurred is met from the livestock sector. Landless, marginal and small farmers are highly benefited from agricultural integration. About 70% of farmers acknowledged that using wastes of animals and crops the soil ecology is significantly maintained. Further, the integrated farming system is helpful in reducing rural to urban migration. An incentive with credit facilities, assured marketing, technological aid and government support is urgently needed for sustainable development of agriculture and farmers.

Keywords: integrated, recycle, employment, soil ecology, sustainability

Procedia PDF Downloads 144
133 Changing Pattern of Drug Abuse: An Outpatient Department Based Study from India

Authors: Anshu Gupta, Charu Gupta

Abstract:

Background: Punjab, a border state in India has achieved notoriety world over for its drug abuse problem. People right from school kids to elderly are hooked to drugs. This pattern of substance abuse is prevalent in both cities and villages alike. Excess of younger population in India has further aggravated the situation. It is feared that the benefits of India’s economic growth may well be negated by the rising substance abuse especially in this part of the country. It is quite evident that the pattern of substance abuse tends to change over time which is an impediment in the formulation of effective strategies to tackle this issue. Aim: Purpose of the study was to ascertain the change in the pattern of drug abuse for two consecutive years in the out patient department (OPD) population. Method: The study population comprised of all the patients reporting for deaddiction to the psychiatry outpatient department over a period of twelve months for two consecutive years. All the patients were evaluated by the International Classification of Diseases; 10 criteria for substance abuse/dependence. Results: A considerably high prevalence of substance abuse was present in the Indian population. In general, there was an increase in prevalence from first to the second year, especially among the female population. Increase in prevalence of substance abuse appeared to be more prominent among the younger age group of both the sexes. A significant increase in intravenous drug abuse was observed. Peer pressure and parental imitation were the major factors fueling substance abuse. Precipitation or fear of withdrawal symptoms was the major factor preventing abstinence. Substance abuse had a significant effect on the health and interpersonal relations of these patients. Summary/Conclusion: Drug abuse and addiction are on the rise throughout India. Changing cultural values, increasing economic stress and dwindling supportive bonds appear to be leading to initiation of substance abuse. Need of the hour is to formulate a comprehensive strategy to bring about an overall reduction in the use of drugs.

Keywords: deaddiction, peer pressure, parental imitation, substance abuse/dependance

Procedia PDF Downloads 177
132 Assessing Livelihood Vulnerability to Climate Change and Adaptation Strategies in Rajanpur District, Pakistan

Authors: Muhammad Afzal, Shahbaz Mushtaq, Duc-Anh-An-Vo, Kathryn Reardon Smith, Thanh Ma

Abstract:

Climate change has become one of the most challenging environmental issues in the 21st century. Climate change-induced natural disasters, especially floods, are the major factors of livelihood vulnerability, impacting millions of individuals worldwide. Evaluating and mitigating the effects of floods requires an in-depth understanding of the relationship between vulnerability and livelihood capital assets. Using an integrated approach, sustainable livelihood framework, and system thinking approach, the study developed a conceptual model of a generalized livelihood system in District Rajanpur, Pakistan. The model visualizes the livelihood vulnerability system as a whole and identifies the key feedback loops likely to influence the livelihood vulnerability. The study suggests that such conceptual models provide effective communication and understanding tools to stakeholders and decision-makers to anticipate the problem and design appropriate policies. It can also serve as an evaluation technique for rural livelihood policy and identify key systematic interventions. The key finding of the study reveals that household income, health, and education are the major factors behind the livelihood vulnerability of the rural poor of District Rajanpur. The Pakistani government tried to reduce the livelihood vulnerability of the region through different income, health, and education programs, but still, many changes are required to make these programs more effective especially during the flood times. The government provided only cash to vulnerable and marginalized families through income support programs, but this study suggests that along with the cash, the government must provide seed storage facilities and access to crop insurance to the farmers. Similarly, the government should establish basic health units in villages and frequent visits of medical mobile vans should be arranged with advanced medical lab facilities during and after the flood.

Keywords: livelihood vulnerability, rural communities, flood, sustainable livelihood framework, system dynamics, Pakistan

Procedia PDF Downloads 26
131 Cilubaba: An Agriculture-Based Education Tool through Congklak Traditional Game as an Introduction of Home Garden for Children in Cibanteng, Bogor

Authors: Yoni Elviandri, Vivi Fitriyanti, Agung Surya Wijaya, Suryani Humayyah, Muhammad Alif Azizi

Abstract:

The massive development of computing power and internet access nowadays is marked by audiovisual games and computers which are known as electronic games, one of the examples is online games. This kind of game can be found everywhere in Indonesia, both in the cities and even the villages. In the present time, online games are becoming a popular games in various layers of the community, one of them does happen to elementary school students. As the online games spread over, the traditional games gradually fade away and even thought as an old-fashioned game. Contrary, traditional games actually have the better and higher educational values such as patience, honesty, integrity and togetherness value which cannot be found in online games which are more to individualist. A brand new set of education tools is necessary to provide a convenience, safe and fun place for children to play around but still contains educational values. One interesting example goes to Cilulaba is an agricultural-based playground. It is a good place for children to play and learn as it was planned to entertain children to play around as well as introducing agriculture to them. One of the games is a 1990’s well-known traditional game which its name is Congklak. Congklak is an agricultural-based traditional game and it also introduces the home garden to the children. Some of the Cilulaba’s aims are to protect the existence of nation’s cultural inheritance through Congklak traditional game, as a tool to introduce the agriculture to the children through the methods of Congklak traditional game and giving explanation related to the advantages of a “healthy home garden” to the children. The expected output from this place is to deliver a good understanding about agriculture to the children and make them begin to love it to make an aesthetic home garden and enhance the optimalisation usage of home garden that will support the availability of various edible plants in productive and health households. The proposed method in this Student Creative Program in Society Service is Participatory Rural Appraisal (PRA) method.

Keywords: Cilubaba, Congklak, traditional game, agricultural-based playground

Procedia PDF Downloads 414
130 Ethnobotanical Medicines for Treating Snakebites among the Indigenous Maya Populations of Belize

Authors: Kerry Hull, Mark Wright

Abstract:

This paper brings light to ethnobotanical medicines used by the Maya of Belize to treat snake bites. The varying ecological zones of Belize boast over fifty species of snakes, nine of which are poisonous and dangerous to humans. Two distinct Maya groups occupy neighboring regions of Belize, the Q’eqchi’ and the Mopan. With Western medical care often far from their villages, what traditional methods are used to treat poisonous snake bites? Based primarily on data gathered with native consultants during the authors’ fieldwork with both groups, this paper details the ethnobotanical resources used by the Q’eqchi’ and Mopan traditional healers. The Q’eqchi’ and Mopan most commonly rely on traditional ‘bush doctors’ (ilmaj in Mopan), both male and female, and specialized ‘snake doctors’ to heal bites from venomous snakes. First, this paper presents each plant employed by healers for bites for the nine poisonous snakes in Belize along with the specific botanical recipes and methods of application for each remedy. Individual chemical and therapeutic qualities of some of those plants are investigated in an effort to explain their possible medicinal value for different toxins or the symptoms caused by those toxins. In addition, this paper explores mythological associations with certain snakes that inform local understanding regarding which plants are considered efficacious in each case, arguing that numerous oral traditions (recorded by the authors) help to link botanical medicines to episodes within their mythic traditions. Finally, the use of plants to counteract snakebites brought about through sorcery is discussed inasmuch as some snakes are seen as ‘helpers’ of sorcerers. Snake bites given under these circumstances can only be cured by those who know both the proper corresponding plant(s) and ritual prayer(s). This paper provides detailed documentation of traditional ethnomedicines and practices from the dying art of traditional Maya healers and argues for multi-faceted diagnostic techniques to determine toxin severity, the presence or absence of sorcery, and the appropriate botanical remedy.

Keywords: ethnobotany, Maya, medicine, snake bites

Procedia PDF Downloads 215
129 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 52
128 Human Factors Interventions for Risk and Reliability Management of Defence Systems

Authors: Chitra Rajagopal, Indra Deo Kumar, Ila Chauhan, Ruchi Joshi, Binoy Bhargavan

Abstract:

Reliability and safety are essential for the success of mission-critical and safety-critical defense systems. Humans are part of the entire life cycle of defense systems development and deployment. The majority of industrial accidents or disasters are attributed to human errors. Therefore, considerations of human performance and human reliability are critical in all complex systems, including defense systems. Defense systems are operating from the ground, naval and aerial platforms in diverse conditions impose unique physical and psychological challenges to the human operators. Some of the safety and mission-critical defense systems with human-machine interactions are fighter planes, submarines, warships, combat vehicles, aerial and naval platforms based missiles, etc. Human roles and responsibilities are also going through a transition due to the infusion of artificial intelligence and cyber technologies. Human operators, not accustomed to such challenges, are more likely to commit errors, which may lead to accidents or loss events. In such a scenario, it is imperative to understand the human factors in defense systems for better systems performance, safety, and cost-effectiveness. A case study using Task Analysis (TA) based methodology for assessment and reduction of human errors in the Air and Missile Defense System in the context of emerging technologies were presented. Action-oriented task analysis techniques such as Hierarchical Task Analysis (HTA) and Operator Action Event Tree (OAET) along with Critical Action and Decision Event Tree (CADET) for cognitive task analysis was used. Human factors assessment based on the task analysis helps in realizing safe and reliable defense systems. These techniques helped in the identification of human errors during different phases of Air and Missile Defence operations, leading to meet the requirement of a safe, reliable and cost-effective mission.

Keywords: defence systems, reliability, risk, safety

Procedia PDF Downloads 111
127 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 53
126 Study of Radiological and Chemical Effects of Uranium in Ground Water of SW and NE Punjab, India

Authors: Komal Saini, S. K. Sahoo, B. S. Bajwa

Abstract:

The Laser Fluorimetery Technique has been used for the microanalysis of uranium content in water samples collected from different sources like the hand pumps, tube wells in the drinking water samples of SW & NE Punjab, India. The geographic location of the study region in NE Punjab is between latitude 31.21º- 32.05º N and longitude 75.60º-76.14º E and for SW Punjab is between latitude 29.66º-30.48º N and longitude 74.69º-75.54º E. The purpose of this study was mainly to investigate the uranium concentration levels of ground water being used for drinking purposes and to determine its health effects, if any, to the local population of these regions. In the present study 131 samples of drinking water collected from different villages of SW and 95 samples from NE, Punjab state, India have been analyzed for chemical and radiological toxicity. In the present investigation, uranium content in water samples of SW Punjab ranges from 0.13 to 908 μgL−1 with an average of 82.1 μgL−1 whereas in samples collected from NE- Punjab, it ranges from 0 to 28.2 μgL−1 with an average of 4.84 μgL−1. Thus, revealing that in the SW- Punjab 54 % of drinking water samples have uranium concentration higher than international recommended limit of 30 µgl-1 (WHO, 2011) while 35 % of samples exceeds the threshold of 60 µgl-1 recommended by our national regulatory authority of Atomic Energy Regulatory Board (AERB), Department of Atomic Energy, India, 2004. On the other hand in the NE-Punjab region, none of the observed water sample has uranium content above the national/international recommendations. The observed radiological risk in terms of excess cancer risk ranges from 3.64x10-7 to 2.54x10-3 for SW-Punjab, whereas for NE region it ranges from 0 to 7.89x10-5. The chemical toxic effect in terms of Life-time average Daily Dose (LDD) and Hazard Quotient (HQ) have also been calculated. The LDD for SW-Punjab varies from 0.0098 to 68.46 with an average of 6.18 µg/ kg/day whereas for NE region it varies from 0 to 2.13 with average 0.365 µg/ kg/day, thus indicating presence of chemical toxicity in SW Punjab as 35% of the observed samples in the SW Punjab are above the recommendation limit of 4.53 µg/ kg/day given by AERB for 60 µgl-1 of uranium. Maximum & Minimum values for hazard quotient for SW Punjab is 0.002 & 15.11 with average 1.36 which is considerably high as compared to safe limit i.e. 1. But for NE Punjab HQ varies from 0 to 0.47. The possible sources of high uranium observed in the SW- Punjab will also be discussed.

Keywords: uranium, groundwater, radiological and chemical toxicity, Punjab, India

Procedia PDF Downloads 354
125 Seismic Retrofit of Reinforced Concrete Structures by Highly Dissipative Technologies

Authors: Stefano Sorace, Gloria Terenzi, Giulia Mazzieri, Iacopo Costoli

Abstract:

The prolonged earthquake sequence that struck several urban agglomerations and villages in Central Italy, starting from 24 August 2016 through January 2017, highlighted once again the seismic vulnerability of pre-normative reinforced concrete (R/C) structures. At the same time, considerable damages were surveyed in recently retrofitted R/C buildings too, one of which also by means of a dissipative bracing system. The solution adopted for the latter did not expressly take into account the performance of non-structural elements, and namely of infills and partitions, confirming the importance of their dynamic interaction with the structural skeleton. Based on this consideration, an alternative supplemental damping-based retrofit solution for this representative building, i.e., a school with an R/C structure situated in the municipality of Norcia, is examined in this paper. It consists of the incorporation of dissipative braces equipped with pressurized silicone fluid viscous (FV) dampers, instead of the BRAD system installed in the building, the delayed activation of which -caused by the high stiffness of the constituting metallic dampers- determined the observed non-structural damages. Indeed, the alternative solution proposed herein, characterized by dissipaters with mainly damping mechanical properties, guarantees an earlier activation of the protective system. A careful assessment analysis, preliminarily carried out to simulate and check the case study building performance in originally BRAD-retrofitted conditions, confirms that the interstorey drift demand related to the Norcia earthquake's mainshock and aftershocks is beyond the response capacity of infills. The verification analyses developed on the R/C structure, including the FV-damped braces, highlight their higher performance, giving rise to a completely undamaged response both of structural and non-structural elements up to the basic design earthquake normative level of seismic action.

Keywords: dissipative technologies, performance assessment analysis, concrete structures, seismic retrofit

Procedia PDF Downloads 99
124 E-Government Development in Nigeria, 'Bank Verification No': An Anti-Corruption Tool

Authors: Ernest C. Nwadinobi, Amanda Peart, Carl Adams

Abstract:

The leading countries like the USA, UK and some of the European countries have moved their focus away from just developing the e-government platform towards just the electronic services which aim at providing access to information to its citizens or customers, but they have gone to make significant backroom changes that can accommodate this electronic service being provided to its customers or citizens. E-government has moved from just providing electronic information to citizens and customers alike to serving their needs. In developing countries like Nigeria, the enablement of e-government is being used as an anti-corruption tool. The introduction of the Bank verification number (BVN) scheme by the Central Bank of Nigeria, has helped the government in not just saving money but also protecting customer’s transaction and enhancing confidence in the banking sector. This has helped curtail the high rate of cyber and financial crime that has been part of the system. The use of BVN as an anti-corruption tool in Nigeria came at a time there was need for openness, accountability, and discipline, after years of robbing the treasury and recklessness in handling finances. As there has not been a defined method for measuring the strength or success of e-government development, in this case BVN, in Nigeria, progress will remain at the same level. The implementation strategy of the BVN in Nigeria has mostly been a quick fix, quick win solution. In fact, there is little or no indication to show evidence of a framework for e-government. Like other leading countries, there is the need for proper implementation of strategy and framework especially towards a customer orientated process, which will accommodate every administrative body of the government institution including private business rather than focusing on a non-flexible organisational structure. The development of e-government must have a strategy and framework for it to work, and this strategy must enclose every public administration and will not be limited to any individual bodies or organization. A defined framework or monitoring method must be put in place to help evaluate and benchmark government development in e-government. This framework must follow the same concept or principles. In censorious analyses of the existing methods, this paper will denote areas that must be included in the existing approach to be able to channel e-government development towards its defined strategic objectives.

Keywords: Bank Verification No (BVN), quick-fix, anti-corruption, quick-win

Procedia PDF Downloads 139
123 The Effect of General Data Protection Regulation on South Asian Data Protection Laws

Authors: Sumedha Ganjoo, Santosh Goswami

Abstract:

The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.

Keywords: data privacy, GDPR, Asia, data protection laws

Procedia PDF Downloads 55
122 Participatory Action Research for Strengthening Health Systems: A Freirian Critique from a Community Based Study Conducted in the Northern Areas of Pakistan

Authors: Sohail Bawani, Kausar S. Khan, Rozina Karmaliani, Shehnaz Mir

Abstract:

Action research (AR) is one of the types of health systems research (HSR), and participatory action research (PAR) is known for being effective in health systems strengthening (HSS). The current literature on PAR for HSS cites numerous examples and case studies that led to improve health services; build child health information system; increase knowledge and awareness of people about health problems, and identify pathways for institutional and policy change by engaging people in research. But examples of marginalized communities being agents of change in health governance are not common in health systems research (HSR). This approach to PAR is at the heart of Paolo Freire’s Social Transformation Theory and Critical Consciousness building, which was used to design a community-based PAR study in the Northern/mountainous areas of Pakistan. The purpose of the study was to understand the place and role of marginalized communities in strengthening existing health governance structure (health facility and village health committees and health boards) by taking marginalized communities as partners. Community meetings were carried out to identify who is living at the social, political, cultural and economic margins in 40 different villages. Participatory reflection and analysis (PRA) tools were used during the meeting to facilitate identification. Focus group discussions were conducted with marginalized groups using PRA tools and family ethnographies with marginalized families identified through group discussions. Findings of the study revealed that for the marginalized health systems constitute more than just delivery of health services, but it also embraces social determinants that surround systems and its governance. The paper argues that from Frerian perspective people’s participation should not only be limited to knowledge generation. People must be seen active users of the knowledge that they generate for achieving better health outcomes that they want to achieve in the time to come. PAR provides a pathway to the marginalized in playing a role in health governance. The study dissemination planned shall engage the marginalized in a dialogue with service providers so that together a role for the marginalized can be outlined.

Keywords: participatory action research, health systems, marginalized, health services

Procedia PDF Downloads 255
121 Cyber-Social Networks in Preventing Terrorism: Topological Scope

Authors: Alessandra Rossodivita, Alexei Tikhomirov, Andrey Trufanov, Nikolay Kinash, Olga Berestneva, Svetlana Nikitina, Fabio Casati, Alessandro Visconti, Tommaso Saporito

Abstract:

It is well known that world and national societies are exposed to diverse threats: anthropogenic, technological, and natural. Anthropogenic ones are of greater risks and, thus, attract special interest to researchers within wide spectrum of disciplines in efforts to lower the pertinent risks. Some researchers showed by means of multilayered, complex network models how media promotes the prevention of disease spread. To go further, not only are mass-media sources included in scope the paper suggests but also personificated social bots (socbots) linked according to reflexive theory. The novel scope considers information spread over conscious and unconscious agents while counteracting both natural and man-made threats, i.e., infections and terrorist hazards. Contrary to numerous publications on misinformation disseminated by ‘bad’ bots within social networks, this study focuses on ‘good’ bots, which should be mobilized to counter the former ones. These social bots deployed mixture with real social actors that are engaged in concerted actions at spreading, receiving and analyzing information. All the contemporary complex network platforms (multiplexes, interdependent networks, combined stem networks et al.) are comprised to describe and test socbots activities within competing information sharing tools, namely mass-media hubs, social networks, messengers, and e-mail at all phases of disasters. The scope and concomitant techniques present evidence that embedding such socbots into information sharing process crucially change the network topology of actor interactions. The change might improve or impair robustness of social network environment: it depends on who and how controls the socbots. It is demonstrated that the topological approach elucidates techno-social processes within the field and outline the roadmap to a safer world.

Keywords: complex network platform, counterterrorism, information sharing topology, social bots

Procedia PDF Downloads 138
120 Flood Hazard Assessment and Land Cover Dynamics of the Orai Khola Watershed, Bardiya, Nepal

Authors: Loonibha Manandhar, Rajendra Bhandari, Kumud Raj Kafle

Abstract:

Nepal’s Terai region is a part of the Ganges river basin which is one of the most disaster-prone areas of the world, with recurrent monsoon flooding causing millions in damage and the death and displacement of hundreds of people and households every year. The vulnerability of human settlements to natural disasters such as floods is increasing, and mapping changes in land use practices and hydro-geological parameters is essential in developing resilient communities and strong disaster management policies. The objective of this study was to develop a flood hazard zonation map of Orai Khola watershed and map the decadal land use/land cover dynamics of the watershed. The watershed area was delineated using SRTM DEM, and LANDSAT images were classified into five land use classes (forest, grassland, sediment and bare land, settlement area and cropland, and water body) using pixel-based semi-automated supervised maximum likelihood classification. Decadal changes in each class were then quantified using spatial modelling. Flood hazard mapping was performed by assigning weights to factors slope, rainfall distribution, distance from the river and land use/land cover on the basis of their estimated influence in causing flood hazard and performing weighed overlay analysis to identify areas that are highly vulnerable. The forest and grassland coverage increased by 11.53 km² (3.8%) and 1.43 km² (0.47%) from 1996 to 2016. The sediment and bare land areas decreased by 12.45 km² (4.12%) from 1996 to 2016 whereas settlement and cropland areas showed a consistent increase to 14.22 km² (4.7%). Waterbody coverage also increased to 0.3 km² (0.09%) from 1996-2016. 1.27% (3.65 km²) of total watershed area was categorized into very low hazard zone, 20.94% (60.31 km²) area into low hazard zone, 37.59% (108.3 km²) area into moderate hazard zone, 29.25% (84.27 km²) area into high hazard zone and 31 villages which comprised 10.95% (31.55 km²) were categorized into high hazard zone area.

Keywords: flood hazard, land use/land cover, Orai river, supervised maximum likelihood classification, weighed overlay analysis

Procedia PDF Downloads 320
119 The Impact of the Constitution of Myanmar on the Political Power of Aung San Suu Kyi and the Rohingya Conflict

Authors: Nur R. Daut

Abstract:

The objective of this paper is to offer an insight on how political power inequality has contributed and exacerbated the political violence towards the Rohingya ethnic group in Myanmar. In particular, this paper attempts to illustrate how power inequality in the country has prevented Myanmar’s leader Aung San Suu Kyi from taking effective measures on the issue. The research centers on the question of why Aung San Suu Kyi has been seen as not doing enough to stop the persecution of the Rohingya ethnic group ever since she was appointed the State Counsellor to the Myanmar government. As a Nobel Peace Prize laureate, Suu Kyi’s lack of action on the matter has come under severe criticism by the international community. Many have seen this as Suu Kyi’s failure to establish democracy and allowing mass killing to spread in the country. The real question that many perhaps should be asking, however, is how much power Suu Kyi actually holds within the government which is still heavily controlled by the military or Tatmadaw. This paper argues that Suu Kyi’s role within the government is limited which hinders constructive and effective measures to be taken on the Rohingya issue. Political power in this research is being measured by 3 factors: control over events such as burning of Rohingya villages, control over resources such as land ownership and media and control over actors such the Tatmadaw, police force and civil society who are greatly needed to ease and resolve the conflict. In order to illustrate which individuals or institution have control over all the 3 above factors, this paper will first study the constitution of Myanmar. The constitution will also be able to show the asymmetrical power relations as it will provide evidence as to how much political power Suu Kyi holds within the government in comparison to other political actors and institutions. Suu Kyi’s role as a state counsellor akin to a prime minister is a newly created position as the current constitution of Myanmar bars anyone with a foreign spouse from holding the post of a president in the country. This is already an indication of the inequality of political power between Suu Kyi and the military. Apart from studying the constitution of Myanmar, Suu Kyi’s speeches and various interviews are also studied in order to answer the research question. Unfortunately, Suu Kyi’s limited political power also involves the Buddhist monks in Myanmar who have held significant influence throughout the history of the country. This factor further prevents Suu Kyi from preserving the sanctity of human rights in Myanmar.

Keywords: Aung San Suu Kyi, constitution of Myanmar, inequality, political power, political violence, Rohingya, Tatmadaw

Procedia PDF Downloads 96
118 New Advanced Medical Software Technology Challenges and Evolution of the Regulatory Framework in Expert Software, Artificial Intelligence, and Machine Learning

Authors: Umamaheswari Shanmugam, Silvia Ronchi

Abstract:

Software, artificial intelligence, and machine learning can improve healthcare through innovative and advanced technologies that can use the large amount and variety of data generated during healthcare services every day; one of the significant advantages of these new technologies is the ability to get experience and knowledge from real-world use and to improve their performance continuously. Healthcare systems and institutions can significantly benefit because the use of advanced technologies improves the efficiency and efficacy of healthcare. Software-defined as a medical device, is stand-alone software that is intended to be used for patients for one or more of these specific medical intended uses: - diagnosis, prevention, monitoring, prediction, prognosis, treatment or alleviation of a disease, any other health conditions, replacing or modifying any part of a physiological or pathological process–manage the received information from in vitro specimens derived from the human samples (body) and without principal main action of its principal intended use by pharmacological, immunological or metabolic definition. Software qualified as medical devices must comply with the general safety and performance requirements applicable to medical devices. These requirements are necessary to ensure high performance and quality and protect patients' safety. The evolution and the continuous improvement of software used in healthcare must consider the increase in regulatory requirements, which are becoming more complex in each market. The gap between these advanced technologies and the new regulations is the biggest challenge for medical device manufacturers. Regulatory requirements can be considered a market barrier, as they can delay or obstacle the device's approval. Still, they are necessary to ensure performance, quality, and safety. At the same time, they can be a business opportunity if the manufacturer can define the appropriate regulatory strategy in advance. The abstract will provide an overview of the current regulatory framework, the evolution of the international requirements, and the standards applicable to medical device software in the potential market all over the world.

Keywords: artificial intelligence, machine learning, SaMD, regulatory, clinical evaluation, classification, international requirements, MDR, 510k, PMA, IMDRF, cyber security, health care systems

Procedia PDF Downloads 69
117 Entrepreneurship Development for Socio-Economic Prosperity of Pineapple Growers in Nagaland

Authors: Kaushal Jha

Abstract:

India is one of the major producers of pineapple contributing a significant part in terms of total world production of pineapple. It has spread throughout tropical and subtropical regions as a commercial fruit crop. In India, the cultivation of pineapple is confined to high rainfall and humid coastal region in the peninsular India and hilly areas of Northeastern region of India. Nagaland, one of the potential states of North-East India is basically an agrarian state having been endowed with favourable agro climatic conditions and a rich bio-diversity of flora and fauna. Agriculture contributes significantly to the state’s economy. Pineapple is an important fruit crop grown in Nagaland and has a very high potential for doubling the income of farmers in comparison to the traditional practices of rice cultivation. This requires improved farm management practices as well as a genre of entrepreneurial intentions and capabilities. The present study aimed at analysing the dimensions of entrepreneurial skill development among the pineapple growers of Nagaland. Medziphema block under Dimapur district is considered as the pineapple valley of Nagaland. Pineapple grown in this area is considered as one of the best in Nagaland in terms of its sweetness as well as quality. A multistage sampling was undertaken for conducting the present study. Medziphema rural development block was selected purposively for this purpose. The sample was drawn from three leading pineapple producing villages under Medziphema block. The respondents were selected based on random sampling procedure. Data were collected from the respondents using a pre-tested structured schedule. Major findings revealed that entrepreneurial skill development was one of the important factors to augment the increase in the sustained flow of income among the target farmers. Development of farm leadership, improving self esteem, innovativeness, economic motivation, orientation towards management of farm resources and value addition were identified as important dimensions for promoting entrepreneurial skill development and bringing prosperity to the farmers.

Keywords: skill development, entrepreneurial attributes, pineapple growers, Nagaland

Procedia PDF Downloads 133
116 The Challenges of Digital Crime Nowadays

Authors: Bendes Ákos

Abstract:

Digital evidence will be the most widely used type of evidence in the future. With the development of the modern world, more and more new types of crimes have evolved and transformed. For this reason, it is extremely important to examine these types of crimes in order to get a comprehensive picture of them, with which we can help the authorities work. In 1865, with early technologies, people were able to forge a picture of a quality that is not even recognized today. With the help of today's technology, authorities receive a lot of false evidence. Officials are not able to process such a large amount of data, nor do they have the necessary technical knowledge to get a real picture of the authenticity of the given evidence. The digital world has many dangers. Unfortunately, we live in an age where we must protect everything digitally: our phones, our computers, our cars, and all the smart devices that are present in our personal lives and this is not only a burden on us, since companies, state and public utilities institutions are also forced to do so. The training of specialists and experts is essential so that the authorities can manage the incoming digital evidence at some level. When analyzing evidence, it is important to be able to examine it from the moment it is created. Establishing authenticity is a very important issue during official procedures. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. Otherwise, they will not have sufficient probative value and in case of doubt, the court will always decide in favor of the defendant. One of the most common problems in the world of digital data and evidence is doubt, which is why it is extremely important to examine the above-mentioned problems. The most effective way to avoid digital crimes is to prevent them, for which proper education and knowledge are essential. The aim is to present the dangers inherent in the digital world and the new types of digital crimes. After the comparison of the Hungarian investigative techniques with international practice, modernizing proposals will be given. A sufficiently stable yet flexible legislation is needed that can monitor the rapid changes in the world and not regulate afterward but rather provide an appropriate framework. It is also important to be able to distinguish between digital and digitalized evidence, as the degree of probative force differs greatly. The aim of the research is to promote effective international cooperation and uniform legal regulation in the world of digital crimes.

Keywords: digital crime, digital law, cyber crime, international cooperation, new crimes, skepticism

Procedia PDF Downloads 40
115 A Corpus-Linguistic Analysis of Online Iranian News Coverage on Syrian Revolution

Authors: Amaal Ali Al-Gamde

Abstract:

The Syrian revolution is a major issue in the Middle East, which draws in world powers and receives a great focus in international mass media since 2011. The heavy global reliance on cyber news and digital sources plays a key role in conveying a sense of bias to a wide range of online readers. Thus, based on the assumption that media discourse possesses ideological implications, this study investigates the representation of Syrian revolution in online media. The paper explores the discursive constructions of anti and pro-government powers in Syrian revolution in 1000,000-word corpus of Fars online reports (an Iranian news agency), issued between 2013 and 2015. Taking a corpus assisted discourse analysis approach, the analysis investigates three types of lexicosemantic relations, the semantic macrostructures within which the two social actors are framed, the lexical collocations characterizing the news discourse and the discourse prosodies they tell about the two sides of the conflict. The study utilizes computer-based approaches, sketch engine and AntConc software to minimize the bias of the subjective analysis. The analysis moves from the insights of lexical frequencies and keyness scores to examine themes and the collocational patterns. The findings reveal the Fars agency’s ideological mode of representations in reporting events of Syrian revolution in two ways. The first is by stereotyping the opposition groups under the umbrella of terrorism, using words such as (law breakers, foreign-backed groups, militant groups, terrorists) to legitimize the atrocities of security forces against protesters and enhance horror among civilians. The second is through emphasizing the power of the government and depicting it as the defender of the Arab land by foregrounding the discourse of international conspiracy against Syria. The paper concludes discussing the potential importance of triangulating corpus linguistic tools with critical discourse analysis to elucidate more about discourses and reality.

Keywords: discourse prosody, ideology, keyness, semantic macrostructure

Procedia PDF Downloads 110
114 Georgiana G. King’s The Way of Saint James. A Pioneer Cultural Guide of a Pilgrimage Route

Authors: Paula Pita-Galán

Abstract:

In 1920 Georgiana Goddard King, an Art Historian and Professor at Bryn Mawr College (PA, USA), published The Way of Saint James (New York: P.G. Putnam’s Sons), one of the earliest modern guides of this pilgrimage route. In its three volumes, the author described the towns and villages crossed by the Camino, talking about the history, traditions, monuments, and the people that she had met during her own pilgrimage together with the photographer Edith H. Lowber. The two women walked the route from Toulouse to Santiago in several journeys that took place between 1911 and 1914, travelling with funds of the Hispanic Society of New York. The cultural interest that motivated the journey explains how King intertwines in her narration history, anthropology, geography, art history, and religion, giving; as a result, the book targeted intellectuals, curious travelers, and tourist rather than pilgrims in a moment in which the pilgrimage to Santiago had almost disappeared as a practice. The Way of Saint James is barely known nowadays, so the aim of this research is disseminate it, focusing on the modernity of its approach and pointing at the link that it has with Georgiana King’s understanding of art as a product of the culture and civilization that produces it. In this paper, we will analyze The Way of Saint James in its historiographical context as it was written during the rise of the interest on Spain and its culture in the United States of America; paying special attention on the relationship of the author with the Hispanic Society and sir Archer Milton Huntington. On the other hand, we will look into Georgiana Goddard King’s work as an scholar by analyzing her works and the personal papers (letters, notes, and manuscripts) that she left in Bryn Mawr College, where I have been researching with a Fulbright grant. As a result, we will understand the pioneer approach of this unique guide of the Way of Saint James as a reflection of Georgiana King’s own modernity as an scholar. The wide cultural interests of King gave, as a result, a guide that offers a transversal knowledge of The Way of Saint James, together with King’s impressions and experiences, in the same way of current guides but far from the ‘objective’ and formalist methodology followed by her colleagues. This kind of modernity was badly understood at her time and helped the oblivion of this book as well as her author.

Keywords: georgiana goddard king, the way of saint james, pilgrimage, cultural heritage, guide

Procedia PDF Downloads 98