Search results for: identification of risks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4387

Search results for: identification of risks

4147 Enterprise Risk Management: A Future Outlook

Authors: Ruchi Agarwal, Jake Ansell

Abstract:

Austerity impacts on all aspects of society. Companies into the future will have to be more capable of dealing with the risks they face. Enterprise Risk Management (ERM) has widely been accepted in recent years as an approach to manage risks within businesses. ERM attempts to tackle risk holistically with gains from opportunities in a managing risk and reduction in the risk of failure. The paper reviews merits and demerits of approaches to risk management in regard to antifragility. A qualitative study has investigated current practices and the problems with ERM implementation by interviewing over 25 chief risk officers and senior management. The findings indicate the gap in ERM description, understanding, and implementation. The paper suggests risk learning and expertise knowledge supports development of effective enterprise risk management by designing systems with inherent resilience.

Keywords: risk management, interviews, antifragility, failure

Procedia PDF Downloads 521
4146 Studying in Private Muslim Schools in Australia: Implications for Identity, Religiosity, and Adjustment

Authors: Hisham Motkal Abu-Rayya, Maram Hussein Abu-Rayya

Abstract:

Education in religious private schools raises questions regarding identity, belonging and adaptation in multicultural Australia. This research project aimed at examined cultural identification styles among Australian adolescent Muslims studying in Muslim schools, adolescents’ religiosity and the interconnections between cultural identification styles, religiosity, and adaptation. Two Muslim high school samples were recruited for the purposes of this study, one from Muslim schools in metropolitan Sydney and one from Muslim schools in metropolitan Melbourne. Participants filled in a survey measuring themes of the current study. Findings revealed that the majority of Australian adolescent Muslims showed a preference for the integration identification style (55.2%); separation was less prevailing (26.9%), followed by assimilation (9.7%) and marginalisation (8.3%). Supporting evidence suggests that the styles of identification were valid representation of the participants’ identification. A series of hierarchical regression analyses revealed that while adolescents’ preference for integration of their cultural and Australian identities was advantageous for a range of their psychological and socio-cultural adaptation measures, marginalisation was consistently the worst. Further hierarchical regression analyses showed that adolescent Muslims’ religiosity was better for a range of their adaptation measures compared to their preference for an integration acculturation style. Theoretical and practical implications of these findings are discussed.

Keywords: adaptation, identity, multiculturalism, religious school education

Procedia PDF Downloads 277
4145 Smartphone Video Source Identification Based on Sensor Pattern Noise

Authors: Raquel Ramos López, Anissa El-Khattabi, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

An increasing number of mobile devices with integrated cameras has meant that most digital video comes from these devices. These digital videos can be made anytime, anywhere and for different purposes. They can also be shared on the Internet in a short period of time and may sometimes contain recordings of illegal acts. The need to reliably trace the origin becomes evident when these videos are used for forensic purposes. This work proposes an algorithm to identify the brand and model of mobile device which generated the video. Its procedure is as follows: after obtaining the relevant video information, a classification algorithm based on sensor noise and Wavelet Transform performs the aforementioned identification process. We also present experimental results that support the validity of the techniques used and show promising results.

Keywords: digital video, forensics analysis, key frame, mobile device, PRNU, sensor noise, source identification

Procedia PDF Downloads 405
4144 The Impact of Geopolitical Risks and the Oil Price Fluctuations on the Kuwaiti Financial Market

Authors: Layal Mansour

Abstract:

The aim of this paper is to identify whether oil price volatility or geopolitical risks can predict future financial stress periods or economic recessions in Kuwait. We construct the first Financial Stress Index for Kuwait (FSIK) that includes informative vulnerable indicators of the main financial sectors: the banking sector, the equities market, and the foreign exchange market. The study covers the period from 2000 to 2020, so it includes the two recent most devastating world economic crises with oil price fluctuation: the Covid-19 pandemic crisis and Ukraine-Russia War. All data are taken by the central bank of Kuwait, the World Bank, IMF, DataStream, and from Federal Reserve System St Louis. The variables are computed as the percentage growth rate, then standardized and aggregated into one index using the variance equal weights method, the most frequently used in the literature. The graphical FSIK analysis provides detailed information (by dates) to policymakers on how internal financial stability depends on internal policy and events such as government elections or resignation. It also shows how monetary authorities or internal policymakers’ decisions to relieve personal loans or increase/decrease the public budget trigger internal financial instability. The empirical analysis under vector autoregression (VAR) models shows the dynamic causal relationship between the oil price fluctuation and the Kuwaiti economy, which relies heavily on the oil price. Similarly, using vector autoregression (VAR) models to assess the impact of the global geopolitical risks on Kuwaiti financial stability, results reveal whether Kuwait is confronted with or sheltered from geopolitical risks. The Financial Stress Index serves as a guide for macroprudential regulators in order to understand the weakness of the overall Kuwaiti financial market and economy regardless of the Kuwaiti dinar strength and exchange rate stability. It helps policymakers predict future stress periods and, thus, address alternative cushions to confront future possible financial threats.

Keywords: Kuwait, financial stress index, causality test, VAR, oil price, geopolitical risks

Procedia PDF Downloads 52
4143 Assessment of Risk Factors in Residential Areas of Bosso in Minna, Nigeria

Authors: Junaid Asimiyu Mohammed, Olakunle Docas Tosin

Abstract:

The housing environment in many developing countries is fraught with risks that have potential negative impacts on the lives of the residents. The study examined the risk factors in residential areas of two neighborhoods in Bosso Local Government Areas of Minna in Nigeria with a view to determining the level of their potential impacts. A sample of 378 households was drawn from the estimated population of 22,751 household heads. The questionnaire and direct observation were used as instruments for data collection. The data collected were analyzed using the Relative Importance Index (RII) rule to determine the level of the potential impact of the risk factors while ArcGIS was used for mapping the spatial distribution of the risks. The study established that the housing environment of Angwan Biri and El-Waziri areas of Bosso is poor and vulnerable as 26% of the houses were not habitable and 57% were only fairly habitable. The risks of epidemics, building collapse and rainstorms were evident in the area as 53% of the houses had poor ventilation; 20% of residents had no access to toilets; 47% practiced open waste dumping; 46% of the houses had cracked walls while 52% of the roofs were weak and sagging. The results of the analysis of the potential impact of the risk factors indicate a RII score of 0.528 for building collapse, 0.758 for rainstorms and 0.830 for epidemics, indicating a moderate to very high level of potential impacts. The mean RII score of 0.639 shows a significant potential impact of the risk factors. The study recommends the implementation of sanitation measures, provision of basic urban facilities and neighborhood revitalization through housing infrastructure retrofitting as measures to mitigate the risks of disasters and improve the living conditions of the residents of the study area.

Keywords: assessment, risk, residential, Nigeria

Procedia PDF Downloads 19
4142 Evaluation of Disease Risk Variables in the Control of Bovine Tuberculosis

Authors: Berrin Şentürk

Abstract:

In this study, due to the recurrence of bovine tuberculosis, in the same areas, the risk factors for the disease were determined and evaluated at the local level. This study was carried out in 32 farms where the disease was detected in the district and center of Samsun province in 2014. Predetermined risk factors, such as farm, environmental and economic risks, were investigated with the survey method. It was predetermined that risks in the three groups are similar to the risk variables of the disease on the global scale. These risk factors that increase the susceptibility of the infection must be understood by the herd owners. The risk-based contagious disease management system approach should be applied for bovine tuberculosis by farmers, animal health professionals and public and private sector decision makers.

Keywords: bovine tuberculosis, disease management, control, outbreak, risk analysis

Procedia PDF Downloads 370
4141 Native Language Identification with Cross-Corpus Evaluation Using Social Media Data: ’Reddit’

Authors: Yasmeen Bassas, Sandra Kuebler, Allen Riddell

Abstract:

Native language identification is one of the growing subfields in natural language processing (NLP). The task of native language identification (NLI) is mainly concerned with predicting the native language of an author’s writing in a second language. In this paper, we investigate the performance of two types of features; content-based features vs. content independent features, when they are evaluated on a different corpus (using social media data “Reddit”). In this NLI task, the predefined models are trained on one corpus (TOEFL), and then the trained models are evaluated on different data using an external corpus (Reddit). Three classifiers are used in this task; the baseline, linear SVM, and logistic regression. Results show that content-based features are more accurate and robust than content independent ones when tested within the corpus and across corpus.

Keywords: NLI, NLP, content-based features, content independent features, social media corpus, ML

Procedia PDF Downloads 102
4140 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 348
4139 Identification of Nonlinear Systems Using Radial Basis Function Neural Network

Authors: C. Pislaru, A. Shebani

Abstract:

This paper uses the radial basis function neural network (RBFNN) for system identification of nonlinear systems. Five nonlinear systems are used to examine the activity of RBFNN in system modeling of nonlinear systems; the five nonlinear systems are dual tank system, single tank system, DC motor system, and two academic models. The feed forward method is considered in this work for modelling the non-linear dynamic models, where the K-Means clustering algorithm used in this paper to select the centers of radial basis function network, because it is reliable, offers fast convergence and can handle large data sets. The least mean square method is used to adjust the weights to the output layer, and Euclidean distance method used to measure the width of the Gaussian function.

Keywords: system identification, nonlinear systems, neural networks, radial basis function, K-means clustering algorithm

Procedia PDF Downloads 440
4138 Risk Management Practices In The Construction Industry In Malawi

Authors: Taonga Temwani Chibaka

Abstract:

This qualitative research study was conducted to identify the common risk factors that affect the construction industry in Malawi in the building and infrastructure (civil works) projects. The study then evaluates the possible risk responses that are done to mitigate the various risk factors that were identified. I addition the research also established the barriers to risk management implementation with lastly mapping out as where the identified risk factors fall on which stage of the project and then also map out the knowledge areas that need to be worked on the cases on Malawian construction industry in order to mitigate most of the identified risk factors. The study involved the interviewing the professionals from the construction industry in Malawi where insights and ideas were collected, analysed and interpreted. The key study findings show that risks related to clients group are perceived as most critical followed by the contractor related, consultant related and then external group related factors respectively where preventive measures are the most applied risk response technique where the aim to avoid most of the risk factors from happening. Most of the risk factors identified were internal risks and in managerial category which suggested that risk planning was to be emphasized at pre-contract stage to minimize these risks since a bigger percentage of the risk factors were mapped out at implementation stage. Furthermore, barriers to risk management were identified and the key barriers were lack of awareness; lack of knowledge; lack of formal policies in place; regarded as costly and limited time which resulted in proposing that regulating authorities to purposefully introduce intense training on risk management to make known of this new knowledge area. The study then recommends that organisation should formally implement risk management where policies should be introduced to enforce all parties to undertake this. Risk planning was regarded as paramount and this to be done from pre-contract phase so as to mitigate 80% of the risk factors. Finally, training should be done on all project management knowledge areas.

Keywords: risk management, risk factors, risks, malawi

Procedia PDF Downloads 253
4137 An Improved OCR Algorithm on Appearance Recognition of Electronic Components Based on Self-adaptation of Multifont Template

Authors: Zhu-Qing Jia, Tao Lin, Tong Zhou

Abstract:

The recognition method of Optical Character Recognition has been expensively utilized, while it is rare to be employed specifically in recognition of electronic components. This paper suggests a high-effective algorithm on appearance identification of integrated circuit components based on the existing methods of character recognition, and analyze the pros and cons.

Keywords: optical character recognition, fuzzy page identification, mutual correlation matrix, confidence self-adaptation

Procedia PDF Downloads 508
4136 Analysis of Supply Chain Risk Management Strategies: Case Study of Supply Chain Disruptions

Authors: Marcelo Dias Carvalho, Leticia Ishikawa

Abstract:

Supply Chain Risk Management refers to a set of strategies used by companies to avoid supply chain disruption caused by damage at production facilities, natural disasters, capacity issues, inventory problems, incorrect forecasts, and delays. Many companies use the techniques of the Toyota Production System, which in a way goes against a better management of supply chain risks. This paper studies key events in some multinationals to analyze the trade-off between the best supply chain risk management techniques and management policies designed to create lean enterprises. The result of a good balance of these actions is the reduction of losses, increased customer trust in the company and better preparedness to face the general risks of a supply chain.

Keywords: just in time, lean manufacturing, supply chain disruptions, supply chain management

Procedia PDF Downloads 310
4135 Legal Allocation of Risks: A Computational Analysis of Force Majeure Clauses

Authors: Farshad Ghodoosi

Abstract:

This article analyzes the effect of supervening events in contracts. Contracts serve an important function: allocation of risks. In spite of its importance, the case law and the doctrine are messy and inconsistent. This article provides a fresh look at excuse doctrines (i.e., force majeure, impracticability, impossibility, and frustration) with a focus on force majeure clauses. The article makes the following contributions: First, it furnishes a new conceptual and theoretical framework of excuse doctrines. By distilling the decisions, it shows that excuse doctrines rests on the triangle of control, foreseeability, and contract language. Second, it analyzes force majeure clauses used by S&P 500 companies to understand the stickiness and similarity of such clauses and the events they cover. Third, using computational and statistical tools, it analyzes US cases since 1810 in order to assess the weight given to the triangle of control, foreseeability, and contract language. It shows that the control factor plays an important role in force majeure analysis, while the contractual interpretation is the least important factor. The Article concludes that it is the standard for control -whether the supervening event is beyond the control of the party- that determines the outcome of cases in the force majeure context and not necessarily the contractual language. This article has important implications on COVID-19-related contractual cases. Unlike the prevailing narrative that it is the language of the force majeure clause that’s determinative, this article shows that the primarily focus of the inquiry will be on whether the effects of COVID-19 have been beyond the control of the promisee. Normatively, the Article suggests that the trifactor of control, foreseeability, and contractual language are not effective for allocation of legal risks in times of crises. It puts forward a novel approach to force majeure clauses whereby that the courts should instead focus on the degree to which parties have relied on (expected) performance, in particular during the time of crisis.

Keywords: contractual risks, force majeure clauses, foreseeability, control, contractual language, computational analysis

Procedia PDF Downloads 113
4134 Identification of Stakeholders and Practices of Inclusive Education

Authors: Luis Javier Serrano-Tamayo

Abstract:

This paper focuses on the recent interest in the concept of inclusion from multiple areas of social sciences, but particularly from the academic studies on what do scholars mean when they refer to inclusive education. Therefore, this paper has been based on a three-year systematic review of near two hundred peer-reviewed documents in the last two decades. The results illustrate some of the use, misuse, and abuse of inclusive education as well as shed some light on the identification of the different stakeholders involved in the dynamic concept of inclusive education and their suggested practices.

Keywords: inclusion, inclusive education, inclusive practices, education stakeholders

Procedia PDF Downloads 194
4133 Time Truncated Group Acceptance Sampling Plans for Exponentiated Half Logistic Distribution

Authors: Srinivasa Rao Gadde

Abstract:

In this article, we considered a group acceptance sampling plans for exponentiated half logistic distribution when the life-test is truncated at a pre-specified time. It is assumed that the index parameter of the exponentiated half logistic distribution is known. The design parameters such as the number of groups and the acceptance number are obtained by satisfying the producer’s and consumer’s risks at the specified quality levels in terms of medians and 10th percentiles under the assumption that the termination time and the number of items in each group are pre-fixed. Finally, an example is given to illustration the methodology.

Keywords: group acceptance sampling plan, operating characteristic, consumer and producer’s risks, truncated life-test

Procedia PDF Downloads 306
4132 Design of Bacterial Pathogens Identification System Based on Scattering of Laser Beam Light and Classification of Binned Plots

Authors: Mubashir Hussain, Mu Lv, Xiaohan Dong, Zhiyang Li, Bin Liu, Nongyue He

Abstract:

Detection and classification of microbes have a vast range of applications in biomedical engineering especially in detection, characterization, and quantification of bacterial contaminants. For identification of pathogens, different techniques are emerging in the field of biomedical engineering. Latest technology uses light scattering, capable of identifying different pathogens without any need for biochemical processing. Bacterial Pathogens Identification System (BPIS) which uses a laser beam, passes through the sample and light scatters off. An assembly of photodetectors surrounded by the sample at different angles to detect the scattering of light. The algorithm of the system consists of two parts: (a) Library files, and (b) Comparator. Library files contain data of known species of bacterial microbes in the form of binned plots, while comparator compares data of unknown sample with library files. Using collected data of unknown bacterial species, highest voltage values stored in the form of peaks and arranged in 3D histograms to find the frequency of occurrence. Resulting data compared with library files of known bacterial species. If sample data matching with any library file of known bacterial species, sample identified as a matched microbe. An experiment performed to identify three different bacteria particles: Enterococcus faecalis, Pseudomonas aeruginosa, and Escherichia coli. By applying algorithm using library files of given samples, results were compromising. This system is potentially applicable to several biomedical areas, especially those related to cell morphology.

Keywords: microbial identification, laser scattering, peak identification, binned plots classification

Procedia PDF Downloads 122
4131 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 31
4130 One Health Approach: The Importance of Improving the Identification of Waterborne Bacteria in Austrian Water

Authors: Aurora Gitto, Philipp Proksch

Abstract:

The presence of various microorganisms (bacteria, fungi) in surface water and groundwater represents an important issue for human health worldwide. The matrix-assisted laser desorption/ionization-time of flight mass spectrometry (MALDI-TOF-MS) has emerged as a promising and reliable tool for bacteria identification in clinical diagnostic microbiology and environmental strains thanks to an ionization technique that uses a laser energy absorbing matrix to create ions from large molecules with minimal fragmentation. The study aims first to conceptualise and set up library information and create a comprehensive database of MALDI-TOF-MS spectra from environmental water samples. The samples were analysed over a year (2021-2022) using membrane filtration methodology (0.45 μm and 0.22 μm) and then isolated on R2A agar for a period of 5 days and Yeast extract agar growing at 22 °C up to 4 days and 37 °C for 48 hours. The undetected organisms by MALDI-TOF-MS were analysed by PCR and then sequenced. The information obtained by the sequencing was further implemented in the MALDI-TOF-MS library. Among the culturable bacteria, the results show how the incubator temperature affects the growth of some genera instead of others, as demonstrated by Pseudomonas sp., which grows at 22 °C, compared to Bacillus sp., which is abundant at 37 °C. The bacteria community shows a variation in composition also between the media used, as demonstrated with R2A agar which has been defined by a higher presence of organisms not detected compared to YEA. Interesting is the variability of the Genus over one year of sampling and how the seasonality impacts the bacteria community; in fact, in some sampling locations, we observed how the composition changed, moving from winter to spring and summer. In conclusion, the bacteria community in groundwater and river bank filtration represents important information that needs to be added to the library to simplify future water quality analysis but mainly to prevent potential risks to human health.

Keywords: water quality, MALDI-TOF-MS, sequencing, library

Procedia PDF Downloads 54
4129 Parametric Modeling for Survival Data with Competing Risks Using the Generalized Gompertz Distribution

Authors: Noora Al-Shanfari, M. Mazharul Islam

Abstract:

The cumulative incidence function (CIF) is a fundamental approach for analyzing survival data in the presence of competing risks, which estimates the marginal probability for each competing event. Parametric modeling of CIF has the advantage of fitting various shapes of CIF and estimates the impact of covariates with maximum efficiency. To calculate the total CIF's covariate influence using a parametric model., it is essential to parametrize the baseline of the CIF. As the CIF is an improper function by nature, it is necessary to utilize an improper distribution when applying parametric models. The Gompertz distribution, which is an improper distribution, is limited in its applicability as it only accounts for monotone hazard shapes. The generalized Gompertz distribution, however, can adapt to a wider range of hazard shapes, including unimodal, bathtub, and monotonic increasing or decreasing hazard shapes. In this paper, the generalized Gompertz distribution is used to parametrize the baseline of the CIF, and the parameters of the proposed model are estimated using the maximum likelihood approach. The proposed model is compared with the existing Gompertz model using the Akaike information criterion. Appropriate statistical test procedures and model-fitting criteria will be used to test the adequacy of the model. Both models are applied to the ‘colon’ dataset, which is available in the “biostat3” package in R.

Keywords: competing risks, cumulative incidence function, improper distribution, parametric modeling, survival analysis

Procedia PDF Downloads 58
4128 The Correlation between Territory Planning and Logistics Development: Methodological Approach

Authors: Ebtissem Sassi, Abdellatif Benabdelhafid, Sami Hammami

Abstract:

Congestion, pollution and space misuse are the major risks in the hinterland. Management of these risks is a major issue for all the actors intervening in territory management. A good mastery of these risks is based on the consideration of environmental and physical constraints since the implementation of a policy integrates simultaneously an efficient use, territorial resources, and financial resources which become increasingly rare. Yet, this balance can be difficult to establish simultaneously by all the actors. Indeed, every actor has often the tendency to favor these objectives in detriment to others. In this framework, we have fixed the objective of designing and achieving a model which will centralize multidisciplinary data and serve the analysis tool as well as a decision support tool. In this article, we will elaborate some methodological axes allowing the good management of the territory system through (i) determination of the structural factors of the decision support system, (ii) integration of methods tools favoring the territorial decisional process. Logistics territory geographic information system is a model dealing with this issue. The objective of this model is to facilitate the exchanges between the actors around a common question which was the research subject of human sciences researchers (geography, economy), nature sciences (ecology) as well as finding an optimal solution for simultaneous responses to all these objectives.

Keywords: complexity, territory, logistics, territory planning, conceptual model, GIS, MCA

Procedia PDF Downloads 107
4127 Evaluation Study of Easily Identification of Tactile Symbol on Body Soap Bottle

Authors: K. Doi, T. Nishimura, H. Fujimoto, Y. Hoshikawa, T. Wada

Abstract:

Japanese industrial standard (JIS) association established one JIS (JIS S 0021) regarding packaging accessible design for people with visual impairments and elderly people in 2000. Recently, tactile symbol on shampoo bottle has been known as one of package accessible design and more effectively used. However, it has been said that people with visual impairment have been not been in trouble with difficulty of identifying body soap bottle between three bottles such as body soap bottle, shampoo bottle, and conditioner bottle. Japanese low vision association asked JIS association to solve this problem. JIS association and Japan cosmetic industry association constituted one review team for solving the problem. The review team asked our research team to make a proposal regarding new tactile symbol on body soap bottle. We conducted user survey and maker survey regarding tactile symbol on body soap bottle with easily identification. Seven test tactile symbol marks were elected in our proposed tactile symbols. In this study, we evaluate easily identification of tactile symbol on body soap bottle. Six visual impaired subjects were participated in our experiment. These subjects were asked to identify body soap bottle between three bottles such as body soap bottle, shampoo bottle, and conditioner bottle. The test tactile symbol on body soap were presented in random order. The test tactile symbols were produced by use of our originally developed 3D raised equipment. From our study, test tactile symbol marks with easily identification were made a short list of our proposed tactile symbols. This knowledge will be helpful in revision of ISO 11156.

Keywords: tactile symbol, easily identification, body soap, people with visual impairments

Procedia PDF Downloads 290
4126 Solving Crimes through DNA Methylation Analysis

Authors: Ajay Kumar Rana

Abstract:

Predicting human behaviour, discerning monozygotic twins or left over remnant tissues/fluids of a single human source remains a big challenge in forensic science. Recent advances in the field of DNA methylations which are broadly chemical hallmarks in response to environmental factors can certainly help to identify and discriminate various single-source DNA samples collected from the crime scenes. In this review, cytosine methylation of DNA has been methodologically discussed with its broad applications in many challenging forensic issues like body fluid identification, race/ethnicity identification, monozygotic twins dilemma, addiction or behavioural prediction, age prediction, or even authenticity of the human DNA. With the advent of next-generation sequencing techniques, blooming of DNA methylation datasets and together with standard molecular protocols, the prospect of investigating and solving the above issues and extracting the exact nature of the truth for reconstructing the crime scene events would be undoubtedly helpful in defending and solving the critical crime cases.

Keywords: DNA methylation, differentially methylated regions, human identification, forensics

Procedia PDF Downloads 293
4125 Rethinking the Air Quality Health Index: Harmonizing Health Protection and Climate Mitigation

Authors: Kimberly Tasha Jiayi Tang, Changqing Lin, Zhe Wang, Tze-Wai Wong, Md. Shakhaoat Hossain, Jian Yu, Alexis Lau

Abstract:

Hong Kong has practiced a risk-based Air Quality Health Index (AQHI) system that sums hospitalization risks associated with short-term exposure to air pollu-tants. As an air pollution risk communication tool, it informs the public about the current air quality, anchoring around the World Health Organization's (WHO) 2005 Air Quality Guidelines (AQGs). Given the WHO's recent update in 2021, assessing how Hong Kong’s air quality risk communication can be en-hanced using these updated guidelines is essential. Hong Kong’s AQHI is lim-ited by solely focusing on short-term health risks, which could lead the public to underestimate cumulative health impacts. Therefore, we propose the intro-duction of a composite AQHI that reports both long-term and short-term health risks. Additionally, the WHO interim targets will be considered as anchor points for various health risk categories. Furthermore, with the increasing ozone levels in Hong Kong and Southern China due to improved NOx mitigation measures, it has been a challenging task in balancing health protection against climate mitigation. However, our findings present a promising outlook. Despite the rise in ozone levels, the combined health risks in Hong Kong and Guang-dong have seen a decline, largely due to reductions in NO2 and PM concentra-tions, both having significant health implications. By shifting from a concentra-tion-based approach to a health risk-based system like the AQHI, our study highlights the prospective of harmonizing health protection and climate mitiga-tion goals. This health-focused framework suggests that rigorous NOx controls can effective-ly serve both objectives in parallel.

Keywords: air quality management, air quality health index, health risk management, air pollution

Procedia PDF Downloads 36
4124 Health Risks Evaluation of Heavy Metals in Sea Food from Persian ‎Gulf

Authors: Mohsen Ehsanpour, Maryam Ehsanpour, ‎Majid Afkhami, Fatemeh Afkhami ‎

Abstract:

Heavy metals are increasingly being released into natural waters from geological and anthropogenic sources. The distribution of several heavy metals (Cd, Pb) was investigated in muscle, liver in six different fish species seasonally collected in Persian Gulf (autumn 2009-summer 2010). The concentrations of all metals were lower in flesh than those recorded in liver due to their physiological roles. The THQ index for fish was calculated. Estimation of target hazard quotients calculations for the contaminated fish consumption was calculated to evaluate the effect of pollution on health. Total metal THQs values (Pb and Cd) for adults were 0.05 and 0.04 in Bushehr and Bandar-Genaveh, respectively, and for children they were 0.08 and 0.05 in Bandar-Abbas and Bandar-Lengeh, respectively.

Keywords: Persian Gulf, heavy metals, health risks, THQ index

Procedia PDF Downloads 671
4123 Genetic Identification of Crop Cultivars Using Barcode System

Authors: Kesavan Markkandan, Ha Young Park, Seung-Il Yoo, Sin-Gi Park, Junhyung Park

Abstract:

For genetic identification of crop cultivars, insertions/deletions (InDel) markers have been preferred currently because they are easy to use, PCR based, co-dominant and relatively abundant. However, new InDels need to be developed for genetic studies of new varieties due to the difference of allele frequencies in InDels among the population groups. These new varieties are evolved with low levels of genetic diversity in specific genome loci with high recombination rate. In this study, we described soybean barcode system approach based on InDel makers, each of which is specific to a variation block (VB), where the genomes split by all assumed recombination sites. Firstly, VBs in crop cultivars were mined for transferability to VB-specific InDel markers. Secondly, putative InDels in the VB regions were identified for the development of barcode system by analyzing particular cultivar’s whole genome data. Thirdly, common VB-specific InDels from all cultivars were selected by gel electrophoresis, which were converted as 2D barcode types according to comparing amplicon polymorphisms in the five cultivars to the reference cultivar. Finally, the polymorphism of the selected markers was assessed with other cultivars, and the barcode system that allows a clear distinction among those cultivars is described. The same approach can be applicable for other commercial crops. Hence, VB-based genetic identification not only minimize the molecular markers but also useful for assessing cultivars and for marker-assisted breeding in other crop species.

Keywords: variation block, polymorphism, InDel marker, genetic identification

Procedia PDF Downloads 354
4122 Exploring the Risks and Vulnerabilities of Child Trafficking in West Java, Indonesia

Authors: B. Rusyidi, D. Mariana

Abstract:

Although reforms in trafficking regulations have taken place since 2007, Indonesia is still struggling to fight child trafficking. This study aimed to identify and assess risk factors and vulnerabilities in the life of trafficked children prior to, during, and after being trafficked in order to inform the child protection system and its policies. The study was qualitative and utilized in-depth interviews to collect data. Data were gathered in 2014 and 2015 from 15 trafficked and sexually exploited girls aged 14 to 17 years originating from West Java. Social workers, safe home personnel and parents were also included as informants. Data analysis was guided by the ecological perspective and theme analyses. The study found that risks and vulnerabilities of the victims were associated with conditions at various levels of the environment. At the micro level, risk factors and vulnerabilities included young age, family conflict/violence, involvement with the “wrong” circle of friends/peers, family poverty, lack of social and economic support for the victim’s family, and psychological damages due to trafficking experiences. At the mezzo level, the lack of structured activities after school, economic inequality, stigma towards victims, lack of services for victims, and minimum public education on human trafficking were among the community hazards that increased the vulnerability and risks. Gender inequality, consumerism, the view of children as assets, corruption, weak law enforcement, the lack of institutional support, and community-wide ignorance regarding trafficking were found as factors that increased risks and vulnerabilities at the macro level. The findings from the study underline the necessity to reduce risk factors and promote protective factors at the individual, family, community and societal levels. Shifting the current focus from tertiary to primary/prevention policies and improving institutional efforts are pressing needs in the context of reducing child trafficking in Indonesia. The roles of human service providers including social work also should be promoted.

Keywords: child trafficking, child sexual exploitation, ecological perspective, risks and vulnerabilities

Procedia PDF Downloads 249
4121 Clothes Identification Using Inception ResNet V2 and MobileNet V2

Authors: Subodh Chandra Shakya, Badal Shrestha, Suni Thapa, Ashutosh Chauhan, Saugat Adhikari

Abstract:

To tackle our problem of clothes identification, we used different architectures of Convolutional Neural Networks. Among different architectures, the outcome from Inception ResNet V2 and MobileNet V2 seemed promising. On comparison of the metrices, we observed that the Inception ResNet V2 slightly outperforms MobileNet V2 for this purpose. So this paper of ours proposes the cloth identifier using Inception ResNet V2 and also contains the comparison between the outcome of ResNet V2 and MobileNet V2. The document here contains the results and findings of the research that we performed on the DeepFashion Dataset. To improve the dataset, we used different image preprocessing techniques like image shearing, image rotation, and denoising. The whole experiment was conducted with the intention of testing the efficiency of convolutional neural networks on cloth identification so that we could develop a reliable system that is good enough in identifying the clothes worn by the users. The whole system can be integrated with some kind of recommendation system.

Keywords: inception ResNet, convolutional neural net, deep learning, confusion matrix, data augmentation, data preprocessing

Procedia PDF Downloads 148
4120 The Effect of Age on the Outcome of Teenage Pregnancy in Nigeria: A Demographic Study

Authors: Chinelo Igwenagu

Abstract:

Teenage childbearing in developing countries has been a thing of great concern as it has often led to a number of socioeconomic problems both to the society and to the families affected. The outcome of teenage pregnancy has been generally associated with higher rates of maternal morbidity and mortality, greater risks for delivery complications, low-birth weight infants and child mortality. As a result of teenagers’ physiological and social immaturity and their lack of adequate prenatal care, health risks associated with their pregnancies and childbearing are more pronounced than those of older women. Therefore this study has examined the relationship between the age of teenagers and the outcome of teenage pregnancy. Based on this study, the result of the analysis shows that both teenagers and older mothers suffer similarly during child bearing. Hence improve medical care is paramount in all the situations.

Keywords: childbearing, mortality, Nigeria, pregnancy, prematurity, teenagers

Procedia PDF Downloads 388
4119 Experimental Assessment of the Effectiveness of Judicial Instructions and of Expert Testimony in Improving Jurors’ Evaluation of Eyewitness Evidence

Authors: Alena Skalon, Jennifer L. Beaudry

Abstract:

Eyewitness misidentifications can sometimes lead to wrongful convictions of innocent people. This occurs in part because jurors tend to believe confident eyewitnesses even when the identification took place under suggestive conditions. Empirical research demonstrated that jurors are often unaware of the factors that can influence the reliability of eyewitness identification. Most common legal safeguards that are designed to educate jurors about eyewitness evidence are judicial instructions and expert testimony. To date, very few studies assessed the effectiveness of judicial instructions and most of them found that judicial instructions make jurors more skeptical of eyewitness evidence or do not have any effect on jurors’ judgments. Similar results were obtained for expert testimony. However, none of the previous studies focused on the ability of legal safeguards to improve jurors’ assessment of evidence obtained from suggestive identification procedures—this is one of the gaps addressed by this paper. Furthermore, only three studies investigated whether legal safeguards improve the ultimate accuracy of jurors’ judgments—that is, whether after listening to judicial instructions or expert testimony jurors can differentiate between accurate and inaccurate eyewitnesses. This presentation includes two studies. Both studies used genuine eyewitnesses (i.e., eyewitnesses who watched the crime) and manipulated the suggestiveness of identification procedures. The first study manipulated the presence of judicial instructions; the second study manipulated the presence of one of two types of expert testimony: a traditional, verbal expert testimony or expert testimony accompanied by visual aids. All participant watched a video-recording of an identification procedure and of an eyewitness testimony. The results indicated that neither judicial instructions nor expert testimony affected jurors’ judgments. However, consistent with the previous findings, when the identification procedure was non-suggestive, jurors believed accurate eyewitnesses more often than inaccurate eyewitnesses. When the procedure was suggestive, jurors believed accurate and inaccurate eyewitnesses at the same rate. The paper will discuss the implications of these studies and directions for future research.

Keywords: expert testimony, eyewitness evidence, judicial instructions, jurors’ decision making, legal safeguards

Procedia PDF Downloads 148
4118 Dual-use UAVs in Armed Conflicts: Opportunities and Risks for Cyber and Electronic Warfare

Authors: Piret Pernik

Abstract:

Based on strategic, operational, and technical analysis of the ongoing armed conflict in Ukraine, this paper will examine the opportunities and risks of using small commercial drones (dual-use unmanned aerial vehicles, UAV) for military purposes. The paper discusses the opportunities and risks in the information domain, encompassing both cyber and electromagnetic interference and attacks. The paper will draw conclusions on a possible strategic impact to the battlefield outcomes in the modern armed conflicts by the widespread use of dual-use UAVs. This article will contribute to filling the gap in the literature by examining based on empirical data cyberattacks and electromagnetic interference. Today, more than one hundred states and non-state actors possess UAVs ranging from low cost commodity models, widely are dual-use, available and affordable to anyone, to high-cost combat UAVs (UCAV) with lethal kinetic strike capabilities, which can be enhanced with Artificial Intelligence (AI) and Machine Learning (ML). Dual-use UAVs have been used by various actors for intelligence, reconnaissance, surveillance, situational awareness, geolocation, and kinetic targeting. Thus they function as force multipliers enabling kinetic and electronic warfare attacks and provide comparative and asymmetric operational and tactical advances. Some go as far as argue that automated (or semi-automated) systems can change the character of warfare, while others observe that the use of small drones has not changed the balance of power or battlefield outcomes. UAVs give considerable opportunities for commanders, for example, because they can be operated without GPS navigation, makes them less vulnerable and dependent on satellite communications. They can and have been used to conduct cyberattacks, electromagnetic interference, and kinetic attacks. However, they are highly vulnerable to those attacks themselves. So far, strategic studies, literature, and expert commentary have overlooked cybersecurity and electronic interference dimension of the use of dual use UAVs. The studies that link technical analysis of opportunities and risks with strategic battlefield outcomes is missing. It is expected that dual use commercial UAV proliferation in armed and hybrid conflicts will continue and accelerate in the future. Therefore, it is important to understand specific opportunities and risks related to the crowdsourced use of dual-use UAVs, which can have kinetic effects. Technical countermeasures to protect UAVs differ depending on a type of UAV (small, midsize, large, stealth combat), and this paper will offer a unique analysis of small UAVs both from the view of opportunities and risks for commanders and other actors in armed conflict.

Keywords: dual-use technology, cyber attacks, electromagnetic warfare, case studies of cyberattacks in armed conflicts

Procedia PDF Downloads 71