Search results for: insider threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1013

Search results for: insider threat

653 Migration, Violent Extremism and Gang Violence in Trinidad and Tobago

Authors: Raghunath Mahabir

Abstract:

This paper provides an analysis of the existing evidence on the relationships between the migration of Venezuelans into Trinidad and Tobago, violent extremism and gang violence. Arguing that there is a dearth of reliable data on the subject matter, the paper fills the gap by providing relevant definitions of terms used, discusses the sources of data and identifies the causes for this migration and the subsequent ramifications for Trinidad and Tobago and for the migrants themselves. A simple but clear classification pointing to the nexus between migration gang violence and violent extremism is developed, following the logic of migration of criminals(gang members), the need to link with local gangs and the view that certain elements within the TnT society has become radicalized to the point where violent extremism is being displayed in different ways. The paper highlights implications for further policy debate:the imperatives for more effective communication between government officials responsible for migration and those personnel who are tasked with countering violent extremism and gang violence: promoting and executing better integration and social inclusion policies which are necessary to minimize social exclusion, and the threat of violent extremist agendas emanating from both Venezuelans and Trinidadians and generally to establish strong analytical framework grounded in stronger definitions, more reliable data and other evidence which can guide further research and analysis and contribute to policy formation.

Keywords: migration, violent extremism, gangs, Venezuela

Procedia PDF Downloads 27
652 Covid-19, Diagnosis with Computed Tomography and Artificial Intelligence, in a Few Simple Words

Authors: Angelis P. Barlampas

Abstract:

Target: The (SARS-CoV-2) is still a threat. AI software could be useful, categorizing the disease into different severities and indicate the extent of the lesions. Materials and methods: AI is a new revolutionary technique, which uses powered computerized systems, to do what a human being does more rapidly, more easily, as accurate and diagnostically safe as the original medical report and, in certain circumstances, even better, saving time and helping the health system to overcome problems, such as work overload and human fatigue. Results: It will be given an effort to describe to the inexperienced reader (see figures), as simple as possible, how an artificial intelligence system diagnoses computed tomography pictures. First, the computerized machine learns the physiologic motives of lung parenchyma by being feeded with normal structured images of the lung tissue. Having being used to recognizing normal structures, it can then easily indentify the pathologic ones, as their images do not fit to known normal picture motives. It is the same way as when someone spends his free time in reading magazines with quizzes, such as <> and <>. General conclusion: The AI mimics the physiological processes of the human mind, but it does that more efficiently and rapidly and provides results in a few seconds, whereas an experienced radiologist needs many days to do that, or even worse, he is unable to accomplish such a huge task.

Keywords: covid-19, artificial intelligence, automated imaging, CT, chest imaging

Procedia PDF Downloads 33
651 Illegal Migration and Refugee Crisis as a Threat to National Security, Economic and Social System: The Bulgarian Case

Authors: Jordan Deliversky

Abstract:

Unlike all conventional forms of migration, migration crisis and migratory processes provide pressure to governments and are being expressed as different phenomenon in relation to nature and forms. The objective of this paper is to present the migration and refugee crisis as revealing numerous challenges faced by authorities responsible for the social and economic stability in Bulgaria as well as those providing conditions for reinforcement of the high level of national security in Bulgaria. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, in the light of the measures provided by the Bulgarian state authorities. The main results show that the society itself is facing the challenge of integrating refugees and migrants, so to be able to comply with the principles and values associated with tolerance to social, religious and cultural differences, and not allowing migrants to become marginalized community. Migration pressure creates a number of risks and threats to the Bulgarian national security. Our country has the capacity and resources to meet these potential threats, as a main factor for minimizing the risks to national security is the improvement of coordination and coherence of actions between various actors serving to the security sector.

Keywords: legislation, migrants, refugees, security, terrorism

Procedia PDF Downloads 320
650 Coping with Climate Change in Agriculture: Perception of Farmers in Oman

Authors: B. S. Choudri

Abstract:

Introduction: Climate change is a major threat to rural livelihoods and to food security in the developing world, including Oman. The aim of this study is to provide a basis for policymakers and researchers in order to understand the impacts of climate change on agriculture and developing adaptation strategies in Oman. Methodology: The data was collected from different agricultural areas across the country with the help of a questionnaire survey among farmers, discussion with community, and observations at the field level. Results: The analysis of data collected from different areas within the country shows a shift in the sowing period of major crops and increased temperatures over recent years. Farmer community is adopting through diversification of crops, use of heat-tolerant species, and improved measures of soil and water conservation. Agriculture has been the main livelihood for most of the farmer communities in rural areas in the country. Conclusions: In order to reduce the effects of climate change at the local and farmer communities, risk reduction would be important along with an in-depth analysis of the vulnerability. Therefore, capacity building of local farmers and providing them with scientific knowledge, mainstreaming adaptation into development activities would be essential with additional funding and subsidies.

Keywords: agriculture, climate change, vulnerability, adaptation

Procedia PDF Downloads 94
649 A Review of Material and Methods Used in Liner Layers in Various Landfills

Authors: S. Taghvamanesh

Abstract:

Modern landfills are highly engineered containment systems that are designed to reduce the environmental and human health impacts of solid waste (trash). In modern landfills, waste is contained by a liner system. The primary goal of the liner system is to isolate the landfill contents from the environment, thereby protecting the soil and groundwater from pollution caused by the leachate of a landfill. Landfill leachate is the most serious threat to groundwater. Therefore, it is necessary to design a system that prevents the penetration of this dangerous substance into the environment. These layers are made up of two basic elements: clay and geosynthetics. Hydraulic conductivity and flexibility are two desirable properties of these materials. There are three different types of liner systems that will be discussed in this paper. According to available data, the current article analyzed materials and methods for constructing liner layers made of distinct leachates, including various harmful components and heavy metals from all around the world. Also, this study attempted to gather data on leachates for each of the sites discussed. In conclusion, every landfill requires a specific type of liner, which depends on the type of leachate that it produces daily. It should also be emphasized that, based on available data, this article focused on the number of landfills that each country or continent possesses.

Keywords: landfill, liner layer, impervious layer, barrier layer

Procedia PDF Downloads 55
648 Zooplankton Health Status Monitoring in Bir Mcherga Dam (Tunisia)

Authors: Sabria Barka, Imen Gdara, Zouhour Ouanès, Samia Mouelhi, Monia El Bour, Amel Hamza-Chaffai

Abstract:

Because dams are large semi-closed reservoirs of pollutants originating from numerous anthropogenic activities, they represent a threat to aquatic life and they should be monitored. The present work aims to use freshwater zooplankton (Copepods and Cladocerans) in order to evaluate the environmental health status of Bir M'cherga dam in Tunisia. Animals were collected in situ monthly between October and August. Genotoxicity (micronucleus test), neurotoxicity (acetylcholinesterase, AChE) and oxidative stress (catalase, CAT and malondialdehyde, MDA) biomarkers were analyzed in zooplankton. High frequencies of micronucleus were observed in zooplankton cells during summer. AChE activities were inhibited during early winter and summer. CAT and MDA biomarker levels showed high seasonal variability, suggesting that animals are permanently exposed to multiple oxidative stress. The results of this study suggest that the Bir Mcherga dam is subject to continuous multi-origin stress, probably amplified by abiotic parameters. It is then recommended to urgently monitor freshwater environments in Tunisia, especially those used for irrigation and consumption.

Keywords: Biomonitoring, Bir Mcherga Dam, cladocerans, copepods, freshwater zooplankton, genotoxicity, neurotoxicity, oxidative stress, Tunisia

Procedia PDF Downloads 47
647 Combating Supplier-Copycatting With Intellectual Property Agreements

Authors: Hubert Pun

Abstract:

When a manufacturer outsources the production of a product, it distributes its intellectual property (IP) into a supply chain that it may not be able to fully control. An IP agreement between a manufacturer and its suppliers is a popular solution to address the challenge of supplier-copycatting. The goal of this paper is to examine the impact of copycatting, from both the supplier and third-party firms, and the effectiveness of an IP agreement. Specifically, we use a game-theoretic approach to examine a system where a manufacturer outsources to a supplier. The supplier and a third-party firm decide whether or not to enter the market with copycat products while the manufacturer selects the level of marketing investment. The manufacturer can reduce the threat of supplier-copycatting by signing an IP agreement. We find that the manufacturer can be worse off from signing an IP agreement with its supplier, even if the IP agreement is costless and perfectly enforceable. We show that a manufacturer can deter copycat products through vertical integration and IP agreements and we outline the instances where each method is preferred. Furthermore, we find that the manufacturer may choose not to invest in quality improvements as a copycat deterrence strategy. We show that the supplier can benefit from the manufacturer’s decision to sign an IP agreement and that the supplier and the consumers can benefit from government regulations against copycat products. Our paper demonstrates the strengths and limitations of various copycat deterrence strategies when a supplier and third-party may produce copycat products.

Keywords: coopetitive supply chain, copycat, government regulation, intellectual property

Procedia PDF Downloads 155
646 The Role of Financial Literacy and Personal Non-Cognitive Attributes in Household Financial Fragility

Authors: Ivana Bulog, Ana Rimac Smiljanić, Sandra Pepur

Abstract:

The financial fragility of households has received increased attention following the recent health crisis, which has created uncertainty and caused increased levels of stress and consequently impaired individual and family well-being. Job losses and/or reduced wages and insecurity increased the number of people that were unable to meet unexpected expenses, which, in many cases, led to increased household debt levels. This presents a threat to the stability of the financial system and the whole economy; therefore, reducing financial fragility and improving financial literacy present challenges for academicians, practitioners, and policymakers. Concerning financial fragility, significant research attention has been devoted to financial knowledge and financial literacy. However, apart from specific knowledge, personal characteristics are of great importance in making financial decisions in the household. Self-efficacy is one of the personal non-cognitive attributes that is a valuable framework for understanding how household financial decisions are made. Thus, this research proposes that individual levels of financial literacy and self-efficacy are related to the indebtedness and financial instability of the household. The primary data were collected using a structured, self-administered online questionnaire, and a snowball sampling method was applied to reach the participants. Preliminary results confirm our assumptions on the influence of financial literacy and self-efficacy on household financial stability.

Keywords: financial literacy, self-efficacy, household financial fragility, well-being

Procedia PDF Downloads 53
645 Fuzzy Inference System for Determining Collision Risk of Ship in Madura Strait Using Automatic Identification System

Authors: Emmy Pratiwi, Ketut B. Artana, A. A. B. Dinariyana

Abstract:

Madura Strait is considered as one of the busiest shipping channels in Indonesia. High vessel traffic density in Madura Strait gives serious threat due to navigational safety in this area, i.e. ship collision. This study is necessary as an attempt to enhance the safety of marine traffic. Fuzzy inference system (FIS) is proposed to calculate risk collision of ships. Collision risk is evaluated based on ship domain, Distance to Closest Point of Approach (DCPA), and Time to Closest Point of Approach (TCPA). Data were collected by utilizing Automatic Identification System (AIS). This study considers several ships’ domain models to give the characteristic of marine traffic in the waterways. Each encounter in the ship domain is analyzed to obtain the level of collision risk. Risk level of ships, as the result in this study, can be used as guidance to avoid the accident, providing brief description about safety traffic in Madura Strait and improving the navigational safety in the area.

Keywords: automatic identification system, collision risk, DCPA, fuzzy inference system, TCPA

Procedia PDF Downloads 519
644 The Effect of Media Effect, Conformity, and Personality on Customers’ Purchase Intention under the Influence of COVID-19 Pandemic

Authors: Tsai-Yun Liao, Fang-Yi Hsu

Abstract:

Consumer behavior and consumption patterns have changed in reacting to the threat of COVID-19 pandemic situations. In order to explore the factors affecting customers’ purchase intention under the influence of the COVID-19 pandemic, this research uses structural equation modeling to explore the effect of media effect, conformity, and personality on customers’ purchase intention. Four essential objectives are investigated: how does media affect the conformity and perceived value of customers; the effect of media effect, conformity, and personality on customers’ purchase intention; the moderating effect of personality; and the mediating effect of perceived value toward purchase intention. By convenience sampling method, 428 questionnaires were collected, and the total number of valid samples was 406. Data analysis and results indicate that: (1) The media effect positively affects conformity. (2) The media effect positively affects perceived value. (3) Both conformity and perceived value positively affect purchase intention. (4) Consumer’s personality of openness to experience moderates the relationship between conformity and purchase intention. (5) Media effect affects purchase intention through the mediating effect of perceived value. This study contributes to the research by providing the factors affecting customers’ purchase intention and to the enterprises by maintaining incumbent customers and attracting potential customers.

Keywords: COVID-19, media effect, conformity, personality, purchase intention

Procedia PDF Downloads 115
643 Political Islam: From Coinage to Hot Debate

Authors: Sajid Iqbal Sheikh

Abstract:

From almost last 100 years 'political islam' has diversity in its usage as terminology in the speculative works of both muslim and non-muslims theorists. 'Political islam' as a term was coined consciously as equal to the 'militant islam' and “Terrorist Islam” vs “Plain Islam” and “Modern Islam” etc. Many paradigm shifts tamed the term into one of the hottest debate of the day. This research paper aims to categorize historical linkage of its coinage, development phases and present status. Based on content analysis, Narrative approach has been utilized for the sake of dexterous conclusion. The paper treasures out that Western dominance on civilizational and political spheres of the holistic world considers 'political islam' a gigantic threat and plans to resist it in theoretic and practical fields simultaneously. Despite minor strategic variances, the ideological followers of Syed Qutab, Mulana Mudoodi and Hasan Al-Bana, are struggling hard for the achievement of their ultimate goal of Political change, specifically in the Muslim World in the prior phase. The paper concludes that Resistance to Islamic resurgence and its Political goals is being observed in most of the Muslim world, especially in the Turkey, Algeria, Egypt, Tsunia and Yeman etc, which is a basic cause of contrary reaction in the Muslim World.

Keywords: electoral process, islamic resurgence, islamic political theory, muslim response, resistance, western hegemony

Procedia PDF Downloads 423
642 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 376
641 Geospatial and Statistical Evidences of Non-Engineered Landfill Leachate Effects on Groundwater Quality in a Highly Urbanised Area of Nigeria

Authors: David A. Olasehinde, Peter I. Olasehinde, Segun M. A. Adelana, Dapo O. Olasehinde

Abstract:

An investigation was carried out on underground water system dynamics within Ilorin metropolis to monitor the subsurface flow and its corresponding pollution. Africa population growth rate is the highest among the regions of the world, especially in urban areas. A corresponding increase in waste generation and a change in waste composition from predominantly organic to non-organic waste has also been observed. Percolation of leachate from non-engineered landfills, the chief means of waste disposal in many of its cities, constitutes a threat to the underground water bodies. Ilorin city, a transboundary town in southwestern Nigeria, is a ready microcosm of Africa’s unique challenge. In spite of the fact that groundwater is naturally protected from common contaminants such as bacteria as the subsurface provides natural attenuation process, groundwater samples have been noted to however possesses relatively higher dissolved chemical contaminants such as bicarbonate, sodium, and chloride which poses a great threat to environmental receptors and human consumption. The Geographic Information System (GIS) was used as a tool to illustrate, subsurface dynamics and the corresponding pollutant indicators. Forty-four sampling points were selected around known groundwater pollutant, major old dumpsites without landfill liners. The results of the groundwater flow directions and the corresponding contaminant transport were presented using expert geospatial software. The experimental results were subjected to four descriptive statistical analyses, namely: principal component analysis, Pearson correlation analysis, scree plot analysis, and Ward cluster analysis. Regression model was also developed aimed at finding functional relationships that can adequately relate or describe the behaviour of water qualities and the hypothetical factors landfill characteristics that may influence them namely; distance of source of water body from dumpsites, static water level of groundwater, subsurface permeability (inferred from hydraulic gradient), and soil infiltration. The regression equations developed were validated using the graphical approach. Underground water seems to flow from the northern portion of Ilorin metropolis down southwards transporting contaminants. Pollution pattern in the study area generally assumed a bimodal pattern with the major concentration of the chemical pollutants in the underground watershed and the recharge. The correlation between contaminant concentrations and the spread of pollution indicates that areas of lower subsurface permeability display a higher concentration of dissolved chemical content. The principal component analysis showed that conductivity, suspended solids, calcium hardness, total dissolved solids, total coliforms, and coliforms were the chief contaminant indicators in the underground water system in the study area. Pearson correlation revealed a high correlation of electrical conductivity for many parameters analyzed. In the same vein, the regression models suggest that the heavier the molecular weight of a chemical contaminant of a pollutant from a point source, the greater the pollution of the underground water system at a short distance. The study concludes that the associative properties of landfill have a significant effect on groundwater quality in the study area.

Keywords: dumpsite, leachate, groundwater pollution, linear regression, principal component

Procedia PDF Downloads 85
640 Rethinking Nigeria's Foreign Policy in the Age of Global Terrorism

Authors: Shuaibu Umar Abdul

Abstract:

This paper examines Nigeria’s foreign policy in the age of global terrorism. It worth saying that the threat of ‘terrorism’ is not peculiar to Western and Middle Eastern countries alone, its tentacles are now spreading all over, Africa inclusive. The issue of domestic terrorism in Nigeria has become pervasive since the return of democratic rule in 1999. This development has never been a witness in any form throughout the year of statehood in Nigeria, the issues of banditry, armed robbery, ritual killing, and criminal activities like kidnapping and pipeline vandalization, the breakdown of law and order, poorly managed infrastructural facilities and corruption remain synonymous to Nigeria. These acts of terrorism no doubt have constituted a challenge that necessitates the paradigm shift in Nigeria’s foreign policy. The study employed the conceptual framework of analysis to lead interrogation; secondary sources were used to generate data while descriptive and content analysis were considered for data presentation and interpretation. In view of the interrogation and discussion on the subject matter, the paper revealed that Nigerian government underrated and underestimated the strength of terrorism within and outside her policy hence, it becomes difficult to address. As a response to the findings and conclusion of the study, the paper recommends among others that Nigeria’s foreign policy has to be rethought, reshaped and remodeled in cognizance to the rising global terrorism for peace, growth and development in the country.

Keywords: foreign policy, globe, Nigeria, rethinking, terrorism

Procedia PDF Downloads 339
639 AI and the Future of Misinformation: Opportunities and Challenges

Authors: Noor Azwa Azreen Binti Abd. Aziz, Muhamad Zaim Bin Mohd Rozi

Abstract:

Moving towards the 4th Industrial Revolution, artificial intelligence (AI) is now more popular than ever. This subject is gaining significance every day and is continually expanding, often merging with other fields. Instead of merely being passive observers, there are benefits to understanding modern technology by delving into its inner workings. However, in a world teeming with digital information, the impact of AI on the spread of disinformation has garnered significant attention. The dissemination of inaccurate or misleading information is referred to as misinformation, posing a serious threat to democratic society, public debate, and individual decision-making. This article delves deep into the connection between AI and the dissemination of false information, exploring its potential, risks, and ethical issues as AI technology advances. The rise of AI has ushered in a new era in the dissemination of misinformation as AI-driven technologies are increasingly responsible for curating, recommending, and amplifying information on online platforms. While AI holds the potential to enhance the detection and mitigation of misinformation through natural language processing and machine learning, it also raises concerns about the amplification and propagation of false information. AI-powered deepfake technology, for instance, can generate hyper-realistic videos and audio recordings, making it increasingly challenging to discern fact from fiction.

Keywords: artificial intelligence, digital information, disinformation, ethical issues, misinformation

Procedia PDF Downloads 53
638 Child Soldier in Africa: A Big Challenge to Human Right

Authors: Adegboyega Adeolapo Ola, Gerelene Jagganath

Abstract:

One of the greatest challenges of human right in the world, especially African states is the use of child soldiers in armed conflict, constituting a major source of destruction of lives and properties. Mostly, they are in developing countries with the situation in Sub-Saharan Africa, the abduction and employment of children as soldiers is a form of exploitative labour that is tantamount to slavery. Since the end of cold war, Child soldier has increased in Africa countries like Angola, Liberia, Sierra Leone and Uganda. This study examines the main cause of the recruitment and use of child soldiers and its challenges to human right. It further assesses the role of international regional bodies and various governments in curbing child soldiers with a view to proffer suggestions on how to address some of the resultant threat of human right. The study posits that the control of small arms and light weapons is essential in curtailing the spread of child soldier and abuse of human right. This hopefully should result in the sustainability of human/child right in African continent. It is a recommendation of this study that, in order to sustain human right in the region, all Africa leaders, government and regional bodies; such as African Union, Economic Community of West African States, South African Development Community among others, should cooperate and work together to address the issue of illicit small arms, which could eventually lead to child soldier.

Keywords: arms control, child soldier, human right, small arms

Procedia PDF Downloads 185
637 Victim and Active Subject of the Crime of Violence in Family Reflected in the Criminal Code of the Republic of Moldova

Authors: Nastas Andrei

Abstract:

Ensuring accessible and functional justice is one of the priority objectives of judicial reform, and protecting the family against any acts that may harm its existence is one of the first priorities that have determined the need to defend the social order. In this context, the correlative approach of the victim and the aggressor becomes relevant as a subject of the crime of domestic violence. Domestic violence is a threat of physical, moral, or material harm, externalized now or in the past, or its provocation, which is characterized by a constant tendency to escalate and a high probability of repetitiveness in the relationship between the social partners, regardless of their legal status or domicile.Studying the legal support to identify the particularities of the victim and the subject of the crime of domestic violence facilitates the identification of the determinants of this crime, therefore, the development of means to prevent domestic violence. The scientific research has been effectuated on the base of the proper and authentic empirical data obtained from the analysis of the judicial practice in the matter of domestic violence, as well as being based on the most recent scientific issues in the field of the Substantive Criminal Law and other branches of science (criminology, psychology, sociology, pedagogy). As a result of the study performed, there have been formulated conclusions and interpretations able to be used in the science of the Substantive Criminal law, as well as in the practice of application of the legal norm in the matter of domestic violence.

Keywords: family violence, victim, crime, violence

Procedia PDF Downloads 79
636 The Effectiveness of Cathodic Protection on Microbiologically Influenced Corrosion Control

Authors: S. Taghavi Kalajahi, A. Koerdt, T. Lund Skovhus

Abstract:

Cathodic protection (CP) is an electrochemical method to control and manage corrosion in different industries and environments. CP which is widely used, especially in buried and sub-merged environments, which both environments are susceptible to microbiologically influenced corrosion (MIC). Most of the standards recommend performing CP using -800 mV, however, if MIC threats are high or sulfate reducing bacteria (SRB) is present, the recommendation is to use more negative potentials for adequate protection of the metal. Due to the lack of knowledge and research on the effectiveness of CP on MIC, to the author’s best knowledge, there is no information about what MIC threat is and how much more negative potentials should be used enabling adequate protection and not overprotection (due to hydrogen embrittlement risk). Recently, the development and cheaper price of molecular microbial methods (MMMs) open the door for more effective investigations on the corrosion in the presence of microorganisms, along with other electrochemical methods and surface analysis. In this work, using MMMs, the gene expression of SRB biofilm under different potentials of CP will be investigated. The specific genes, such as pH buffering, metal oxidizing, etc., will be compared at different potentials, enabling to determine the precise potential that protect the metal effectively from SRB. This work is the initial step to be able to standardize the recommended potential under MIC condition, resulting better protection for the infrastructures.

Keywords: cathodic protection, microbiologically influenced corrosion, molecular microbial methods, sulfate reducing bacteria

Procedia PDF Downloads 72
635 Risk Management Strategy for Protecting Cultural Heritage: Case Study of the Institute of Egypt

Authors: Amany A. Ragheb, Ghada Ragheb, Abd ElRahman A.

Abstract:

Egypt has a countless heritage of mansions, castles, cities, towns, villages, industrial and manufacturing sites. This richness of heritage provides endless and matchless prospects for culture. Despite being famous worldwide, Egypt’s heritage still is in constant need of protection. Political conflicts and religious revolutions form a direct threat to buildings in various areas, historic, archaeological sites, and religious monuments. Egypt has witnessed two revolutions in less than 60 years; both had an impact on its architectural heritage. In this paper, the authors aim to review legal and policy framework to protect the cultural heritage and present the risk management strategy for cultural heritage in conflict. Through a review of selected international models of devastated architectural heritage in conflict zones and highlighting some of their changes, we can learn from the experiences of other countries to assist towards the development of a methodology to halt the plundering of architectural heritage. Finally, the paper makes an effort to enhance the formulation of a risk management strategy for protection and conservation of cultural heritage, through which to end the plundering of Egypt’s architectural legacy in the Egyptian community (revolutions, 1952 and 2011); and by presenting to its surrounding community the benefits derived from maintaining it.

Keywords: cultural heritage, legal regulation, risk management, preservation

Procedia PDF Downloads 373
634 Functionalized Mesoporous Silica: Absorbents for Water Purification

Authors: Saima Nasreen, Uzaira Rafique, Shery Ehrman, Muhammad Aqeel Ashraf

Abstract:

The release of heavy metals into the environment is a potential threat to water and soil quality as well as to plant, animal and human health. In current research work, organically functionalized mesoporous silicates (MSU-H) were prepared by the co-condensation between sodium silicate and oregano alkoxysilanes in the presence of the nonionic surfactant triblock copolymer P104. The surfactant was used as a template for improving the porosity of the hybrid gels. Synthesized materials were characterized by TEM, FT-IR, SEM/EDX, TG, surface area analysis. The surface morphology and textural properties of such materials varied with various kinds of groups in the channels. In this study, removal of some heavy metals ions from aqueous solution by adsorption process was investigated. Batch adsorption studies show that the adsorption capacity of metal ions on the functionalized silicates is more than that on pure MSU-H. Data shows adsorption on synthesized materials is a time efficient process, suggesting adsorption on external surface as well as the mesoporous process. Adsorption models of Langmuir, Freundlich, and Temkin depicted equal goodness for all adsorbents, whereas pseudo 2nd order kinetics is in best agreement with experimental data.

Keywords: heavy metals, mesoporous silica, hybrid, adsorption, freundlich, langmuir, temkin

Procedia PDF Downloads 246
633 Climate Change and Human Migration

Authors: Sungwoo Park

Abstract:

The paper attempts to investigate the correlation between climate change and migration that has caused violent disputes in some regions of the world. Recently, NGOs and educational institutions have proposed claims that migratory patterns and violent uprisings are intertwined with climate change. Thus, the paper is primarily concerned with collecting evidences provided from scholars, validating this significant connection between climate change and migration, and evaluating and suggesting current and future research approaches respectively to enhance the acknowledgment and protection of environmental refugees. In order to examine the linkage of environmental migration, primary sources, such as political speeches, and secondary sources like theses from environmental policy analysts, books, and reports are used. More specifically, the investigation focuses on an civil war in Syria to draw a connection between environmental migration and violent dispute that threatens the global security. The examination undertaken specifically analyzes examples where forced migration occurred due to climate change. In Bangladesh, Pakistan, and Kiribati, residents have been at risk of fleeing their countries because of abnormal climate patterns, such as the rise of sea level or an excessive heat stress. As the brutal uprising in Syria has proven that climate change can pose a significant threat to global security, correlation between climate change and migration is surely worth delving into.

Keywords: climate change, climate migration, global security, refugee crisis

Procedia PDF Downloads 321
632 Characterization of Filled HNBR Elastomers for Sealing Application in Cold Climate Areas

Authors: Anton G. Akulichev, Avinash Tiwari, Ben Alcock, Andreas Echtermeyer

Abstract:

Low temperatures are known to pose a major threat for polymers; many are prone to excessive stiffness or even brittleness. There is a technology gap between the properties of existing elastomeric sealing materials and the properties needed for service in extremely cold regions. Moreover, some aspects of low temperature behaviour of rubber are not thoroughly studied and understood. The paper presents results of laboratory testing of a conventional oilfield HNBR (hydrogenated nitrile butadiene rubber) elastomer at low climatic temperatures above and below its glass transition point, as well as the performance of some filled HNBR formulations. Particular emphasis in the experiments is put on rubber viscoelastic characteristics studied by Dynamic Mechanical Analysis (DMA) and quasi-static mechanical testing results at low temperatures. As demonstrated by the stress relaxation and DMA experiments the transition region near Tg of the studied compound has the most striking features, like rapid stress relaxation, as compared to the glassy and rubbery plateau. In addition the quasi-static experiments show that molecular movement below Tg is not completely frozen, but rather evident and manifested in a certain stress decay as well. The effect of temperature and filler additions on typical mechanical and other properties of the materials is also discussed.

Keywords: characterization, filled elastomers, HNBR, low temperature

Procedia PDF Downloads 286
631 The Role of Trust in International Relations– Examining India’s Gujaral Doctrine and South Asian Politics

Authors: Bhavana Mahajan

Abstract:

International Relations is a discipline of paradoxes. The State is the dominant political institution, yet little attention has been accorded to why individual countries behave the way they do with the theoretical analysis dismissing the State as a reactionary monolith – thus States either play to “quest for power” or to “systemic” forces. However, States do behave as and are influenced by agents when interacting with international structures as well as with other states. While questions on “competitive power politics” and “trust” have been examined and developed to a fair extent by International Relations theorists in the post 1990s period, their application to the domain of South Asian politics is limited and little research, if any, examines the conduct of foreign policy beyond rational choice. This paper is an initial attempt to marry these theoretical insights with the foreign policy exercised by India especially the case of the “Gujral Doctrine, as one of “non-reciprocal accommodation”. Ignoring the view that such a policy move can be viewed as political “feinting” or deception, it is noteworthy that India even made the first move in terms of defining its role as one who “trusts” rather than one who “seeks” to trust, given the country’s geo-strategic context and threat perceptions.

Keywords: India’s foreign policy, South Asia, social constructivism, English school, trusting relationships, Gujral Doctrine, rationality

Procedia PDF Downloads 320
630 Multi-Tooled Robotic Hand for Tele-Operation of Explosive Devices

Authors: Faik Derya Ince, Ugur Topgul, Alp Gunay, Can Bayoglu, Dante J. Dorantes-Gonzalez

Abstract:

Explosive attacks are arguably the most lethal threat that may occur in terrorist attacks. In order to counteract this issue, explosive ordnance disposal operators put their lives on the line to dispose of a possible improvised explosive device. Robots can make the disposal process more accurately and saving human lives. For this purpose, there is a demand for more accurate and dexterous manipulating robotic hands that can be teleoperated from a distance. The aim of this project is to design a robotic hand that contains two active and two passive DOF for each finger, as well as a minimum set of tools for mechanical cutting and screw driving within the same robotic hand. Both hand and toolset, are teleoperated from a distance from a haptic robotic glove in order to manipulate dangerous objects such as improvised explosive devices. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the robotic hand and toolset design. Novel, dexterous and robust solutions for the fingers were obtained, and six servo motors are used in total to remotely control the multi-tooled robotic hand. This project is still undergoing and presents currents results. Future research steps are also presented.

Keywords: Explosive Manipulation, Robotic Hand, Tele-Operation, Tool Integration

Procedia PDF Downloads 115
629 Comparison of Different in vitro Models of the Blood-Brain Barrier for Study of Toxic Effects of Engineered Nanoparticles

Authors: Samir Dekali, David Crouzier

Abstract:

Due to their new physico-chemical properties engineered nanoparticles (ENPs) are increasingly employed in numerous industrial sectors (such as electronics, textile, aerospace, cosmetics, pharmaceuticals, food industry, etc). These new physico-chemical properties can also represent a threat for the human health. Consumers can notably be exposed involuntarily by different routes such as inhalation, ingestion or through the skin. Several studies recently reported a possible biodistribution of these ENPs on the blood-brain barrier (BBB). Consequently, there is a great need for developing BBB in vitro models representative of the in vivo situation and capable of rapidly and accurately assessing ENPs toxic effects and their potential translocation through this barrier. In this study, several in vitro models established with micro-endothelial brain cell lines of different origins (bEnd.3 mouse cell line or a new human cell line) co-cultivated or not with astrocytic cells (C6 rat or C8-B4 mouse cell lines) on Transwells® were compared using different endpoints: trans-endothelial resistance, permeability of the Lucifer yellow and protein junction labeling. Impact of NIST diesel exhaust particles on BBB cell viability is also discussed.

Keywords: nanoparticles, blood-brain barrier, diesel exhaust particles, toxicology

Procedia PDF Downloads 416
628 Response of Chickpea (Cicer arietinum L.) Genotypes to Drought Stress at Different Growth Stages

Authors: Ali. Marjani, M. Farsi, M. Rahimizadeh

Abstract:

Chickpea (Cicer arietinum L.) is one of the important grain legume crops in the world. However, drought stress is a serious threat to chickpea production, and development of drought-resistant varieties is a necessity. Field experiments were conducted to evaluate the response of 8 chickpea genotypes (MCC* 696, 537, 80, 283, 392, 361, 252, 397) and drought stress (S1: non-stress, S2: stress at vegetative growth stage, S3: stress at early bloom, S4: stress at early pod visible) at different growth stages. Experiment was arranged in split plot design with four replications. Difference among the drought stress time was found to be significant for investigated traits except biological yield. Differences were observed for genotypes in flowering time, pod information time, physiological maturation time and yield. Plant height reduced due to drought stress in vegetative growth stage. Stem dry weight reduced due to drought stress in pod visibly. Flowering time, maturation time, pod number, number of seed per plant and yield cause of drought stress in flowering was also reduced. The correlation between yield and number of seed per plant and biological yield was positive. The MCC283 and MCC696 were the high-tolerance genotypes. These results demonstrated that drought stress delayed phonological growth in chickpea and that flowering stage is sensitive.

Keywords: chickpea, drought stress, growth stage, tolerance

Procedia PDF Downloads 234
627 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 317
626 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 153
625 Emotional Artificial Intelligence and the Right to Privacy

Authors: Emine Akar

Abstract:

The majority of privacy-related regulation has traditionally focused on concepts that are perceived to be well-understood or easily describable, such as certain categories of data and personal information or images. In the past century, such regulation appeared reasonably suitable for its purposes. However, technologies such as AI, combined with ever-increasing capabilities to collect, process, and store “big data”, not only require calibration of these traditional understandings but may require re-thinking of entire categories of privacy law. In the presentation, it will be explained, against the background of various emerging technologies under the umbrella term “emotional artificial intelligence”, why modern privacy law will need to embrace human emotions as potentially private subject matter. This argument can be made on a jurisprudential level, given that human emotions can plausibly be accommodated within the various concepts that are traditionally regarded as the underlying foundation of privacy protection, such as, for example, dignity, autonomy, and liberal values. However, the practical reasons for regarding human emotions as potentially private subject matter are perhaps more important (and very likely more convincing from the perspective of regulators). In that respect, it should be regarded as alarming that, according to most projections, the usefulness of emotional data to governments and, particularly, private companies will not only lead to radically increased processing and analysing of such data but, concerningly, to an exponential growth in the collection of such data. In light of this, it is also necessity to discuss options for how regulators could address this emerging threat.

Keywords: AI, privacy law, data protection, big data

Procedia PDF Downloads 64
624 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria

Authors: Akachi Odoemene

Abstract:

There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.

Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria

Procedia PDF Downloads 221