Search results for: nuclear threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1532

Search results for: nuclear threats

1262 Real-Time Compressive Strength Monitoring for NPP Concrete Construction Using an Embedded Piezoelectric Self-Sensing Technique

Authors: Junkyeong Kim, Seunghee Park, Ju-Won Kim, Myung-Sug Cho

Abstract:

Recently, demands for the construction of Nuclear Power Plants (NPP) using high strength concrete (HSC) has been increased. However, HSC might be susceptible to brittle fracture if the curing process is inadequate. To prevent unexpected collapse during and after the construction of HSC structures, it is essential to confirm the strength development of HSC during the curing process. However, several traditional strength-measuring methods are not effective and practical. In this study, a novel method to estimate the strength development of HSC based on electromechanical impedance (EMI) measurements using an embedded piezoelectric sensor is proposed. The EMI of NPP concrete specimen was tracked to monitor the strength development. In addition, cross-correlation coefficient was applied in sequence to examine the trend of the impedance variations more quantitatively. The results confirmed that the proposed technique can be applied successfully monitoring of the strength development during the curing process of HSC structures.

Keywords: concrete curing, embedded piezoelectric sensor, high strength concrete, nuclear power plant, self-sensing impedance

Procedia PDF Downloads 485
1261 The Reality of E-Commerce in Egypt and Its Role in Enhancing Companies' Competitiveness

Authors: Esam El Gohary

Abstract:

— The companies’ ability to survive and compete in the fierce competition is determined by its competitiveness level. With the spread of information technology use and appearance of online shopping, it became crucial for companies to adopt e-commerce system to increase its competitiveness. This paper was conducted with the purpose of determine how increasing the service value through e-commerce factors (competitive strategy, ICT infrastructures, logistics, security, human resources and innovation) can enhance companies' competitiveness. The problem of this paper is summarized in the absence of the thorough awareness of e-commerce benefits for business owners and customers, as well as how to reduce the intangibility attributes of e-commerce. For this purpose this paper describes the e-commerce in Egypt and its success factors (infrastructures, legal and regulatory environment, human resources and innovation), as well as displays the barriers of such factor, to investigate the significant of these factors on increasing service value and enhance companies' competitiveness. This paper revealed that e-commerce companies have many opportunities to enhance its competitiveness in Egypt, which is enhanced by several factors. The most important factors are “strong ICT infrastructure, qualified and skilled human resources, in addition to the distinctive logistics that distinguish Egypt due to its location, strong legal and regulatory environment and Innovation, as well as the competitive strategy. As well as, companies encounter several threats such as; the lack of infrastructures and logistics in rural areas, the absence of the inclusive understanding and awareness of e-commerce, fear from e-payment transactions and fraud, the ambiguity and burdensome of customs. Through the research findings several recommendations were introduced to both government and companies to overcome threats and exploit opportunities to improve performance and enhance companies' competitiveness.

Keywords: e-commerce competitiveness, e-commerce factors, e-commerce in Egypt, information technology

Procedia PDF Downloads 79
1260 Analysis of Nuclear Power Plant Operator Activities and Risk Factors Using an EEG System

Authors: John Gaber, Youssef Ahmed, Hossam A.Gabbar, Jing Ren

Abstract:

Nuclear Power Plant (NPP) operators have a large responsibility on their shoulders. They must allow the plant to generate a high amount of energy while inspecting and maintaining the safety of the plant. This type of occupation comes with high amounts of mental fatigue, and a small mistake can have grave consequences. Electroencephalography (EEG) is a method of gathering the electromagnetic waves emitted by a human brain. We propose a safety system by monitoring brainwaves for signs of mental fatigue. This requires an analysis of the tasks and mental models of the NPP operator, as well as risk factors on mental fatigue and attention that NPP operators face when performing their tasks. The brain waves generated from experiencing mental fatigue can then be monitored for. These factors are analyzed, developing an EEG-based monitoring system, which aims to alert NPP operators when levels of mental fatigue and attention start affecting their performance in task completion.

Keywords: EEG, power plant operator, psychology, task analysis

Procedia PDF Downloads 67
1259 Identification of Target Receptor Compound 10,11-Dihidroerisodin as an Anti-Cancer Candidate

Authors: Srie Rezeki Nur Endah, Richa Mardianingrum

Abstract:

Cancer is one of the most feared diseases and is considered the leading cause of death worldwide. Generally, cancer drugs are synthetic drugs with relatively more expensive prices and have harmful side effects, so many people turn to traditional medicine, for example by utilizing herbal medicine. Erythrina poeppigiana is one of the plants that can be used as a medicinal plant containing 10,11-dihidroerisodin compounds that are useful anticancer etnofarmakologi. The purpose of this study was to identify the target of 10,11 dihydroerisodin receptor compound as in silico anticancer candidate. The pure isolate was tested physicochemically by MS (Mass Spectrometry), UV-Vis (Ultraviolet – Visible), IR (Infra Red), 13C-NMR (Carbon-13 Nuclear Magnetic Resonance), 1H-NMR (Hydrogen-1 Nuclear Magnetic Resonance), to obtain the structure of 10,11-dihydroerisodin alkaloid compound then identified to target receptors in silico. From the results of the study, it was found that 10,11-dihydroerisodin compound can work on the Serine / threonine-protein kinase Chk1 receptor that serves as an anti-cancer candidate.

Keywords: anti-cancer, Erythrina poeppigiana, target receptor, 10, 11- dihidroerisodin

Procedia PDF Downloads 226
1258 The Model Establishment and Analysis of TRACE/MELCOR for Kuosheng Nuclear Power Plant Spent Fuel Pool

Authors: W. S. Hsu, Y. Chiang, Y. S. Tseng, J. R. Wang, C. Shih, S. W. Chen

Abstract:

Kuosheng nuclear power plant (NPP) is a BWR/6 plant in Taiwan. There is more concern for the safety of NPPs in Taiwan after Japan Fukushima NPP disaster occurred. Hence, in order to estimate the safety of Kuosheng NPP spent fuel pool (SFP), by using TRACE, MELCOR, and SNAP codes, the safety analysis of Kuosheng NPP SFP was performed. There were two main steps in this research. First, the Kuosheng NPP SFP models were established. Second, the transient analysis of Kuosheng SFP was done by TRACE and MELCOR under the cooling system failure condition (Fukushima-like condition). The results showed that the calculations of MELCOR and TRACE were very similar in this case, and the fuel uncover happened roughly at 4th day after the failure of cooling system. The above results indicated that Kuosheng NPP SFP may be unsafe in the case of long-term SBO situation. In addition, future calculations were needed to be done by the other codes like FRAPTRAN for the cladding calculations.

Keywords: TRACE, MELCOR, SNAP, spent fuel pool

Procedia PDF Downloads 302
1257 Prototyping Exercise for the Construction of an Ancestral Violentometer in Buenaventura, Valle Del Cauca

Authors: Mariana Calderón, Paola Montenegro, Diana Moreno

Abstract:

Through this study, it was possible to identify the different levels and types of violence, both individual and collective, experienced by women, girls, and the sexually diverse population of Buenaventura translated from the different tensions and threats against ancestrality and accounting for a social and political context of violence related to race and geopolitical location. These threats are related to: the stigma and oblivion imposed on practices and knowledge; the imposition of the hegemonic culture; the imposition of external customs as a way of erasing ancestrality; the singling out and persecution of those who practice it; the violence that the health system has exercised against ancestral knowledge and practices, especially in the case of midwives; the persecution of the Catholic religion against this knowledge and practices; the difficulties in maintaining the practices in the displacement from rural to urban areas; the use and control of ancestral knowledge and practices by the armed actors; the rejection and stigma exercised by the public forces; and finally, the murder of the wise women at the hands of the armed actors. This research made it possible to understand the importance of using tools such as the violence meter to support processes of resistance to violence against women, girls, and sexually diverse people; however, it is essential that these tools be adapted to the specific contexts of the people. In the analysis of violence, it was possible to identify that these not only affect women, girls, and sexually diverse people individually but also have collective effects that threaten the territory and the ancestral culture to which they belong. Ancestrality has been the object of violence, but at the same time, it has been the place from which resistance has been organized. The identification of the violence suffered by women, girls, and sexually diverse people is also an opportunity to make visible the forms of resistance of women and communities in the face of this violence. This study examines how women, girls, and sexually diverse people in Buenaventura have been exposed to sexism and racism, which historically have been translated into specific forms of violence, in addition to the other forms of violence already identified by the traditional models of the violentometer. A qualitative approach was used in the study. The study included the participation of more than 40 people and two women's organizations from Buenaventura. The participants came from both urban and rural areas of the municipality of Buenaventura and were over 15 years of age. The participation of such a diverse group allowed for the exchange of knowledge and experiences, particularly between younger and older people. The instrument used for the exercise was previously defined with the leaders of the organizations and consisted of four moments that referred to i) ancestry, ii) threats to ancestry, iii) identification of resistance and iv) construction of the ancestral violentometer.

Keywords: violence against women, intersectionality, sexual and reproductive rights, black communities

Procedia PDF Downloads 50
1256 The Phosphatidate Phosphatase Pah1 and Its Regulator Nem1/spo7 Protein Phosphatase Required for Nucleophagy

Authors: Muhammad Arifur Rahman, Talukdar M. Waliullah, Takashi Ushimaru

Abstract:

Nucleophagy selectively degrades nuclear materials, especially nucleolus after nutrient starvation or inactivation of TORC1 kinase in budding yeast. Budding yeast phosphatidate (PA) phosphatase Pah1 that converts PA to diacylglycerol is essential for partitioning of lipid precursors between membrane and storage that is crucial for many aspects of cell growth and development. Pah1 is required for nuclear/ER membrane biogenesis and vacuole function, but whether Pah1 and its activator Nem1/Spo7 protein phosphatase complex are involved in autophagy is largely unknown. Loss of Pah1 causes expansion of the nucleus and fragmentation of the vacuole. Here we show that Pah1 is required for bulk autophagy and nucleophagy after TORC1 inactivation. Loss of Pah1 impaired nucleophagy severely and bulk autophagy to a lesser extent. Loss of the Pah1 activator Nem1-Spo7 protein phosphatase exhibited similar features.

Keywords: autophagy, Nem1/Spo7 phosphatase, Pah1, nucleophagy, TORC1

Procedia PDF Downloads 188
1255 Preliminary Study on the Removal of Solid Uranium Compound in Nuclear Fuel Production System

Authors: Bai Zhiwei, Zhang Shuxia

Abstract:

By sealing constraint, the system of nuclear fuel production penetrates a trace of air in during its service. The vapor in the air can react with material in the system and generate solid uranium compounds. These solid uranium compounds continue to accumulate and attached to the production equipment and pipeline of system, which not only affects the operation reliability of production equipment and give off radiation hazard as well after system retired. Therefore, it is necessary to select a reasonable method to remove it. Through the analysis of physicochemical properties of solid uranium compounds, halogenated fluoride compounds are selected as a cleaning agent, which can remove solid uranium compounds effectively. This paper studied the related chemical reaction under the condition of static test and results show that the selection of high fluoride halogen compounds can be removed solid uranium compounds completely. The study on the influence of reaction pressure with the reaction rate discovered a phenomenon that the higher the pressure, the faster the reaction rate.

Keywords: fluoride halogen compound, remove, radiation, solid uranium compound

Procedia PDF Downloads 276
1254 Radionuclides Transport Phenomena in Vadose Zone

Authors: R. Testoni, R. Levizzari, M. De Salve

Abstract:

Radioactive waste management is fundamental to safeguard population and environment by radiological risks. Environmental assessment of a site, where nuclear activities are located, allows understanding the hydro geological system and the radionuclides transport in groundwater and subsoil. Use of dedicated software is the basis of transport phenomena investigation and for dynamic scenarios prediction; this permits to understand the evolution of accidental contamination events, but at the same time the potentiality of the software itself can be verified. The aim of this paper is to perform a numerical analysis by means of HYDRUS 1D code, so as to evaluate radionuclides transport in a nuclear site in Piedmont region (Italy). In particular, the behaviour in vadose zone was investigated. An iterative assessment process was performed for risk assessment of radioactive contamination. The analysis therein developed considers the following aspects: i) hydro geological site characterization; ii) individuation of the main intrinsic and external site factors influencing water flow and radionuclides transport phenomena; iii) software potential for radionuclides leakage simulation purposes.

Keywords: HYDRUS 1D, radionuclides transport phenomena, site characterization, radiation protection

Procedia PDF Downloads 377
1253 Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century

Authors: Stephen L. Roberts

Abstract:

This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.

Keywords: algorithms, global health, pandemic, surveillance

Procedia PDF Downloads 154
1252 Transcriptomine: The Nuclear Receptor Signaling Transcriptome Database

Authors: Scott A. Ochsner, Christopher M. Watkins, Apollo McOwiti, David L. Steffen Lauren B. Becnel, Neil J. McKenna

Abstract:

Understanding signaling by nuclear receptors (NRs) requires an appreciation of their cognate ligand- and tissue-specific transcriptomes. While target gene regulation data are abundant in this field, they reside in hundreds of discrete publications in formats refractory to routine query and analysis and, accordingly, their full value to the NR signaling community has not been realized. One of the mandates of the Nuclear Receptor Signaling Atlas (NURSA) is to facilitate access of the community to existing public datasets. Pursuant to this mandate we are developing a freely-accessible community web resource, Transcriptomine, to bring together the sum total of available expression array and RNA-Seq data points generated by the field in a single location. Transcriptomine currently contains over 25,000,000 gene fold change datapoints from over 1200 contrasts relevant to over 100 NRs, ligands and coregulators in over 200 tissues and cell lines. Transcriptomine is designed to accommodate a spectrum of end users ranging from the bench researcher to those with advanced bioinformatic training. Visualization tools allow users to build custom charts to compare and contrast patterns of gene regulation across different tissues and in response to different ligands. Our resource affords an entirely new paradigm for leveraging gene expression data in the NR signaling field, empowering users to query gene fold changes across diverse regulatory molecules, tissues and cell lines, target genes, biological functions and disease associations, and that would otherwise be prohibitive in terms of time and effort. Transcriptomine will be regularly updated with gene lists from future genome-wide expression array and expression-sequencing datasets in the NR signaling field.

Keywords: target gene database, informatics, gene expression, transcriptomics

Procedia PDF Downloads 249
1251 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 235
1250 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 93
1249 Movie and Theater Marketing Using the Potentials of Social Networks

Authors: Seyed Reza Naghibulsadat

Abstract:

The nature of communication includes various forms of media productions, which include film and theater. In the current situation, since social networks have emerged, they have brought their own communication capabilities and have features that show speed, public access, lack of media organization and the production of extensive content, and the development of critical thinking; Also, they contain capabilities to develop access to all kinds of media productions, including movies and theater shows; Of course, this works differently in different conditions and communities. In terms of the scale of exploitation, the film has a more general audience, and the theater has a special audience. The film industry is more developed based on more modern technologies, but the theater, based on the older ways of communication, contains more intimate and emotional aspects. ; But in general, the main focus is the development of access to movies and theater shows, which is emphasized by those involved in this field due to the capabilities of social networks. In this research, we will look at these 2 areas and the relevant components for both areas through social networks and also the common points of both types of media production. The main goal of this research is to know the strengths and weaknesses of using social networks for the marketing of movies and theater shows and, at the same time are, also considered the opportunities and threats of this field. The attractions of these two types of media production, with the emergence of social networks, and the ability to change positions, can provide the opportunity to become a media with greater exploitation and higher profitability; But the main consideration is the opinions about these capabilities and the ability to use them for film and theater marketing. The main question of the research is, what are the marketing components for movies and theaters using social media capabilities? What are its strengths and weaknesses? And what opportunities and threats are facing this market? This research has been done with two methods SWOT and meta-analysis. Non-probability sampling has been used with purposeful technique. The results show that a recent approach is an approach based on eliminating threats and weaknesses and emphasizing strengths, and exploiting opportunities in the direction of developing film and theater marketing based on the capabilities of social networks within the framework of local cultural values and presenting achievements on an international scale or It is universal. This introduction leads to the introduction of authentic Iranian culture and foreign enthusiasts in the framework of movies and theater art. Therefore, for this issue, the model for using the capabilities of social networks for movie or theater marketing, according to the results obtained from Respondents, is a model based on SO strategies and, in other words, offensive strategies so that it can take advantage of the internal strengths and made maximum use of foreign situations and opportunities to develop the use of movies and theater performances.

Keywords: marketing, movies, theatrical show, social network potentials

Procedia PDF Downloads 47
1248 Role of Non-Timber Forest Products in Local Livelihood and Household Economies in Resource-Rich vs. Resource Poor Forest Area of Mizoram

Authors: Uttam Kumar Sahoo, K. Lalhmingsangi, J. H. Lalremruati

Abstract:

Non-timber forest resources particularly the high-value, low volume NTFPs has drawn interest as an activity all over the world during the past three decades that could raise standards of living for the rural folks while being compatible with forest conservation. This is particularly true for the people living in and around or fringes of protected areas. However, the economics that plays between resources’ stock and its utilization by the humans is yet to be validated and evaluated logistically. A study was therefore designed to understand the linkages between resource (especially NTFPs) availability and their utilization, existing threats to this biodiversity conservation and the role of NTFPs within the livelihood systems of those households that are most directly involved in creating conservation threats. About 25% of the households were sampled from the two sites ‘resource-rich’ and ‘resource poor’ area of Dampa Tiger Reserve (Western boundary). Our preliminary findings suggest that the collection of relatively high-volume and low value NTFPs such as fuelwood, fodder has caused degradation of forest resources while the low-volume and high-value NTFPs such as wild edible mushrooms, vegetables, other specialty food products, inputs to crafts, medicinal plants have resulted into species promotion/conservation through their domestication in traditional agroforestry systems including home gardens and/or collateral protection of the Tiger Reserve. It is thus suggested that proper assessment of these biodiversities, their direct and indirect valuation, market and non-market profits etc be carried out in greater details which would result in prescribing effective management plans around the park.

Keywords: household economy, livelihood strategies, non-timber forest products, species conservation

Procedia PDF Downloads 164
1247 Challenges of Landscape Design with Tree Species Diversity

Authors: Henry Kuppen

Abstract:

In the last decade, tree managers have faced many threats of pests and diseases and the effects of climate change. Managers will recognize that they have to put more energy and more money into tree management. By recognizing the cause behind this, the opportunity will arise to build sustainable tree populations for the future. More and more, unwanted larvae are sprayed, ash dieback infected trees are pruned or felled, and emerald ash borer is knocking at the door of West Europe. A lot of specific knowledge is needed to produce management plans and best practices. If pest and disease have a large impact, society loses complete tree species and need to start all over again building urban forest. But looking at the cause behind it, landscape design, and tree species selection, the sustainable solution does not present itself in managing these threats. Every pest or disease needs two important basic ingredients to be successful: climate and food. The changing climate is helping several invasive pathogens to survive. Food is often designed by the landscapers and managers of the urban forest. Monocultures promote the success of pathogens. By looking more closely at the basics, tree managers will realise very soon that the solution will not be the management of pathogens. The long-term solution for sustainable tree populations is a different design of our urban landscape. The use of tree species diversity can help to reduce the impact of climate change and pathogens. Therefore landscapers need to be supported. They are the specialists in designing the landscape using design values like canopy volume, ecosystem services, and seasonal experience. It’s up to the species specialist to show what the opportunities are for different species that meet the desired interpretation of the landscape. Based on landscapers' criteria, selections can be made, including tree species related requirements. Through this collaboration and formation of integral teams, sustainable plant design will be possible.

Keywords: climate change, landscape design, resilient landscape, tree species selection

Procedia PDF Downloads 88
1246 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 210
1245 Ground Surface Temperature History Prediction Using Long-Short Term Memory Neural Network Architecture

Authors: Venkat S. Somayajula

Abstract:

Ground surface temperature history prediction model plays a vital role in determining standards for international nuclear waste management. International standards for borehole based nuclear waste disposal require paleoclimate cycle predictions on scale of a million forward years for the place of waste disposal. This research focuses on developing a paleoclimate cycle prediction model using Bayesian long-short term memory (LSTM) neural architecture operated on accumulated borehole temperature history data. Bayesian models have been previously used for paleoclimate cycle prediction based on Monte-Carlo weight method, but due to limitations pertaining model coupling with certain other prediction networks, Bayesian models in past couldn’t accommodate prediction cycle’s over 1000 years. LSTM has provided frontier to couple developed models with other prediction networks with ease. Paleoclimate cycle developed using this process will be trained on existing borehole data and then will be coupled to surface temperature history prediction networks which give endpoints for backpropagation of LSTM network and optimize the cycle of prediction for larger prediction time scales. Trained LSTM will be tested on past data for validation and then propagated for forward prediction of temperatures at borehole locations. This research will be beneficial for study pertaining to nuclear waste management, anthropological cycle predictions and geophysical features

Keywords: Bayesian long-short term memory neural network, borehole temperature, ground surface temperature history, paleoclimate cycle

Procedia PDF Downloads 101
1244 The Use of Social Media by Companies Operating on the Polish Market in the Context of the Corporate Reputation Management

Authors: Danuta Szwajca

Abstract:

Reputation The exponential growth of the Internet and social media (SM) in the recent years has contributed to changing the communication environment, in which stakeholders: customers, investors, business partners, employees, like their users, may post and distribute their opinions about the company and its products. This generates a number of potential threats to the image and reputation of both people and organizations. Social media create new opportunities not only for rapid and interactive communication but also for organizing themselves into strong pressure groups which may effectively affect the decisions of various organized bodies. Companies cannot ignore this fact and should use SM not only as an additional communication marketing channel but in a broader context - as a tool to build and protect their reputation. This article aims to identify the extent, scope, and directions of the use of SM in the activities of companies operating in the Polish market, as well as to identify threats and opportunities generated by the media in the area of reputation management. The results of research presented in the article showed that Polish companies recognize the potential of SM and try to apply them in their marketing efforts. However, his activity is limited only to maintain communication with customers through two portals: Facebook and Twitter. In the approach to the SM as a communication channel, the traditional way of thinking dominates, in which they are treated as just another promotional tool used by two departments: marketing and PR. This approach is called "silo" and is not integrated. This way of using SM does not allow effective building and protecting reputation in the Internet environment. To achieve this goal, the following research methods were used: the critical analysis of literature, analysis of secondary sources in a form of the report from the research conducted by Harvard Business Review Poland together with Capgemini Poland and case study.

Keywords: corporate reputation, reputation management, social media, risk reputation

Procedia PDF Downloads 173
1243 Environmental Planning for Sustainable Utilization of Lake Chamo Biodiversity Resources: Geospatially Supported Approach, Ethiopia

Authors: Alemayehu Hailemicael Mezgebe, A. J. Solomon Raju

Abstract:

Context: Lake Chamo is a significant lake in the Ethiopian Rift Valley, known for its diversity of wildlife and vegetation. However, the lake is facing various threats due to human activities and global effects. The poor management of resources could lead to food insecurity, ecological degradation, and loss of biodiversity. Research Aim: The aim of this study is to analyze the environmental implications of lake level changes using GIS and remote sensing. The research also aims to examine the floristic composition of the lakeside vegetation and propose spatially oriented environmental planning for the sustainable utilization of the biodiversity resources. Methodology: The study utilizes multi-temporal satellite images and aerial photographs to analyze the changes in the lake area over the past 45 years. Geospatial analysis techniques are employed to assess land use and land cover changes and change detection matrix. The composition and role of the lakeside vegetation in the ecological and hydrological functions are also examined. Findings: The analysis reveals that the lake has shrunk by 14.42% over the years, with significant modifications to its upstream segment. The study identifies various threats to the lake-wetland ecosystem, including changes in water chemistry, overfishing, and poor waste management. The study also highlights the impact of human activities on the lake's limnology, with an increase in conductivity, salinity, and alkalinity. Floristic composition analysis of the lake-wetland ecosystem showed definite pattern of the vegetation distribution. The vegetation composition can be generally categorized into three belts namely, the herbaceous belt, the legume belt and the bush-shrub-small trees belt. The vegetation belts collectively act as different-sized sieve screen system and calm down the pace of incoming foreign matter. This stratified vegetation provides vital information to decide the management interventions for the sustainability of lake-wetland ecosystem.Theoretical Importance: The study contributes to the understanding of the environmental changes and threats faced by Lake Chamo. It provides insights into the impact of human activities on the lake-wetland ecosystem and emphasizes the need for sustainable resource management. Data Collection and Analysis Procedures: The study utilizes aerial photographs, satellite imagery, and field observations to collect data. Geospatial analysis techniques are employed to process and analyze the data, including land use/land cover changes and change detection matrices. Floristic composition analysis is conducted to assess the vegetation patterns Question Addressed: The study addresses the question of how lake level changes and human activities impact the environmental health and biodiversity of Lake Chamo. It also explores the potential opportunities and threats related to water utilization and waste management. Conclusion: The study recommends the implementation of spatially oriented environmental planning to ensure the sustainable utilization and maintenance of Lake Chamo's biodiversity resources. It emphasizes the need for proper waste management, improved irrigation facilities, and a buffer zone with specific vegetation patterns to restore and protect the lake outskirt.

Keywords: buffer zone, geo-spatial, lake chamo, lake level changes, sustainable utilization

Procedia PDF Downloads 36
1242 CFD Simulation for Flow Behavior in Boiling Water Reactor Vessel and Upper Pool under Decommissioning Condition

Authors: Y. T. Ku, S. W. Chen, J. R. Wang, C. Shih, Y. F. Chang

Abstract:

In order to respond the policy decision of non-nuclear homes, Tai Power Company (TPC) will provide the decommissioning project of Kuosheng Nuclear power plant (KSNPP) to meet the regulatory requirement in near future. In this study, the computational fluid dynamics (CFD) methodology has been employed to develop a flow prediction model for boiling water reactor (BWR) with upper pool under decommissioning stage. The model can be utilized to investigate the flow behavior as the vessel combined with upper pool and continuity cooling system. At normal operating condition, different parameters are obtained for the full fluid area, including velocity, mass flow, and mixing phenomenon in the reactor pressure vessel (RPV) and upper pool. Through the efforts of the study, an integrated simulation model will be developed for flow field analysis of decommissioning KSNPP under normal operating condition. It can be expected that a basis result for future analysis application of TPC can be provide from this study.

Keywords: CFD, BWR, decommissioning, upper pool

Procedia PDF Downloads 236
1241 SUMOylation Enhances Nurr1/1a Mediated Transactivation in a Neuronal Cell Type

Authors: Jade Edey, Andrew Bennett, Gareth Hathway

Abstract:

Nuclear receptor-related 1 protein (also known as Nurr1 or NR4A2) is an orphan nuclear receptor which plays a vital role in the development, survival and maintenance of dopaminergic (DA) neurons particularly in the substantia nigra (SN). Increasing research has investigated Nurr1’s additional role within microglia and astrocytes where it has been suggested to act as a negative regulator of inflammation; potentially offering neuroprotection. Considering both DA neurodegeneration and neuroinflammation are commonly accepted constituents of Parkinson’s Disease (PD), understanding the mechanisms by which Nurr1 regulates inflammatory processes could provide an attractive therapeutic target. Nurr1 regulates inflammation via a transrepressive mechanism possibly dependent upon SUMOylation. In addition, Nurr1 can transactivate numerous genes involved in DA synthesis, such as Tyrosine Hydroxylase (TH). A C-terminal splice variant of Nurr1, Nurr-1a, has been reported in both neuronal and glial cells. However, research into its transcriptional activity is minimal. We employed in vitro methods such as SUMO-Pulldown experiments alongside Luciferase reporter assays to investigate the SUMOylation status and transactivation capabilities of Nurr1 and Nurr-1a respectively. The SUMO-Pulldown assay demonstrated Nurr-1a undergoes significantly more SUMO modification than its full-length variant. Consequently, despite having less transcriptional activation than Nurr1, Nurr1a may play a more prominent role in repression of microglial inflammation. Contrary to published literature we also identified that SUMOylation enhances transcriptional activation by Nurr1 and Nurr1a. SUMOylation-dependent increases in Nurr1 and Nurr1a transcriptional activation were only evident in neuronal SHSY5Y cells but not in HEK293 cells. This research provides novel insight into the regulation of Nurr-1a and indicates differential effects of SUMOylation dependent regulation in neuronal and inflammatory cells.

Keywords: nuclear receptors, Parkinson’s disease, inflammation, transcriptional regulation

Procedia PDF Downloads 125
1240 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 63
1239 Usage of Military Continuity Management System for Supporting of Emergency Management

Authors: Radmila Hajkova, Jiri Palecek, Hana Malachova, Alena Oulehlova

Abstract:

Ensuring of continuity of business is the basic strategy of every company. Continuity of organization activities includes comprehensive procedures that help in solving unexpected situations of natural and anthropogenic character (for example flood, blaze, economic situations). Planning of continuity operations is a process that helps identify critical processes and implement plans for the security and recovery of key processes. The aim of this article demonstrates application of system approach to managing business continuity called business continuity management systems in military issues. This article describes the life cycle of business continuity management which is based on the established cycle PDCA (plan-do-check-act). After this is carried out by activities which are making by the University of Defence during activation of forces and means of the Integrated rescue system in case of emergencies - accidents at a nuclear power plant in Czech republic. Activities of various stages of deployment earmarked forces and resources are managed and evaluated by using MCMS application (military continuity management system).

Keywords: business continuity management system, emergency management, military, nuclear safety

Procedia PDF Downloads 430
1238 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 64
1237 Improvements in Transient Testing in The Transient REActor Test (TREAT) with a Choice of Filter

Authors: Harish Aryal

Abstract:

The safe and reliable operation of nuclear reactors has always been one of the topmost priorities in the nuclear industry. Transient testing allows us to understand the time-dependent behavior of the neutron population in response to either a planned change in the reactor conditions or unplanned circumstances. These unforeseen conditions might occur due to sudden reactivity insertions, feedback, power excursions, instabilities, and accidents. To study such behavior, we need transient testing, which is like car crash testing, to estimate the durability and strength of a car design. In nuclear designs, such transient testing can simulate a wide range of accidents due to sudden reactivity insertions and helps to study the feasibility and integrity of the fuel to be used in certain reactor types. This testing involves a high neutron flux environment and real-time imaging technology with advanced instrumentation with appropriate accuracy and resolution to study the fuel slumping behavior. With the aid of transient testing and adequate imaging tools, it is possible to test the safety basis for reactor and fuel designs that serves as a gateway in licensing advanced reactors in the future. To that end, it is crucial to fully understand advanced imaging techniques both analytically and via simulations. This paper presents an innovative method of supporting real-time imaging of fuel pins and other structures during transient testing. The major fuel-motion detection device that is studied in this dissertation is the Hodoscope which requires collimators. This paper provides 1) an MCNP model and simulation of a Transient Reactor Test (TREAT) core with a central fuel element replaced by a slotted fuel element that provides an open path between test samples and a hodoscope detector and 2) a choice of good filter to improve image resolution.

Keywords: hodoscope, transient testing, collimators, MCNP, TREAT, hodogram, filters

Procedia PDF Downloads 48
1236 Toward Understanding the Glucocorticoid Receptor Network in Cancer

Authors: Swati Srivastava, Mattia Lauriola, Yuval Gilad, Adi Kimchi, Yosef Yarden

Abstract:

The glucocorticoid receptor (GR) has been proposed to play important, but incompletely understood roles in cancer. Glucocorticoids (GCs) are widely used as co-medication of various carcinomas, due to their ability to reduce the toxicity of chemotherapy. Furthermore, GR antagonism has proven to be a strategy to treat triple negative breast cancer and castration-resistant prostate cancer. These observations suggest differential GR involvement in cancer subtypes. The goal of our study has been to elaborate the current understanding of GR signaling in tumor progression and metastasis. Our study involves two cellular models, non-tumorigenic breast epithelial cells (MCF10A) and Ewing sarcoma cells (CHLA9). In our breast cell model, the results indicated that the GR agonist dexamethasone inhibits EGF-induced mammary cell migration, and this effect was blocked when cells were stimulated with a GR antagonist, namely RU486. Microarray analysis for gene expression revealed that the mechanism underlying inhibition involves dexamenthasone-mediated repression of well-known activators of EGFR signaling, alongside with enhancement of several EGFR’s negative feedback loops. Because GR mainly acts primarily through composite response elements (GREs), or via a tethering mechanism, our next aim has been to find the transcription factors (TFs) which can interact with GR in MCF10A cells.The TF-binding motif overrepresented at the promoter of dexamethasone-regulated genes was predicted by using bioinformatics. To validate the prediction, we performed high-throughput Protein Complementation Assays (PCA). For this, we utilized the Gaussia Luciferase PCA strategy, which enabled analysis of protein-protein interactions between GR and predicted TFs of mammary cells. A library comprising both nuclear receptors (estrogen receptor, mineralocorticoid receptor, GR) and TFs was fused to fragments of GLuc, namely GLuc(1)-X, X-GLuc(1), and X-GLuc(2), where GLuc(1) and GLuc(2) correspond to the N-terminal and C-terminal fragments of the luciferase gene.The resulting library was screened, in human embryonic kidney 293T (HEK293T) cells, for all possible interactions between nuclear receptors and TFs. By screening all of the combinations between TFs and nuclear receptors, we identified several positive interactions, which were strengthened in response to dexamethasone and abolished in response to RU486. Furthermore, the interactions between GR and the candidate TFs were validated by co-immunoprecipitation in MCF10A and in CHLA9 cells. Currently, the roles played by the uncovered interactions are being evaluated in various cellular processes, such as cellular proliferation, migration, and invasion. In conclusion, our assay provides an unbiased network analysis between nuclear receptors and other TFs, which can lead to important insights into transcriptional regulation by nuclear receptors in various diseases, in this case of cancer.

Keywords: epidermal growth factor, glucocorticoid receptor, protein complementation assay, transcription factor

Procedia PDF Downloads 199
1235 Phylogenetic Relationships of Aproaerema Simplexella (Walker) and the Groundnut Leaf Miner Aproaerema Modicella (Deventer) (Lepidoptera: Gelechiidae) Collected from Australia, India, Mozambique, and South Africa

Authors: Makhosi Buthelezi

Abstract:

Mitochondrial DNA cytochrome c oxidase I (COI) gene analyses linked the South African groundnut leaf miner (GLM) to the Australian soya bean moth Aproaerema simplexella (Walker) and Indian Aproaerema modicella (Deventer). Thus, the genetic relatedness of GLM, A. simplexela, and A. modicella was examined by performing mitochondrial and nuclear (COI, cytochrome oxidase subunit II (COII), mitochondrial cytochrome b (CYTB), nuclear ribosomal 28S (28S) and intergenic spacer elongation factor-1 alpha ( EF-1 ALPHA) on 44 specimens collected from South Africa, four from Mozambique, and three each from single locations in India and Australia. Phylogenetic analyses were conducted using the Maximum Parsimony (MP) and Neighbour-Joining (NJ) methods. All of the datasets of the five DNA gene regions that were sequenced were also analyzed using the Basic Local Alignment Search Tool (BLAST) to find the closest matches for inclusion in the phylogenetic trees as outgroups and for purposes of information. In the phylogenetic trees for COI, COII, cytb and EF-1 ALPHA, a similar pattern was observed in the way that the sequences assembled into different groups; i.e., some sequences of A. simplexella from Australia were grouped separately from the others, but some Australian sequences grouped with those of the GLM from South Africa, India, and Mozambique. In the phylogenetic tree for 28S, all sequences from South Africa, Australia, India, and Mozambique grouped together and formed one group. For COI, genetic pairwise distance ranged from 0.97 to 3.60 %, for COII it ranged from 0.19% to 2.32%, for cytb it ranged from 0.25 to 9.77% and for EF-1 ALPHA it ranged 0.48 to 6.99%. Results of this study indicate that these populations are genetically related and presumably constitute a single species. Thus, further molecular and morphological studies need to be undertaken in order to resolve this apparent conundrum on the taxonomy of these populations.

Keywords: aproaerema modicella, aproaerema simplexella, mitochondrial DNA, nuclear DNA

Procedia PDF Downloads 172
1234 Iran and the Security of the Gulf Cooperation Council States

Authors: Ibrahim Alshalan

Abstract:

The Islamic Republic of Iran is one of the greatest and most powerful countries, not only in the Arabian Gulf but in the entire Middle East region. However, the Iranian regime, which came to power as a result of the 1979 revolution that resulted in overthrowing the Shah Mohammad Reza Pahlavi, has been the biggest source of threat to the stability of the Middle East since the revolution until this day. It has ambitions to dominate the neighboring Arab countries, especially Iraq, Syria, Lebanon, Yemen and Bahrain. Iran has bad relationships with countries of the Gulf Cooperation Council (GCC), which includes Saudi Arabia, United Arab Emirates, Kuwait, Qatar, Oman and Bahrain. The main objective of this paper is to shed light on the deteriorating political relations between the Iranian regime on one hand and the GCC on the other, especially Saudi Arabia which is witnessing more challenges as a result of Iran's determination to develop its nuclear program. Another important objective of this paper is to identify the Iranian role in the creation of the hotbeds of conflict in addition to its responsibility for some of the region's problems. It also aims to answer the question; why does Iran insist on developing its controversial nuclear program?

Keywords: Iran, GCC, Gulf, Saudi Arabia

Procedia PDF Downloads 536
1233 Assessment of Nuclear Medicine Radiation Protection Practices Among Radiographers and Nurses at a Small Nuclear Medicine Department in a Tertiary Hospital

Authors: Nyathi Mpumelelo; Moeng Thabiso Maria

Abstract:

BACKGROUND AND OBJECTIVES: Radiopharmaceuticals are used for diagnosis, treatment, staging and follow up of various diseases. However, there is concern that the ionizing radiation (gamma rays, α and ß particles) emitted by radiopharmaceuticals may result in exposure of radiographers and nurses with limited knowledge of the principles of radiation protection and safety, raising the risk of cancer induction. This study aimed at investigation radiation safety awareness levels among radiographers and nurses at a small tertiary hospital in South Africa. METHODS: An analytical cross-sectional study. A validated two-part questionnaire was implemented to consenting radiographers and nurses working in a Nuclear Medicine Department. Part 1 gathered demographic information (age, gender, work experience, attendance to/or passing ionizing radiation protection courses). Part 2 covered questions related to knowledge and awareness of radiation protection principles. RESULTS: Six radiographers and five nurses participated (27% males and 73% females). The mean age was 45 years (age range 20-60 years). The study revealed that neither professional development courses nor radiation protection courses are offered at the Nuclear Medicine Department understudy. However, 6/6 (100%) radiographers exhibited a high level of awareness of radiation safety principles on handling and working with radiopharmaceuticals which correlated to their years of experience. As for nurses, 4/5 (80%) showed limited knowledge and awareness of radiation protection principles irrespective of the number of years in the profession. CONCLUSION: Despite their major role of caring for patients undergoing diagnostic and therapeutic treatments, the nurses showed limited knowledge of ionizing radiation and associated side effects. This was not surprising since they never received any formal basic radiation safety course. These findings were not unique to this Centre. A study conducted in a Kuwaiti Radiology Department also established that the vast majority of nurses did not understand the risks of working with ionizing radiation. Similarly, nurses in an Australian hospital exhibited knowledge limitations. However, nursing managers did provide the necessary radiation safety training when requested. In Guatemala and Saudi Arabia, where there was shortage of professional radiographers, nurses underwent radiography training, a course that equipped them with basic radiation safety principles. The radiographers in the Centre understudy unlike others in various parts of the world demonstrated substantial knowledge and awareness on radiation protection. Radiations safety courses attended when an opportunity arose played a critical role in their awareness. The knowledge and awareness levels of these radiographers were comparable to their counterparts in Sudan. However, it was much more above that of their counterparts in Jordan, Nigeria, Nepal and Iran who were found to have limited awareness and inadequate knowledge on radiation dose. Formal radiation safety and awareness courses and workshops can play a crucial role in raising the awareness of nurses and radiographers on radiation safety for their personal benefit and that of their patients.

Keywords: radiation safety, radiation awareness, training, nuclear medicine

Procedia PDF Downloads 43