Search results for: threat analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27426

Search results for: threat analysis

27246 Sub-Saharan Africa: Role of Global Fashion System in Turbo-Charging Growth of Apparel Industry

Authors: Rajkishore Nayak, Tarun Panwar, Majo George

Abstract:

The study focuses on investigating the factors that influence the growth of fashion and textile manufacturing in the Sub-Saharan Africa (SSA) countries. This paper endeavours to identify, analyse and evaluate the critical factors associated with the growth of fashion and textile manufacturing in SSA countries. This research has done a Strength, Weakness, Opportunity, and Threat (SWOT) analysis based on the available literature and the knowledge of authors in garment manufacturing and export. It was found that the SSA countries have shown little growth in fashion and textile manufacturing and export from the starting of the year 2000. Unlike the developing countries such as Vietnam and Bangladesh, the total export to the US, the EU and other parts of the world has declined. On the other hand, the total supply of fashion and textiles to the domestic market has been in rise. However, the local communities still need to rely on other countries to meet their demand. Availability of cheaper imported clothes from other countries such as Bangladesh, China and Vietnam have made it difficult for the local manufacturers to produce at a cheaper price.

Keywords: Sub-Saharan Africa, developing countries, apparel industry, fashion and textile, sustainable fashion

Procedia PDF Downloads 96
27245 Electoral Violence and Women in Politics: A Case Study of Pakistan

Authors: Mariam Arif

Abstract:

The objective of the current study is to find out the electoral violence against women and its implications on their political participation. This paper is a qualitative study to get an in-depth analysis of the phenomenon. This study used questionnaires and interviews for findings. This paper attempts to study electoral violence and women in politics in Pakistan. The study concluded that women are subjected to different categories of violence defined as physical violence that involves sexual and bodily harm to a politically active woman or to people associated with her. Social and psychological violence includes class difference, stress, social limitations, family pressure and character assassination. Economic violence is defined as a systematic restriction of access to economic resources available to women thus hinder women active participation in politics (elections). All these violence against women in elections are threat to the integrity of the electoral process of the country that eventually affects women’s participation as voters, party candidates, election officials and political party leaders. It also undermines the free and fair democratic process. This qualitative paper shows a significant negative relationship between electoral violence and women participation in politics.

Keywords: elections, politics, violence, women

Procedia PDF Downloads 126
27244 Assessing the Effects of Climate Change on Wheat Production, Ensuring Food Security and Loss Compensation under Crop Insurance Program in Punjab-Pakistan

Authors: Mirza Waseem Abbas, Abdul Qayyum, Muhammad Islam

Abstract:

Climate change has emerged as a significant threat to global food security, affecting crop production systems worldwide. This research paper aims to examine the specific impacts of climate change on wheat production in Pakistan, Punjab in particular, a country highly dependent on wheat as a staple food crop. Through a comprehensive review of scientific literature, field observations, and data analysis, this study assesses the key climatic factors influencing wheat cultivation and the subsequent implications for food security in the region. A comparison of two subsequent Wheat seasons in Punjab was examined through climatic conditions, area, yield, and production data. From the analysis, it is observed that despite a decrease in the area under cultivation in the Punjab during the Wheat 2023 season, the production and average yield increased due to favorable weather conditions. These uncertain climatic conditions have a direct impact on crop yields. Last year due to heat waves, Wheat crop in Punjab suffered a significant loss. Through crop insurance, Wheat growers were provided with yield loss protection keeping in view the devastating heat wave and floods last year. Under crop insurance by the Government of the Punjab, 534,587 Wheat growers were insured with a $1.6 million premium subsidy. However, due to better climatic conditions, no loss in the yield was recorded in the insured areas. Crop Insurance is one of the suitable options for policymakers to protect farmers against climatic losses in the future as well.

Keywords: climate change, crop insurance, heatwave, wheat yield punjab

Procedia PDF Downloads 40
27243 Genome-Wide Identification and Characterization of MLO Family Genes in Pumpkin (Cucurbita maxima Duch.)

Authors: Khin Thanda Win, Chunying Zhang, Sanghyeob Lee

Abstract:

Mildew resistance locus o (Mlo), a plant-specific gene family with seven-transmembrane (TM), plays an important role in plant resistance to powdery mildew (PM). PM caused by Podosphaera xanthii is a widespread plant disease and probably represents the major fungal threat for many Cucurbits. The recent Cucurbita maxima genome sequence data provides an opportunity to identify and characterize the MLO gene family in this species. Total twenty genes (designated CmaMLO1 through CmaMLO20) have been identified by using an in silico cloning method with the MLO gene sequences of Cucumis sativus, Cucumis melo, Citrullus lanatus and Cucurbita pepo as probes. These CmaMLOs were evenly distributed on 15 chromosomes of 20 C. maxima chromosomes without any obvious clustering. Multiple sequence alignment showed that the common structural features of MLO gene family, such as TM domains, a calmodulin-binding domain and 30 important amino acid residues for MLO function, were well conserved. Phylogenetic analysis of the CmaMLO genes and other plant species reveals seven different clades (I through VII) and only clade IV is specific to monocots (rice, barley, and wheat). Phylogenetic and structural analyses provided preliminary evidence that five genes belonged to clade V could be the susceptibility genes which may play the importance role in PM resistance. This study is the first comprehensive report on MLO genes in C. maxima to our knowledge. These findings will facilitate the functional analysis of the MLOs related to PM susceptibility and are valuable resources for the development of disease resistance in pumpkin.

Keywords: Mildew resistance locus o (Mlo), powdery mildew, phylogenetic relationship, susceptibility genes

Procedia PDF Downloads 157
27242 Critical Discourse Analysis of Xenophobia in UK Political Party Blogs

Authors: Nourah Almulhim

Abstract:

This paper takes a critical discourse analysis (CDA) approach to investigate discourse and ideology in political blogs, focusing in particular on the Conservative Home blog from the UK’s current governing party. The Conservative party member’s discourse strategies as the blogger, alongside the discourse used by members of the public who reply to the blog in the below-the-lines comments, will be examined. The blog discourse reflects the writer's political identity and authorial voice. The analysis of the below-the-lines comments enables members of the public to engage in creating adversative positions, introducing different language users who bring their own individual and collective identities. These language users can play the role of news reporters, political analysts, protesters or supporters of a specific agenda and current socio-political topics or events. This study takes a qualitative approach to analyze the discriminatory context towards Islam/Muslims in ' The Conservative Home' blog. A cognitive approach is adopted and an analysis of dominant discourses in the blog text and the below-the-line comments is used. The focus of the study is, firstly, on the construction of self/ collective national identity in comparison to Muslim identity, highlighting the in-group and out-group construction. Second, the type of attitudes, whether feelings or judgments, related to these social actors as they are explicated to draw on the social values. Third, the role of discursive strategies in justifying and legitimizing those Islamophobic discriminatory practices. Therefore, the analysis is based on the systematic analysis of social actors drawing on actors, actions, and arguments to explicate identity construction and its development in the different discourses. A socio-semantic categorization of social actors is implemented to draw on the discursive strategies in addition to using literature to understand these strategies. An appraisal analysis is further used to classify attitudes and elaborate on core values in both genres. Finally, the grammar of othering is applied to explain how discriminatory dichotomies of 'Us' Vs. ''Them' actions are carried in discourse. Some of the key findings of the analysis can be summarized in two main points. First, the discursive practice used to represent Muslims/Islam as different from ‘Us’ are different in both genres as the blogger uses a covert voice while the commenters generally use an overt voice. This is to say that the blogger uses a mitigated strategy to represent the Muslim identity, for example, using the noun phrase ‘British Muslim’ but then representing them as ‘radical’ and ‘terrorists'. Contrary to this is in below the lines comments, where a direct strategy with an active declarative voice is used to negatively represent the Muslim identity as ‘oppressors’ and ‘terrorists’ with no inclusion of the noun phrase ‘British Muslims’. Second, the negotiation of the ‘British’ identity and values, such as culture and democracy, are prominent in the comment section as being unique and under threat by Muslims, while in the article, these standpoints are not represented.

Keywords: xenophobia, blogs, identity, critical discourse analysis

Procedia PDF Downloads 50
27241 Problems of Drought and Its Management in Yobe State, Nigeria

Authors: Hassan Gana Abdullahi, Michael A. Fullen, David Oloke

Abstract:

Drought poses an enormous global threat to sustainable development and is expected to increase with global climate change. Drought and desertification are major problems in Yobe State (north-east Nigeria). This investigation aims to develop a workable framework and management tool for drought mitigation in Yobe State. Mixed methods were employed during the study and additional qualitative information was gathered through Focus Group Discussions (FGD). Data on socio-economic impacts of drought were thus collected via both questionnaire surveys and FGD. In all, 1,040 questionnaires were distributed to farmers in the State and 721 were completed, representing a return rate of 69.3%. Data analysis showed that 97.9% of respondents considered themselves to be drought victims, whilst 69.3% of the respondents were unemployed and had no other means of income, except through rain-fed farming. Developing a viable and holistic approach to drought mitigation is crucial, to arrest and hopefully reverse environment degradation. Analysed data will be used to develop an integrated framework for drought mitigation and management in Yobe State. This paper introduces the socio-economic and environmental effects of drought in Yobe State.

Keywords: drought, climate change, mitigation, management, Yobe State

Procedia PDF Downloads 339
27240 Reuse of Wastewater After Pretreatment Under Teril and Sand in Bechar City

Authors: Sara Seddiki, Maazouzi Abdelhak

Abstract:

The main objective of this modest work is to follow the physicochemical and bacteriological evolution of the wastewater from the town of Bechar subjected to purification by filtration according to various local supports, namely Sable and Terrill by reducing nuisances that undergo the receiving environment (Oued Bechar) and therefore make this water source reusable in different areas. The study first made it possible to characterize the urban wastewater of the Bechar wadi, which presents an environmental threat, thus allowing an estimation of the pollutant load, the chemical oxygen demand COD (145 mg / l) and the biological oxygen demand BOD5 (72 mg / l) revealed that these waters are less biodegradable (COD / BOD5 ratio = 0.62), have a fairly high conductivity (2.76 mS/cm), and high levels of mineral matter presented by chlorides and sulphates 390 and 596.1 mg / l respectively, with a pH of 8.1. The characterization of the sand dune (Beni Abbes) shows that quartz (97%) is the most present mineral. The granular analysis allowed us to determine certain parameters like the uniformity coefficient (CU) and the equivalent diameter, and scanning electron microscope (SEM) observations and X-ray analysis were performed. The study of filtered wastewater shows satisfactory and very encouraging treatment results, with complete elimination of total coliforms and streptococci and a good reduction of total aerobic germs in the sand and clay-sand filter. A good yield has been reported in the sand Terrill filter for the reduction of turbidity. The rates of reduction of organic matter in terms of the biological oxygen demand, in chemical oxygen demand recorded, are of the order of 60%. The elimination of sulphates is 40% for the sand filter.

Keywords: urban wastewater, filtration, bacteriological and physicochemical parameters, sand, Terrill, Oued Bechar

Procedia PDF Downloads 54
27239 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 93
27238 Effects of Convective Momentum Transport on the Cyclones Intensity: A Case Study

Authors: José Davi Oliveira De Moura, Chou Sin Chan

Abstract:

In this study, the effect of convective momentum transport (CMT) on the life of cyclone systems and their organization is analyzed. A case of strong precipitation, in the southeast of Brazil, was simulated using Eta model with two kinds of convective parameterization: Kain-Fritsch without CMT and Kain-fritsch with CMT. Reanalysis data from CFSR were used to compare Eta model simulations. The Wind, mean sea level pressure, rain and temperature are included in analysis. The rain was evaluated by Equitable Threat Score (ETS) and Bias Index; the simulations were compared among themselves to detect the influence of CMT displacement on the systems. The result shows that CMT process decreases the intensity of meso cyclones (higher pressure values on nuclei) and change the positions and production of rain. The decrease of intensity in meso cyclones should be caused by the dissolution of momentum from lower levels from up levels. The rain production and rain distribution were altered because the displacement of the larger systems scales was changed. In addition, the inclusion of CMT process is very important to improve the simulation of life time of meteorological systems.

Keywords: convection, Kain-Fritsch, momentum, parameterization

Procedia PDF Downloads 288
27237 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 49
27236 Geospatial Analysis of Hydrological Response to Forest Fires in Small Mediterranean Catchments

Authors: Bojana Horvat, Barbara Karleusa, Goran Volf, Nevenka Ozanic, Ivica Kisic

Abstract:

Forest fire is a major threat in many regions in Croatia, especially in coastal areas. Although they are often caused by natural processes, the most common cause is the human factor, intentional or unintentional. Forest fires drastically transform landscapes and influence natural processes. The main goal of the presented research is to analyse and quantify the impact of the forest fire on hydrological processes and propose the model that best describes changes in hydrological patterns in the analysed catchments. Keeping in mind the spatial component of the processes, geospatial analysis is performed to gain better insight into the spatial variability of the hydrological response to disastrous events. In that respect, two catchments that experienced severe forest fire were delineated, and various hydrological and meteorological data were collected both attribute and spatial. The major drawback is certainly the lack of hydrological data, common in small torrential karstic streams; hence modelling results should be validated with the data collected in the catchment that has similar characteristics and established hydrological monitoring. The event chosen for the modelling is the forest fire that occurred in July 2019 and burned nearly 10% of the analysed area. Surface (land use/land cover) conditions before and after the event were derived from the two Sentinel-2 images. The mapping of the burnt area is based on a comparison of the Normalized Burn Index (NBR) computed from both images. To estimate and compare hydrological behaviour before and after the event, curve number (CN) values are assigned to the land use/land cover classes derived from the satellite images. Hydrological modelling resulted in surface runoff generation and hence prediction of hydrological responses in the catchments to a forest fire event. The research was supported by the Croatian Science Foundation through the project 'Influence of Open Fires on Water and Soil Quality' (IP-2018-01-1645).

Keywords: Croatia, forest fire, geospatial analysis, hydrological response

Procedia PDF Downloads 97
27235 Ethical 'Spaces': A Critical Analysis of the Medical, Ethical and Legal Complexities in the Treatment and Care of Unidentified and Critically Incapacitated Victims Following a Disaster

Authors: D. Osborn, L. Easthope

Abstract:

The increasing threat of ‘marauding terror,' utilising improvised explosive devices and firearms, has focused the attention of policy makers and emergency responders once again on the treatment of the critically injured patient in a highly volatile scenario. Whilst there have been significant improvements made in the response and lessons learned from recent disasters in the international disaster community there still remain areas of uncertainty and a lack of clarity in the care of the critically injured. This innovative, longitudinal study has at its heart the aim of using ethnographic methods to ‘slow down’ the journey such patients will take and make visible the ethical complexities that 2017 technologies, expectations and over a decade of improved combat medicine techniques have brought. The primary researcher, previously employed in the hospital emergency management environment, has closely followed responders as they managed casualties with life-threatening injuries. Ethnographic observation of Exercise Unified Response in March 2016, exposed the ethical and legal 'vacuums' within a mass casualty and fatality setting, specifically the extrication, treatment and care of critically injured patients from crushed and overturned train carriages. This article highlights a gap in the debate, evaluation, planning and response to an incident of this nature specifically the incapacitated, unidentified patients and the ethics of submitting them to the invasive ‘Disaster Victim Identification’ process. Using a qualitative ethnographic analysis, triangulating observation, interviews and documentation, this analysis explores the gaps and highlights the next stages in the researcher’s pathway as she continues to explore with emergency practitioners some of this century’s most difficult questions in relation to the medico-legal and ethical challenges faced by emergency services in the wake of new and emerging threats and medical treatment expectations.

Keywords: ethics, disaster, Disaster Victim Identification (DVI), legality, unidentified

Procedia PDF Downloads 167
27234 A Model of Human Security: A Comparison of Vulnerabilities and Timespace

Authors: Anders Troedsson

Abstract:

For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.

Keywords: human security, timespace, vulnerabilities, risk perception

Procedia PDF Downloads 302
27233 Transient Freshwater-Saltwater Transition-Zone Dynamics in Heterogeneous Coastal Aquifers

Authors: Antoifi Abdoulhalik, Ashraf Ahmed

Abstract:

The ever growing threat of saltwater intrusion has prompted the need to further advance the understanding of underlying processes related to SWI for effective water resource management. While research efforts have mainly been focused on steady state analysis, studies on the transience of saltwater intrusion mechanism remain very scarce and studies considering transient SWI in heterogeneous medium are, as per our knowledge, simply inexistent. This study provides for the first time a quantitative analysis of the effect of both inland and coastal water level changes on the transition zone under transient conditions in layered coastal aquifer. In all, two sets of four experiments were completed, including a homogeneous case, and four layered cases: case LH and case HL presented were two bi-layered scenarios where a low K layer was set at the top and the bottom, respectively; case HLH and case LHL presented two stratified aquifers with High K–Low K–High K and Low K–High K– Low K pattern, respectively. Experimental automated image analysis technique was used here to quantify the main SWI parameters under high spatial and temporal resolution. The findings of this study provide an invaluable insight on the underlying processes responsible of transition zone dynamics in coastal aquifers. The results show that in all the investigated cases, the width of the transition zone remains almost unchanged throughout the saltwater intrusion process regardless of where the boundary change occurs. However, the results demonstrate that the width of the transition zone considerably increases during the retreat, with largest amplitude observed in cases LH and LHL, where a low K was set at the top of the system. In all the scenarios, the amplitude of widening was slightly smaller when the retreat was prompted by instantaneous drop of the saltwater level than when caused by inland freshwater rise, despite equivalent absolute head change magnitude. The magnitude of head change significantly caused larger widening during the saltwater wedge retreat, while having no impact during the intrusion phase.

Keywords: freshwater-saltwater transition-zone dynamics, heterogeneous coastal aquifers, laboratory experiments, transience seawater intrusion

Procedia PDF Downloads 210
27232 Between Riots and Protests: A Structural Approach to Urban Environmental Uprisings in China

Authors: Zi Zhu

Abstract:

The last decade has witnessed increasing urban environmental uprisings in China, as thousands of citizens swarmed into streets to express their deep concerns about the environmental threat and public health through various collective actions. The prevalent western approaches to collective actions, which usually treat urban riots and social movements as distinct phenomenon, have plagued an adequate analysis of the urban environmental uprisings in China. The increasing urban environmental contention can neither be categorized into riots nor social movements, as they carry the features of both: at first sight, they are spontaneous, disorganized and disruptive with an absence of observable mobilization process; however, unlike riots in the west, these collective actions conveyed explicit demand in a mostly non-destructive way rather than a pure expression of frustration. This article proposes a different approach to urban environmental uprisings in China which concerns the diminishing boundaries between riots and social movements and points to the underlying structural causes to the unique forms of urban environmental contention. Taking the urban anti-PX protests as examples, this article analyzes the societal and political structural environment faced by the Chinese environmental protesters and its influence on the origin and development of their contention.

Keywords: urban environmental uprisings, China, anti-PX protests, opportunity structure

Procedia PDF Downloads 258
27231 A Review of Spatial Analysis as a Geographic Information Management Tool

Authors: Chidiebere C. Agoha, Armstong C. Awuzie, Chukwuebuka N. Onwubuariri, Joy O. Njoku

Abstract:

Spatial analysis is a field of study that utilizes geographic or spatial information to understand and analyze patterns, relationships, and trends in data. It is characterized by the use of geographic or spatial information, which allows for the analysis of data in the context of its location and surroundings. It is different from non-spatial or aspatial techniques, which do not consider the geographic context and may not provide as complete of an understanding of the data. Spatial analysis is applied in a variety of fields, which includes urban planning, environmental science, geosciences, epidemiology, marketing, to gain insights and make decisions about complex spatial problems. This review paper explores definitions of spatial analysis from various sources, including examples of its application and different analysis techniques such as Buffer analysis, interpolation, and Kernel density analysis (multi-distance spatial cluster analysis). It also contrasts spatial analysis with non-spatial analysis.

Keywords: aspatial technique, buffer analysis, epidemiology, interpolation

Procedia PDF Downloads 279
27230 Combining Multiscale Patterns of Weather and Sea States into a Machine Learning Classifier for Mid-Term Prediction of Extreme Rainfall in North-Western Mediterranean Sea

Authors: Pinel Sebastien, Bourrin François, De Madron Du Rieu Xavier, Ludwig Wolfgang, Arnau Pedro

Abstract:

Heavy precipitation constitutes a major meteorological threat in the western Mediterranean. Research has investigated the relationship between the states of the Mediterranean Sea and the atmosphere with the precipitation for short temporal windows. However, at a larger temporal scale, the precursor signals of heavy rainfall in the sea and atmosphere have drawn little attention. Moreover, despite ongoing improvements in numerical weather prediction, the medium-term forecasting of rainfall events remains a difficult task. Here, we aim to investigate the influence of early-spring environmental parameters on the following autumnal heavy precipitations. Hence, we develop a machine learning model to predict extreme autumnal rainfall with a 6-month lead time over the Spanish Catalan coastal area, based on i) the sea pattern (main current-LPC and Sea Surface Temperature-SST) at the mesoscale scale, ii) 4 European weather teleconnection patterns (NAO, WeMo, SCAND, MO) at synoptic scale, and iii) the hydrological regime of the main local river (Rhône River). The accuracy of the developed model classifier is evaluated via statistical analysis based on classification accuracy, logarithmic and confusion matrix by comparing with rainfall estimates from rain gauges and satellite observations (CHIRPS-2.0). Sensitivity tests are carried out by changing the model configuration, such as sea SST, sea LPC, river regime, and synoptic atmosphere configuration. The sensitivity analysis suggests a negligible influence from the hydrological regime, unlike SST, LPC, and specific teleconnection weather patterns. At last, this study illustrates how public datasets can be integrated into a machine learning model for heavy rainfall prediction and can interest local policies for management purposes.

Keywords: extreme hazards, sensitivity analysis, heavy rainfall, machine learning, sea-atmosphere modeling, precipitation forecasting

Procedia PDF Downloads 105
27229 Economic Benefit of Wild Animals: A Possible Threat to Conservation in Ovia Southwest, Edo State, Nigeria

Authors: B. G. Oguntuase, M. O. Olofinsae

Abstract:

This study was carried out to assess the contribution of bush meat to Edo people’s livelihood and the consequence of utilization on conservation. Five markets were selected in Ovia Southwest local government area of Edo State, twenty bush meat sellers were selected from each market. Direct observations were made to document the composition of wild animals under sale in the study area. A total of one hundred questionnaires were administered to the respondents. The questionnaires were all retrieved and analyzed using descriptive analysis. The results show that thirteen animal species are being traded in the area. The price for the animal species (whole animal) ranged from N200 to N9,520. Respondents reported that there is a decline in the animal population over time. Between 64% and 95% of the respondents acknowledged population decline in seven of the thirteen animal species available for sale compared to what it used to be some ten years ago. Sales of wild animal species could be regarded as a profitable business in the rural community, supporting livelihood of the community, but could have devastating effect on conservation as already observed in this study if harvesting of wild animals is not regulated on controlled or sustainable basis.

Keywords: conservation, economic benefits, hunting, population, wild animals

Procedia PDF Downloads 424
27228 Multi-Criteria Nautical Ports Capacity and Services Planning

Authors: N. Perko, N. Kavran, M. Bukljas, I. Berbic

Abstract:

This paper is a result of implemented research on proposed introduced methodology for nautical ports capacity planning by introducing a multi-criteria approach of defined criteria and impacts at the Adriatic Sea. The purpose was analysing the determinants -characteristics of infrastructure and services of nautical ports capacity allocated, especially nowadays due to COVID-19 pandemic, as crucial for the successful operation of nautical ports. Giving the importance of the defined priorities for short-term and long-term planning is essential not only in terms of the development of nautical tourism but also in terms of developing the maritime system, but unfortunately, this is not always carried out. Evaluation of the use of resources should follow from a detailed analysis of all aspects of resources bearing in mind that nautical tourism used resources in a sustainable manner and generate effects in the tourism and maritime sectors. Consequently, the identified multiplier effect of nautical tourism, which should be defined and quantified in detail, should be one of the major competitive products on the Croatian Adriatic and the Mediterranean. Research of nautical tourism is necessary to quantify the effects and required planning system development. In the future, the greatest threat to the long-term sustainable development of nautical tourism can be its further uncontrolled or unlimited and undirected development, especially under pressure markedly higher demand than supply for new moorings in the Mediterranean. Results of this implemented research are applicable to nautical ports management and decision-makers of maritime transport system development. This paper will present implemented research and obtained result-developed methodology for nautical port capacity planning -port capacity planning multi-criteria decision-making. A proposed methodological approach of multi-criteria capacity planning includes four criteria (spatial - transport, cost - infrastructure, ecological and organizational criteria, and additional services). The importance of the criteria and sub-criteria is evaluated and carried out as the basis for sensitivity analysis of the importance of the criteria and sub-criteria. Based on the analysis of the identified and quantified importance of certain criteria and sub-criteria, as well as sensitivity analysis and analysis of changes of the quantified importance, scientific and applicable results will be presented. These obtained results have practical applicability by management of nautical ports in the planning of increasing capacity and further development and for the adaptation of existing nautical ports. Obtained research is applicable and replicable in other seas, and results are especially important and useful in this COVID-19 pandemic challenging maritime development framework.

Keywords: Adriatic Sea, capacity, infrastructures, maritime system, methodology, nautical ports, nautical tourism, service

Procedia PDF Downloads 156
27227 Analysis of the Impacts and Challenges of Conventional Solid Waste Management in Urban Centers of Developing Countries

Authors: Haruna Abdu Usman, J. Mohammed Umar, U. M. Bashir

Abstract:

Solid waste management continued to be the biggest threat to the sustainability of urban centers of developing countries. Most streets corners of these urban centers are characterized by heaps of uncollected wastes at drains, public spaces and road sides destroying the aesthetic qualities and environmental ecosystems of these cities. Also, harboring disease vectors and rodents putting the health of the populace at risk, thus posing a serious challenge to the municipalities who are in most cases responsible for the solid waste management in these cities. The typical or commonest method adapted by these agencies in dealing with the solid waste management is the conventional approach; focusing mainly on waste collection ,treatment(composting and incineration)and disposal giving little consideration to the 3RS, of waste reduce, re-used and recycled. The resultant consequence being huge budget spending in solid waste management as high as 80% but little collection rate as low as 50%. This paper attempt to analyze the impacts and effects of the conventional solid waste management practices on the stakeholders in solid waste management; the municipal authorities, the communities, formal and informal waste managers, the NGOs and CBOs and suggests appropriate measures that would lessen the effects.

Keywords: conventional waste management, solid waste, waste stakeholders, developing countries

Procedia PDF Downloads 416
27226 Application of Subversion Analysis in the Search for the Causes of Cracking in a Marine Engine Injector Nozzle

Authors: Leszek Chybowski, Artur Bejger, Katarzyna Gawdzińska

Abstract:

Subversion analysis is a tool used in the TRIZ (Theory of Inventive Problem Solving) methodology. This article introduces the history and describes the process of subversion analysis, as well as function analysis and analysis of the resources, used at the design stage when generating possible undesirable situations. The article charts the course of subversion analysis when applied to a fuel injection nozzle of a marine engine. The work describes the fuel injector nozzle as a technological system and presents principles of analysis for the causes of a cracked tip of the nozzle body. The system is modelled with functional analysis. A search for potential causes of the damage is undertaken and a cause-and-effect analysis for various hypotheses concerning the damage is drawn up. The importance of particular hypotheses is evaluated and the most likely causes of damage identified.

Keywords: complex technical system, fuel injector, function analysis, importance analysis, resource analysis, sabotage analysis, subversion analysis, TRIZ (Theory of Inventive Problem Solving)

Procedia PDF Downloads 584
27225 The Integration of Cleaner Production Innovation and Creativity for Supply Chain Sustainability of Bogor Batik SMEs

Authors: Sawarni Hasibuan, Juliza Hidayati

Abstract:

Competitiveness and sustainability issues not only put pressure on big companies, but also small and medium enterprises (SMEs). SMEs Batik Bogor is one of the local culture-based creative industries in Bogor city which is also dealing with the issue of sustainability. The purpose of this research is to develop framework of sustainability at SMEs Batik Indonesia case of SMEs Batik Bogor by integrating innovation of cleaner production in its supply chain. The approach used is desk study, field survey, in-depth interviews, and benchmarking best practices of SMEs sustainability. In-depth interviews involve stakeholders to identify the needs and standards of sustainability of SMEs Batik. Data analysis was done by benchmarking method, Multi Dimension Scaling (MDS) method, and Strength, Weakness, Opportunity, Threat (SWOT) analysis. The results recommend the framework of sustainability for SMEs Batik in Indonesia. The sustainability status of SMEs Batik Bogor is classified as Moderate Sustainable. Factors that support the sustainability of SMEs Batik Bogor such is a strong commitment of top management in adopting cleaner production innovation and creativity approach. Successful cleaner production innovations are implemented primarily in the substitution of dye materials from toxic to non-toxic, reducing the intensity of non-renewable energy use, as well as the reuse and recycle of solid waste. “Mosaic Batik” is one of the innovations of solid waste utilization of batik waste produced by company R&D center that gives benefit to three pillars of sustainability, that is financial benefit, environmental benefit, and social benefit. The sustainability of SMEs Batik Bogor cannot be separated from the support of Bogor City Government which proactively facilitates the promotion of sustainable innovation produced by SMEs Batik Bogor.

Keywords: cleaner production innovation, creativity, SMEs Batik, sustainability supply chain

Procedia PDF Downloads 244
27224 Evaluation of Relationship between Job Stress Dimensions with Occupational Accidents in Industrial Factories in Southwest of Iran

Authors: Ali Ahmadi, Maryam Abbasi, Mohammad Mehdi Parsaei

Abstract:

Background: Stress in the workplace today is one of the most important public health concerns and a serious threat to the health of the workforce worldwide. Occupational stress can cause occupational events and reduce quality of life. As a result, it has a very undesirable impact on the performance of organizations, companies, and their human resources. This study aimed to evaluate the relationship between job stress dimensions and occupational accidents in industrial factories in Southwest Iran. Materials and Methods: This cross-sectional study was conducted among 200 workers in the summer of 2023 in the Southwest of Iran. To select participants, we used a convenience sampling method. The research tools in this study were the Health and Safety Executive (HSE) stress questionnaire with 35 questions and 7 dimensions and demographic information. A high score on this questionnaire indicates that there is low job stress and pressure. All workers completed the informed consent form. Univariate analysis was performed using chi-square and T-test. Multiple regression analysis was used to estimate the odds ratios (OR) and 95% confidence interval (CI) for the association of stress-related factors with job accidents in participants. Stata 14.0 software was used for analysis. Results: The mean age of the participants was 39.81(6.36) years. The prevalence of job accidents was 28.0% (95%CI: 21.0, 34.0). Based on the results of the multiple logistic regression with the adjustment of the effect of the confounding variables, one increase in the score of the demand dimension had a protective impact on the risk of job accidents(aOR=0.91,95%CI:0.85-0.95). Additionally, an increase in one of the scores of the managerial support (aOR=0.89, 95% CI: 0.83-0.95) and peer support (aOR=0.76, 95%CI: 0.67-87) dimensions was associated with a lower number of job accidents. Among dimensions, an increase in the score of relationship (aOR=0.89, 95%CI: 0.80-0.98) and change (aOR=0.86, 95%CI: 0.74-0.96) reduced the odds of the accident's occurrence among the workers by 11% and 16%, respectively. However, there was no significant association between role and control dimensions and the job accident (p>0.05). Conclusions: The results show that the prevalence of job accidents was alarmingly high. Our results suggested that an increase in scores of dimensions HSE questioners is significantly associated with a decrease the accident occurrence in the workplace. Therefore, planning to address stressful factors in the workplace seems necessary to prevent occupational accidents.

Keywords: HSE, Iran, job stress occupational accident, safety, occupational health

Procedia PDF Downloads 29
27223 Genetic Diversity of Wild Population of Heterobranchus Spp. Based on Mitochondria DNA Cytochrome C Oxidase Subunit I Gene Analysis

Authors: M. Y. Abubakar, Ipinjolu J. K., Yuzine B. Esa, Magawata I., Hassan W. A., Turaki A. A.

Abstract:

Catfish (Heterobranchus spp.) is a major freshwater fish that are widely distributed in Nigeria waters and are gaining rapid aquaculture expansion. However, indiscriminate artificial crossbreeding of the species with others poses a threat to their biodiversity. There is a paucity of information about the genetic variability, hence this insight on the genetic variability is badly needed, not only for the species conservation but for aquaculture expansion. In this study, we tested the level of Genetic diversity, population differentiation and phylogenetic relationship analysis on 35 individuals of two populations of Heterobranchus bidorsalis and 29 individuals of three populations of Heterobranchus longifilis using the mitochondrial cytochrome c oxidase subunit I (mtDNA COI) gene sequence. Nucleotide sequences of 650 bp fragment of the COI gene of the two species were compared. In the whole 4 and 5 haplotypes were distinguished in the populations of H. bidorsalis & H. longifilis with accession numbers (MG334168 - MG334171 & MG334172 to MG334176) respectively. Haplotypes diversity indices revealed a range of 0.59 ± 0.08 to 0.57 ± 0.09 in H. bidorsalis and 0.000 to 0.001051 ± 0.000945 in H. longifilis population, respectively. Analysis of molecular variance (AMOVA) revealed no significant variation among H. bidorsalis population of the Niger & Benue Rivers, detected significant genetic variation was between the Rivers of Niger, Kaduna and Benue population of H. longifilis. Two main clades were recovered, showing a clear separation between H. bidorsalis and H. longifilis in the phylogenetic tree. The mtDNA COI genes studied revealed high gene flow between populations with no distinct genetic differentiation between the populations as measured by the fixation index (FST) statistic. However, a proportion of population-specific haplotypes was observed in the two species studied, suggesting a substantial degree of genetic distinctiveness for each of the population investigated. These findings present the description of the species character and accessions of the fish’s genetic resources, through gene sequence submitted in Genetic database. The data will help to protect their valuable wild resource and contribute to their recovery and selective breeding in Nigeria.

Keywords: AMOVA, genetic diversity, Heterobranchus spp., mtDNA COI, phylogenetic tree

Procedia PDF Downloads 114
27222 Microbial Load, Prevalence and Antibiotic Resistance of Microflora Isolated from the Ghanaian Paper Currency Note: A Potential Health Threat

Authors: Simon Nyarko

Abstract:

This study examined the microbial flora contamination of the Ghanaian paper currency notes and antibiotic resistance in Ejura Municipal, Ashanti Region, Ghana. This is a descriptive cross-sectional study designed to assess the profile of microflora contamination of the Ghanaian paper currency notes and antibiotic-resistant in the Ejura Municipality. The research was conducted in Ejura, a town in the Ejura Sekyeredumase Municipal of the Ashanti region of Ghana. 70 paper currency notes which were freshly collected from the bank, consisting of 15 pieces of GH ¢1, GH ¢2, and GH ¢5, 10 pieces of GH ¢10 and GH ¢20, and 5 pieces of GH ¢50, were randomly sampled from people by exchanging their money in usage with those freshly secured from the bank. The surfaces of each GH¢ note were gently swabbed and sent to the lab immediately in sterile Zip Bags and sealed, and tenfold serial dilution was inoculated on plate count agar (PCA), MacConkey agar (MCA), mannitol salt agar (MSA), and deoxycholate citrate agar (DCA). For bacterial identification, the study used appropriate laboratory and biochemical tests. The data was analyzed using SPSS-IBM version 20.0. It was found that 95.2 % of the 70 GH¢ notes tested positive for one or more bacterial isolates. On each GH¢ note, mean counts on PCA ranged from 3.0 cfu/ml ×105 to 4.8 cfu/ml ×105. Of 124 bacteria isolated. 36 (29.03 %), 32 (25.81%), 16 (12.90 %), 20 (16.13%), 13 (10.48 %), and 7 (5.66 %) were from GH¢1, GH¢2, GH¢10, GH¢5, GH¢20, and GH¢50, respectively. Bacterial isolates were Escherichia coli (25.81%), Staphylococcus aureus (18.55%), coagulase-negative Staphylococcus (15.32%), Klebsiella species (12.10%), Salmonella species (9.68%), Shigella species (8.06%), Pseudomonas aeruginosa (7.26%), and Proteus species (3.23%). Meat shops, commercial drivers, canteens, grocery stores, and vegetable shops contributed 25.81 %, 20.16 %, 19.35 %, 17.74 %, and 16.94 % of GH¢ notes, respectively. There was 100% resistance of the isolates to Erythromycin (ERY), and Cotrimoxazole (COT). Amikacin (AMK) was the most effective among the antibiotics as 75% of the isolates were susceptible to it. This study has demonstrated that the Ghanaian paper currency notes are heavily contaminated with potentially pathogenic bacteria that are highly resistant to the most widely used antibiotics and are a threat to public health.

Keywords: microflora, antibiotic resistance, staphylococcus aureus, culture media, multi-drug resistance

Procedia PDF Downloads 77
27221 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 107
27220 2D Numerical Analysis for Determination of the Effect of Bored Piles Constructed against the Landslide near Karabuk University Stadium

Authors: Dogan Cetin, Burak Turk, Mahmut Candan

Abstract:

Landslides cause remarkable damage and loss of human life every year around the world. They may be made more likely by factors such as earthquakes, heavy precipitation, and incorrect construction activities near or on slopes. The stadium of Karabük University is located at the bottom of a very high slope. After construction of the stadium, severe deformations were observed on the social activity area surrounding the stadium. Some inclinometers were placed behind the stadium to detect the possible landslide activity. According to measurements of the inclinometers, irregular soil movements were detected at depths between 20 m and 45 m. Also, significant heaves and settlements were observed behind the stadium walls located at the toe of the slope. The heaves indicate that the stadium walls were under threat of a significant landslide. After inclinometer readings and field observations, the potential failure geometry was estimated. The protection system was designed based on numerous numerical analysis performed by 2-D Plaxis software. After the design was completed, protective geotechnical work was started. Before the geotechnical work began, new inclinometers were installed to monitor earth movement during the work and afterward. The total horizontal length of the possible failure surface is 220 m. Geotechnical work included two-row-pile construction and three-row-pile construction on the slope. The bored piles were 120 cm in diameter for two-row-pile construction, and 150 cm in diameter for three-row-pile construction. Pile length is 31.30 m for two-row-pile construction and 31.40 m for three-row-pile construction. The distance between two-row-pile and three-row-pile construction is 60 m. With these bored piles, the landslide was divided into three parts. In this way, the earth's pressure was reduced. After a number of inclinometer readings, it was seen that deformation continued during the work, but after the work was done, the movement reversed, and total deformation stayed in mm dimension. It can be said that the protection work eliminated the possible landslide.

Keywords: landslide, landslide protection, inclinometer measurement, bored piles

Procedia PDF Downloads 115
27219 Measure of Pleasure of Drug Users

Authors: Vano Tsertsvadze, Marina Chavchanidze, Lali Khurtsia

Abstract:

Problem of drug use is often seen as a combination of psychological and social problems, but this problem can be considered as economically rational decision in the process of buying pleasure (looking after children, reading, harvesting fruits in the fall, sex, eating, etc.). Before the adoption of the decisions people face to a trade-off - when someone chooses a delicious meal, she takes a completely rational decision, that the pleasure of eating has a lot more value than the pleasure which she will experience after two months diet on the summer beach showing off her beautiful body. This argument is also true for alcohol, drugs and cigarettes. Smoking has a negative effect on health, but smokers are not afraid of the threat of a lung cancer after 40 years, more valuable moment is a pleasure from smoking. Our hypothesis - unsatisfied pleasure and frustration, probably determines the risk of dependence on drug abuse. The purpose of research: 1- to determine the relative measure unit of pleasure, which will be used to measure and assess the intensity of various human pleasures. 2- to compare the intensity of the pleasure from different kinds of activity, with pleasures received from drug use. 3- Based on the analysis of data, to identify factors affecting the rational decision making. Research method: Respondents will be asked to recall the greatest pleasure of their life, which will be used as a measure of the other pleasures. The study will use focus groups and structured interviews.

Keywords: drug, drug-user, measurement, satisfaction

Procedia PDF Downloads 299
27218 Illegal Migration and Refugee Crisis as a Threat to National Security, Economic and Social System: The Bulgarian Case

Authors: Jordan Deliversky

Abstract:

Unlike all conventional forms of migration, migration crisis and migratory processes provide pressure to governments and are being expressed as different phenomenon in relation to nature and forms. The objective of this paper is to present the migration and refugee crisis as revealing numerous challenges faced by authorities responsible for the social and economic stability in Bulgaria as well as those providing conditions for reinforcement of the high level of national security in Bulgaria. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, in the light of the measures provided by the Bulgarian state authorities. The main results show that the society itself is facing the challenge of integrating refugees and migrants, so to be able to comply with the principles and values associated with tolerance to social, religious and cultural differences, and not allowing migrants to become marginalized community. Migration pressure creates a number of risks and threats to the Bulgarian national security. Our country has the capacity and resources to meet these potential threats, as a main factor for minimizing the risks to national security is the improvement of coordination and coherence of actions between various actors serving to the security sector.

Keywords: legislation, migrants, refugees, security, terrorism

Procedia PDF Downloads 318
27217 Chilled Books: Managing Defamatory Content in Non-fiction Trade Publishing

Authors: Katherine Day

Abstract:

Non-fiction genres (autobiographies and biographies, true stories and criticism, investigative journalism and narrative journalism) have enjoyed increasing sales in the English-language publishing territories over the last decade, but writing the tell-all or exposé is not without consequences: defamation laws cast a “chilling effect” by regarding reputation above publications with a public interest element. This is evident in the many publications that have been amended or pulped after publication. These communications, alterations and negotiations indicate that the threat of legal action forms part of the editorial decision-making around such publications, the presence of which could be attributed to strict defamation laws. In the UK and Australia, particularly, defamation law has proved notoriously biased in favour of plaintiffs. The legal obstacles have prompted law reform by way of section 4 of the UK Defamation Act, which allows for editorial assessment into whether the statement/s made are in the public interest; as of July 1st 2021, the NSW Government in Australia also implemented reforms to help steer the law towards more flexibility in the digital age – the most interesting of these developments for commercial publishing being the new ‘public interest’ defence (s 29A), which is modelled on the UK’s section 4 and which most states in Australia have now integrated into their respective state laws (Queensland, new South Wales, Victoria and South Australia, with the remaining states committing at a later date). This paper will outline and discuss the preliminary findings of a 1-year project that aims to explore how potentially litigious content is managed in unpublished non-fiction manuscripts in two countries identified as having strict defamation laws: Australia and the UK. Significantly, it expects to indicate the burden of current defamation laws on publishing practice and publishing outputs in these countries by interrogating in-house editorial processes and the likelihood of editorial management in a ‘post negotiation space’, where the activities and communication between authors and editors are reconstructed, if necessary, to correct the author/publisher power balance and affirm the business relationship. In doing so, the project asks: has the threat, explicit or implicit, of defamation action produced a significant chilling effect in trade non-fiction publishing in the UK and Australia?

Keywords: defamation, publishing, socio-legal, authorship, editing, literature

Procedia PDF Downloads 34