Search results for: victim of terror
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 283

Search results for: victim of terror

163 The Construction Women Self in Law: A Case of Medico-Legal Jurisprudence Textbooks in Rape Cases

Authors: Rahul Ranjan

Abstract:

Using gender as a category to cull out historical analysis, feminist scholars have produced plethora of literature on the sexual symbolics and carnal practices of modern European empires. At a symbolic level, the penetration and conquest of faraway lands was charged with sexual significance and intrigue. The white male’s domination and possession of dark and fertile lands in Africa, Asia and the Americas offered, in Anne McClintock’s words, ‘a fantastic magic lantern of the mind onto which Europe projected its forbidden sexual desires and fears’. The politics of rape were also symbolically a question significant to the politics of empire. To the colonized subject, rape was a fearsome factor, a language that spoke of violent and voracious nature of imperial exploitation. The colonized often looked at rape as an act which colonizers used as tool of oppression. The rape as act of violence got encoded into the legal structure under the helm of Lord Macaulay in the so called ‘Age of Reform’ in 1860 under IPC (Indian penal code). Initially Lord Macaulay formed Indian Law Commission in 1837 in which he drafted a bill and defined the ‘crime of rape as sexual intercourse by a man to a woman against her will and without her consent , except in cases involving girls under nine years of age where consent was immaterial’. The modern English law of rape formulated under the colonial era introduced twofold issues to the forefront. On the one hand it deployed ‘technical experts’ who wrote textbooks of medical jurisprudence that were used as credential citation to make case more ‘objective’, while on the other hand the presumptions about barbaric subjects, the colonized women’s body that was docile which is prone to adultery reflected in cases. The untrustworthiness of native witness also remained an imperative for British jurists to put extra emphasis making ‘objective’ and ‘presumptuous’. This sort of formulation put women down on the pedestrian of justice because it disadvantaged her doubly through British legality and their thinking about the rape. The Imperial morality that acted as vanguards of women’s chastity coincided language of science propagated in the post-enlightenment which not only annulled non-conformist ideas but also made itself a hegemonic language, was often used as a tool and language in encoding of law. The medico-legal understanding of rape in the colonial India has its clear imprints in the post-colonial legality. The onus on the part of rape’s victim was dictated for the longest time and still continues does by widely referred idea that ‘there should signs, marks of resistance on the body of the victim’ otherwise it is likely to be considered consensual. Having said so, this paper looks at the textual continuity that had prolonged the colonial construct of women’s body and the self.

Keywords: body, politics, textual construct, phallocentric

Procedia PDF Downloads 347
162 Bystanders' Behavior during Emergencies

Authors: Alan (Avi) Kirschenbaum, Carmit Rapaport

Abstract:

The behavior of bystanders in emergencies and disasters have been examined for over 50 years. Such acts have been cited as contributing to saving lives in terms of providing first responder help until official emergency units can arrive. Several reasons have been suggested for this type of behavior but most focused on a broad segment of individual psychological decision-making processes. Recent theoretical evidence suggests that the external factors for such bystander decisions, mainly disaster community based social contexts factors, are also important. We aim to test these competing arguments. Specifically, we examine alternative explanatory perspectives by focusing on self-efficacy as a proxy for the accepted individual psychological case and contrast it with potential bystander characteristics of the individual as well factors as embedded in the social context of the disaster community. To do so, we will utilize a random sampling of the population from a field study of an urban community in Israel that experienced five years of continuous terror attacks. The results strongly suggest that self-efficacy, as well as external factors: preparedness and having skills for intervention during emergencies along with gender best, predict potential helping behaviors. These results broaden our view of bystander behavior and open a window for enhancing this phenomenon as another element in disaster and crisis management.

Keywords: bystander behavior, disasters emergencies, psychological motivation to help, social context for helping

Procedia PDF Downloads 98
161 Artificial Intelligence and Police

Authors: Mehrnoosh Abouzari

Abstract:

Artificial intelligence has covered all areas of human life and has helped or replaced many jobs. One of the areas of application of artificial intelligence in the police is to detect crime, identify the accused or victim and prove the crime. It will play an effective role in implementing preventive justice and creating security in the community, and improving judicial decisions. This will help improve the performance of the police, increase the accuracy of criminal investigations, and play an effective role in preventing crime and high-risk behaviors in society. This article presents and analyzes the capabilities and capacities of artificial intelligence in police and similar examples used worldwide to prove the necessity of using artificial intelligence in the police. The main topics discussed include the performance of artificial intelligence in crime detection and prediction, the risk capacity of criminals and the ability to apply arbitray institutions, and the introduction of artificial intelligence programs implemented worldwide in the field of criminal investigation for police.

Keywords: police, artificial intelligence, forecasting, prevention, software

Procedia PDF Downloads 173
160 On the Path of Radicalization: Policing of Muslim Americans Post 9/11

Authors: Hagar Elsayed

Abstract:

This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.

Keywords: American-Muslims, Arabs, militarization, policing

Procedia PDF Downloads 103
159 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 330
158 Time-Domain Analysis of Pulse Parameters Effects on Crosstalk in High-Speed Circuits

Authors: Loubna Tani, Nabih Elouzzani

Abstract:

Crosstalk among interconnects and printed-circuit board (PCB) traces is a major limiting factor of signal quality in high-speed digital and communication equipments especially when fast data buses are involved. Such a bus is considered as a planar multiconductor transmission line. This paper will demonstrate how the finite difference time domain (FDTD) method provides an exact solution of the transmission-line equations to analyze the near end and the far end crosstalk. In addition, this study makes it possible to analyze the rise time effect on the near and far end voltages of the victim conductor. The paper also discusses a statistical analysis, based upon a set of several simulations. Such analysis leads to a better understanding of the phenomenon and yields useful information.

Keywords: multiconductor transmission line, crosstalk, finite difference time domain (FDTD), printed-circuit board (PCB), rise time, statistical analysis

Procedia PDF Downloads 402
157 A Rare Neck Trauma by Bicycle Handlebar in Road Traffic Accident

Authors: Parthasarathi Pramanik

Abstract:

Paediatric blunt abdominal trauma associated with superficial bruise, hematoma, or laceration and internal organ damage secondary to bicycle handlebar is widely documented in the literature. In this article, we have presented a case of bicycle handlebar inflicted fatal neck laceration in a road accident. The deceased sustained a horizontally placed laceration injury over the front and both sides of the middle third of neck (13 cm x 5-8 cm x 2-3.5 cm).The margins of the wound were irregular and focally abraded. The right corner of the injury was pointed whereas the left one was ended with a skin flap. Multiple graze abrasions, contusions and lacerations were found on different parts of body. Autopsy findings and other circumstantial evidences revealed that the victim died due to exsanguination because of severance of carotid artery and jugular vein of both sides. Analysis of the wound suggests the decease sustained the wound by the revolving bicycle handle bar while he had lost the balance.

Keywords: bicycle handle bar, neck injury, lacerated injury, road acident

Procedia PDF Downloads 286
156 Perpetrators of Ableist Sexual Violence: Understanding Who They Are and Why They Target People with Intellectual Disabilities in Australia

Authors: Michael Rahme

Abstract:

Over the past decade, there is an overwhelming consensus spanning across academia, government commissions, and civil societies that concede that individuals with disabilities (IWDs), particularly those with intellectual differences, are a demographic most ‘vulnerable’ to experiences of sexual violence. From this global accord, numerous policies have sprouted in the protection of this ‘pregnable’ sector of society, primarily framed around liberal obligations of stewardship over the ‘defenceless.’ As such, these initiatives mainly target post-incident or victim-based factors of sexual violence, which is apparent in proposals for more inclusive sexual education and accessible contact lines for IWDs. Yet despite the necessity of these initiatives, sexual incidents among this demographic persist and, in nations such as Australia, continue to rise. Culture of Violence theory reveals that such discrepancies in theory and practice stem from societal structures that frame individuals as ‘vulnerable’, ‘impregnable’, or ‘defenceless’ because of their disability, thus propagating their own likelihood of abuse. These structures, as embodied by the Australian experience, allow these sexual violences to endure through cultural ideologies that place the IWDs ‘failures’ at fault while sidelining the institutions that permit this abuse. Such is representative of the initiatives of preventative organizations like People with Disabilities Australia, which have singularly strengthened victim protection networks, despite abuse continuing to rise dramatically among individuals with intellectual disabilities alone. Yet regardless of this rise, screenings of families and workers remain inadequate and practically untouched, a reflection of a tremendous societal warp in understanding surrounding the lived experiences of IWDs. This theory is also representative of broader literature, where the study of the perpetrators of disability rights, particularly sexual rights, is almost unapparent in a field that is already seldom studied. Therefore, placing power on the abuser via stripping that of the victims. As such, the Culture of Violence theory (CVT) sheds light on the institutions that allow these perpetrators to prosper. This paper, taking a CVT approach, aims to dissipate this discrepancy in the Australian experience by way of a qualitative analysis of all available court proceedings and tribunals between 2020-2022. Through an analysis of the perpetrator, their relation to the IWD, and the motives for their actions granted by court and tribunal transcripts and the psychological, and behavioural reports, among other material, that have been presented and consulted during these proceedings. All of which would be made available under the 1982 Freedom of Information Act. The findings from this study, through the incorporation of CVT, determine the institutions in which these abusers function and the ideologies which motivate such behaviour; while being conscious of the issue of re-traumatization and language barriers of the abusees. Henceforth, this study aims to be a potential policy guide on strengthening support institutions that provide IWDs with their basic rights. In turn, undermining sexual violence among individuals with intellectual disabilities at its roots.

Keywords: criminal profiling, intellectual disabilities, prevention, sexual violence

Procedia PDF Downloads 63
155 Conflating Voluntary Sex Work and Trafficked Sex Work in Malaysia

Authors: Haezreena Begum Abdul Hamid

Abstract:

This article will explore the conflation between voluntary sex work and trafficked sex work. In doing so, the article will analyse the meaning of trafficking according to the United Nations ‘Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children’ and the Malaysian Anti-Trafficking in Persons and Anti-Migrant Smuggling Act, 2007 (ATIP), and discuss the ambiguities that may arise in understanding the term. While the law on human trafficking has long been understood by scholars, key stakeholders, and enforcement officers, identifying a victim of trafficking is far from being straight forward. This is because of the diverse understanding on sex trafficking and sex work, and the fact that ‘consent’ by trafficked persons remains irrelevant in cases of trafficking. As a result, women who voluntarily engage in sex work are sometimes categorised as ‘trafficked’ and are ‘rescued’ by the authorities in the name of ‘protection’, while those who insist of having agency can be charged for violating the immigration laws. In light of such circumstances, this article aims to explore the conflation between voluntary sex work and trafficked sex work and how such conflation have succeeded in fostering distrust between sex workers and authorities.

Keywords: voluntary sex work, trafficked sex work, sex work, coercion, protection

Procedia PDF Downloads 210
154 Interpretation and Clustering Framework for Analyzing ECG Survey Data

Authors: Irum Matloob, Shoab Ahmad Khan, Fahim Arif

Abstract:

As Indo-Pak has been the victim of heart diseases since many decades. Many surveys showed that percentage of cardiac patients is increasing in Pakistan day by day, and special attention is needed to pay on this issue. The framework is proposed for performing detailed analysis of ECG survey data which is conducted for measuring prevalence of heart diseases statistics in Pakistan. The ECG survey data is evaluated or filtered by using automated Minnesota codes and only those ECGs are used for further analysis which is fulfilling the standardized conditions mentioned in the Minnesota codes. Then feature selection is performed by applying proposed algorithm based on discernibility matrix, for selecting relevant features from the database. Clustering is performed for exposing natural clusters from the ECG survey data by applying spectral clustering algorithm using fuzzy c means algorithm. The hidden patterns and interesting relationships which have been exposed after this analysis are useful for further detailed analysis and for many other multiple purposes.

Keywords: arrhythmias, centroids, ECG, clustering, discernibility matrix

Procedia PDF Downloads 441
153 Analysis of ECGs Survey Data by Applying Clustering Algorithm

Authors: Irum Matloob, Shoab Ahmad Khan, Fahim Arif

Abstract:

As Indo-pak has been the victim of heart diseases since many decades. Many surveys showed that percentage of cardiac patients is increasing in Pakistan day by day, and special attention is needed to pay on this issue. The framework is proposed for performing detailed analysis of ECG survey data which is conducted for measuring the prevalence of heart diseases statistics in Pakistan. The ECG survey data is evaluated or filtered by using automated Minnesota codes and only those ECGs are used for further analysis which is fulfilling the standardized conditions mentioned in the Minnesota codes. Then feature selection is performed by applying proposed algorithm based on discernibility matrix, for selecting relevant features from the database. Clustering is performed for exposing natural clusters from the ECG survey data by applying spectral clustering algorithm using fuzzy c means algorithm. The hidden patterns and interesting relationships which have been exposed after this analysis are useful for further detailed analysis and for many other multiple purposes.

Keywords: arrhythmias, centroids, ECG, clustering, discernibility matrix

Procedia PDF Downloads 327
152 An Autopsy Case of Blunt Chest Trauma from a Traffic Accident Complicated by Chest Compression Due to Resuscitation Attempts

Authors: Satoshi Furukawa, Satomu Morita, Katsuji Nishi, Masahito Hitosugi

Abstract:

Coronary artery dissection leading to acute myocardial infarction after blunt chest trauma is extremely rare. A 67-year-old woman suffered blunt chest trauma following a traffic accident. The electrocardiogram revealed acute posterior ST-segment elevation and myocardial infarction and coronary angiography demonstrated acute right coronary artery dissection. Following the death of the victim an autopsy was performed after cardiopulmonary support had been carried out. In this case report, we describe the case of a woman with blunt chest trauma, who developed an acute myocardial infarction secondary to right coronary artery dissection. Although there was additional the blunt chest trauma due to chest compression, we confirmed the injury at autopsy and by histological findings.

Keywords: blunt chest trauma, right coronary artery dissection, coronary angiography, autopsy, histological examination

Procedia PDF Downloads 608
151 Re-Imagining and De-Constructing the Global Security Architecture

Authors: Smita Singh

Abstract:

The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.

Keywords: hegemonic discourse, global security, non-proliferation regime, power politics

Procedia PDF Downloads 292
150 ‘A Ghost of One’s Own’: Spectral Intrusions and Trauma in the Poetry of Joanna Baillie and Anne Bannerman

Authors: Elli Karampela

Abstract:

In Specters of Marx (1993), Jacques Derrida refers to the ghost as an Other presence that occupies the space of the self and emanates from there, haunting in its shadowy pastness and threatening/striving to break free. In times of change, ghosts both reflect the dissolution of set principles and voice traumas of the past that create a sense of fear and instability. This paper observes the way female ghosts create connections with the living in the poetry of Joanna Baillie and Anne Bannerman, both integral, albeit under-researched in different ways, writers of the English Romantic period working in the aftermath of the French Revolution. Especially at the beginning of the nineteenth century, when ghost narratives were devoured by readers and enjoyed as stories that re-awakened sensation in times of revolution, there was at the same time fear of intrusion by terror’s unruly forces that threatened to turn the readers restless. The ghost was particularly dangerous because it was associated with memory and the intrusion of past trauma in the here and now. As will be seen, both Baillie and Bannerman explore the idea of the female ghost’s ‘return’ (a Freudian term that will be approached) which breaks both time and space boundaries to raise the suppressed female voice, threaten stability, and correct wrongs. As a result, the varied manifestations of female ghosts render Baillie and Bannerman active in the contemporary discourse about human rights and the reclamation of the agency.

Keywords: poetry, romanticism, spectrality, trauma, women

Procedia PDF Downloads 178
149 Public-Private Partnership for Better Protection of Trafficked Victims in Thailand: Case Study on Public Protection and Welfare Center in Cooperation with Jim Thompson Foundation in Occupational Development on Silk Sewing and Tailoring

Authors: Aungkana Kmonpetch

Abstract:

Protection of trafficked victims and partnership among stakeholders are established as core principles in 5P’ strategies in international and national anti-human trafficking policies. In this article, it is of interest to discuss how the role of public-private partnerships in promoting the occupation development for employment in wage will enhance the better protection for victims of trafficking who affirmatively decide they want a criminal justice intervention, using Thailand as a case. Most of the victims who have accepted to be witness in the criminal justice system have lost income during their absence from work. The analysis of Thailand case is based on two methodological approaches: 1) interview with victims of trafficking, protection authorities, service providers, trainers and teachers, social workers, NGOs, police, prosecutors, business owners and enterprises, ILO, UNDP etc.; 2) create collaborative effort through workshops/consultation meetings in participation of all stakeholders – governmental agencies, private organizations, UN and international agencies. The linking of protection and partnership is anchored in international conventions and human trafficking directives. While this is actually framed as a responsive advantage for 5P strategies of anti-human trafficking – prevention, protection, persecution, punishment, and partnership, in reality, there might have more practical requirements of care and support. The article addresses how the partnership between governmental agencies and private organizations provide opportunities for trafficked victims to engage in high-skilled occupational development such as Silk-Sewing and Tailoring. The discussion is also focused how this approach of capacity building of the trainer for trainee, be enable the trafficked victims to cultivate the practices of high-skilled training to engage them into the business of social enterprise with employment in wage. The partnership coordination draws specifically to two aspects: firstly, to formulate appropriate assistance for promotion and protection of human rights of the trafficked victims in response to the 5P’ strategies of anti-human trafficking policy; secondly, to empower them to settle some economic stability for livelihood opportunity in the country of origin on their return and reintegration. Therefore, they can define how they want to move forward to prevent them at risk of vulnerable situations where they might being trafficked again or going on to work in exploitative conditions. It strengthens proper access to protection and assistance, depending on how the incentive of protection for cooperation is perceived to be and how useful the capacity building in occupation development for employment in wage will be implemented practically both in the host country and in the country of origin. This also brings into question how the victim of trafficking are able to access to the trade of market and are supported the employment opportunity according to the concept of decent work as they are constituted as witnesses. We discuss these issues in the area of a broader literature on social protection, economic security, gender, law, and victimhood.

Keywords: employment opportunity, occupation development, protection for victim of trafficking, public-private partnership

Procedia PDF Downloads 200
148 A Qualitative Investigation on the Effect of COVID-19 on the Views Concerning Marriage and Divorce

Authors: Leman Korkmaz, Bahar Bahtiyar-Saygan

Abstract:

Objective: The COVID-19 pandemic has been affecting the whole world since the beginning of 2020. In addition to health-related and financial effects, there seem to be significant psychological effects as well, among them those related to people’s views and representations of marriage and divorce. Background: Although various impacts of COVID-19 have been investigated since the beginning of the pandemic, there is a limited number of studies on its effects concerning relationships. This research aims to understand how the COVID-19 pandemic affects the views on and representations of marriage and divorce by conducting two studies. Method: In the first study, one-to-one semi-structured interviews were conducted with 31 participants (20 single and 11 married individuals) to investigate their evaluations regarding the effect of COVID-19 on people’s views of marriage in general and their own views of marriage in particular. In the second study, 298 entries on the most frequently used online social platform in Turkey (EkşiSözlük) under two separate headings for COVID-19 impact on marriage and divorce were analyzed, and meaningful thematic units were formed. Results: The findings of the thematic analysis indicated that participants mostly mentioned both the positive and negative effects of COVID-19 on the views and representations of marriage. There were both common (e.g., loneliness, violence, etc.) and distinct (e.g., sexuality, positive and negative effects on attitudes towards marriage, etc.) thematic units between the results of the two studies. Implications: There are considerable implications discussed in light of the literature on Terror Management Theory, Attachment Theory, stress research, and growth perspective.

Keywords: COVID-19 pandemic, divorce, marriage, relationships, representations, views

Procedia PDF Downloads 44
147 A Semantical Investigation on Physician Assisted Suicide in Canada between 1993 and 2015

Authors: Gabrielle Pilliat

Abstract:

The Supreme Court of Canada rendered unconstitutional the sections of the Canadian Criminal Code which prohibited the Physician-assisted suicide in February 2015. However, in 1993, the same Supreme Court of Canada ruled that Physician-assisted suicide should remain absolutely prohibited. In the light of these historical facts, we will explore how the Supreme Court of Canada was able to make two different decisions 20 years apart. To understand how Canada could rule so differently between 1993 and 2015 about Physician-assisted suicide, we will analyze the content of the Supreme Court of Canada decisions’ discourse of 1993 and of 2015. Our preliminary results indicate that A) the patient autonomy (or the personal choice) has taken over the idea of the preservation of life (or the sacred character of life) in 2015. B) That between 1993 and 2015, the physician is seen differently by the Judges; like an abusive murderer in 1993 and like an objective evaluator in 2015. C) That the patient is seen as a victim in 1993 and more like a hero in 2015.

Keywords: physician-assisted suicide, patient autonomy, choice, sacred character of life, dignity

Procedia PDF Downloads 246
146 Stability Analysis of Rock Tunnel Subjected to Internal Blast Loading

Authors: Mohammad Zaid, Md. Rehan Sadique

Abstract:

Underground structures are an integral part of urban infrastructures. Tunnels are being used for the transportation of humans and goods from distance to distance. Terrorist attacks on underground structures such as tunnels have resulted in the improvement of design methodologies of tunnels. The design of underground tunnels must include anti-terror design parameters. The study has been carried out to analyse the rock tunnel when subjected to internal blast loading. The finite element analysis has been carried out for 30m by 30m of the cross-section of the tunnel and 35m length of extrusion of the rock tunnel model. The effect of tunnel diameter and overburden depth of tunnel has been studied under internal blast loading. Four different diameters of tunnel considered are 5m, 6m, 7m, and 8m, and four different overburden depth of tunnel considered are 5m, 7.5m, 10m, and 12.5m. The mohr-coulomb constitutive material model has been considered for the Quartzite rock. A concrete damage plasticity model has been adopted for concrete tunnel lining. For the trinitrotoluene (TNT) Jones-Wilkens-Lee (JWL) material model has been considered. Coupled-Eulerian-Lagrangian (CEL) approach for blast analysis has been considered in the present study. The present study concludes that a shallow tunnel having smaller diameter needs more attention in comparison to blast resistant design of deep tunnel having a larger diameter. Further, in the case of shallow tunnels, more bulging has been observed, and a more substantial zone of rock has been affected by internal blast loading.

Keywords: finite element method, blast, rock, tunnel, CEL, JWL

Procedia PDF Downloads 117
145 Female Dis-Empowerment in Contemporary Zimbabwe: A Re-Look at Shona Writers’ Vision of the Factors and Solutions

Authors: Godwin Makaudze

Abstract:

The majority of women in contemporary Zimbabwe continue to hold marginalised and insignificant positions in society and to be accorded negative and stereotyped images in literature. In light of this, government and civic organisations and even writers channel many resources, time, and efforts towards the emancipation of the female gender. Using the Africana womanist and socio-historical literary theories and focussing on two post-colonial novels, this paper re-engages the dis-empowerment of women in contemporary Zimbabwe, examining the believed causes and suggested solutions. The paper observes that the writers whip the already whipped by blaming patriarchy, African men and cultural practices as the underlying causes of such a sorry state of affairs while at the same time celebrating war against all these, as well as education, unity among women, Christianity and single motherhood as panaceas to the problem. The paper concludes that the writers’ anger is misdirected as they have fallen trap to the very popular yet mythical victim-blame motif espoused by many writers who focus on Shona people’s problems.

Keywords: cultural practices, female dis-empowerment, patriarchy, Shona novel, solutions, Zimbabwe

Procedia PDF Downloads 304
144 Discrimination against Women in Workplace: A Case Study on Hotel Dress Code

Authors: A. R. Anwar

Abstract:

The development of discrimination case which is now extended to the issue of female workers dress code in the hotel industry seen as a challenging topic and a solution is needed. Discrimination generally gives a negative impact on the victim and has a direct impact on female workers if it involves the issue of this dress code. Hence it is not appropriate if these genders are subjected to discrimination that prohibits them from wearing a hijab and required to wear a short skirt during working hours. On this basis, this study discusses the major problems pertaining to dress code faced by female workers in the Malaysian hotel industry. An interview with qualified parties from human resource department in each selected hotels has been conducted in which later generated the findings and supported by materials that obtained from libraries, archives and other databases. Through the research findings, several recommendations were introduced to reduce and eliminate the discrimination issue in Malaysian working sector particularly in the hotel industry in order to achieve the equality among men and women in the workplace.

Keywords: discrimination, dress code in the hotel, impact on female workers, equality

Procedia PDF Downloads 166
143 An Immersive Serious Game for Firefighting and Evacuation Training in Healthcare Facilities

Authors: Anass Rahouti, Guillaume Salze, Ruggiero Lovreglio, Sélim Datoussaïd

Abstract:

In healthcare facilities, training the staff for firefighting and evacuation in real buildings is very challenging due to the presence of a vulnerable population in such an environment. In a standard environment, traditional approaches, such as fire drills, are often used to train the occupants and provide them with information about fire safety procedures. However, those traditional approaches may be inappropriate for a vulnerable population and can be inefficient from an educational viewpoint as it is impossible to expose the occupants to scenarios similar to a real emergency. Immersive serious games could be used as an alternative to traditional approaches to overcome their limitations. Serious games are already being used in different safety domains such as fires, earthquakes and terror attacks for several building types (e.g., office buildings, train stations, tunnels, etc.). In this study, we developed an immersive serious game to improve the fire safety skills of staff in healthcare facilities. An accurate representation of the healthcare environment was built in Unity3D by including visual and audio stimuli inspired from those employed in commercial action games. The serious game is organised in three levels. In each of them, the trainee is presented with a specific fire emergency and s/he can perform protective actions (e.g., firefighting, helping non-ambulant occupants, etc.) or s/he can ignore the opportunity for action and continue the evacuation. In this paper, we describe all the steps required to develop such a prototype, as well as the key questions that need to be answered, to develop a serious game for firefighting and evacuation in healthcare facilities.

Keywords: fire safety, healthcare, serious game, training

Procedia PDF Downloads 425
142 The Influence on Sexual Minorities of School-Related Gender-Based Violence and Strategies to Respond

Authors: KangQi Jin

Abstract:

School-Related Gender-Based Violence (SRGBV) seriously impacts the victim's physical and mental health and academic and employment prospects. Due to the lack of protective policies for sexual minority students in mainland China at present, the well-being of those students in China is seriously endangered by SRGBV, and their physical and mental health is at great risk. By analyzing the current situation of stigmatization of sexual minority students and the harm brought to them by gender violence, this study proposes some strategies to reduce SRGBV on sexual minorities. First, the nation should set laws to protect the rights and interests of sexual minorities, and second, universities should make multifaceted efforts to reduce these violent phenomena. The violence experienced by students of sexual minorities has a crucial impact on their future physiology and psychology, and through the research, in this paper, the author hope can provide suggestions for scholars who try to study related fields in the future.

Keywords: sexual minority, school-related gender-based violence, response, strategies

Procedia PDF Downloads 78
141 Demonic Possession and Health Care Complications: Concept and Remedy from Islamic Point-of-View

Authors: Khalid Ishola Bello

Abstract:

Many religions and cultures believe in the existence of invisible beings who co-exist with man on earth. Muslims, for example, believe in malaikah (Angel) and jinn (demon), who have their source of creation from light and flame, respectively. Jinn, according to Islamic texts, possesses unique characteristics which give them an advantage over the man. Invisibility, transforming into or taking possession of another being are parts of advantages jinn have above man. Hence, jinn can attack man and truncate his well-being by causing malfunction of his physiological and psychological realms, which may go beyond physical health care. It is on this background that this paper aims to articulate the possibility of a demonic attack on human health and the care processes recommended by Islam to heal and restore well-being of the victim. Through analysis of the inductive, deductive, and historical approaches, the process of ruqyah (healing method based on recitation of the Qur’an) and hijamah (cupping) therapies shall be analyzed. The finding shows the efficacy of Islamic remedies to demonic possession, which usually complicates health challenges in the care of man. This alternative approach is therefore recommended for holistic health care since physical health care cannot fix spiritual health challenges.

Keywords: wellbeing, healthcare, demonic possession, cupping, jinn

Procedia PDF Downloads 36
140 Mothers, the Missing Link: A Critical Discourse Analysis of the Women-Centric Counterterrorism Measures

Authors: Bukola Solomon

Abstract:

In counterterrorism, policymakers typically design a confined role for women as family members and nurturers. In recent years, they have embraced the idea of mothers as the missing link to preventing and countering violent extremism. This ‘programmed’ role of women is derived from the convictions that women’s central roles in the family and community afford them the ‘unique set of skills’ to detect early signs of radicalization and extremism. This paper attempts to focus on the ‘mother’ narrative that frames women’s agency as mothers of ‘terrorists’ and ‘potential’ terrorists. The general underlying assumption of the ‘mother’ narrative is that naturally, every ‘terrorist’ has or once had a mother, and their radicalization is a maternal ‘oversight.’ By deconstructing the notion of motherhood as a social construct instead of an inherent female desire and ability, this paper argues that the assumption of ‘mothers know best’ is invalid. Also, this paper suggests that the ‘mother’ narrative is a deliberate effort to restrict women’s participation in counterterrorism as ‘preventers.’ Finally, this paper notes a global trend in which mothers are contesting the dominant view of women empowerment that restricts their agency by seeking alternative versions in terrorist organizations. And as such, they create parallel terror cells. Thus, the overemphasis on the role women plays as mothers in counterterrorism limits the scope and potential of counterterrorism programs by marginalizing gender issues and reinforcing gender disparities to the extent that the programs become counterproductive.

Keywords: countering violent extremism, counterterrorism, gender, gender roles, terrorism, women

Procedia PDF Downloads 94
139 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings

Authors: Vanda Božić, Željko Nikač

Abstract:

Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.

Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights

Procedia PDF Downloads 333
138 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 257
137 Haptic Robotic Glove for Tele-Exploration of Explosive Devices

Authors: Gizem Derya Demir, Ilayda Yankilic, Daglar Karamuftuoglu, Dante Dorantes

Abstract:

ABSTRACT HAPTIC ROBOTIC GLOVE FOR TELE-EXPLORATION OF EXPLOSIVE DEVICES Gizem Derya Demir, İlayda Yankılıç, Dağlar Karamüftüoğlu, Dante J. Dorantes-González Department of Mechanical Engineering, MEF University Ayazağa Cad. No.4, 34396 Maslak, Sarıyer, İstanbul, Turkey Nowadays, terror attacks are, unfortunately, a more common threat around the world. Therefore, safety measures have become much more essential. An alternative to providing safety and saving human lives is done by robots, such as disassembling and liquidation of bombs. In this article, remote exploration and manipulation of potential explosive devices from a safe-distance are addressed by designing a novel, simple and ergonomic haptic robotic glove. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the haptic robotic glove and finger design. Angle controls of servo motors were made using ARDUINO® IDE codes on a Makeblock® MegaPi control card. Simple grasping dexterity solutions for the fingers were obtained using one linear soft and one angle sensors for each finger, and six servo motors are used in total to remotely control a slave multi-tooled robotic hand. This project is still undergoing and presents current results. Future research steps are also presented.

Keywords: Dexterity, Exoskeleton, Haptics , Position Control, Robotic Hand , Teleoperation

Procedia PDF Downloads 141
136 Where Is the Sultan of Aceh? Reconsidering the Return of the Aceh Sultanate

Authors: Muhammad Harya Ramdhoni, Nidzam Sulaiman, Muhammad Ridwan

Abstract:

The Helsinki Agreement between the Indonesian Government (RI) and the Aceh Liberation Movement (GAM) on 15th Aug. 2005 fails to reconcile social and political turmoil in Aceh Darussalam (NAD). The political powers that were once unified in their struggle against Indonesian Government prior to this agreement have now become divided due to differences in political and economic interests. Using descriptive analysis and intellectual discourse, this paper proposes that the Aceh Sultanate be revived as an attempt to unite these divided political powers and to curtail potential conflicts in the area. This proposal is based on three assumptions. First, the Aceh Sultanate is the only Sultanate in Sumatera that did not fall victim to the social revolution post 1945 proclamation of independence. Second, the Acehnese still acknowledge the Sultanate as a sovereign political power even though it was defeated by the Dutch in 1904. Third, there are emotional, historical and cultural ties between the Acehnese and the Sultanate as they still perceived them to be their patron. Consequently, the Sultanate is the unifying element of all political powers in the area. This, however, is not an attempt to reinstate feudalism in Aceh. It only seeks to facilitate the political reconciliation process in Aceh Darussalam founded on sociological and historical background of locals.

Keywords: Sultanate Aceh, political reconciliation, political power, patron-client

Procedia PDF Downloads 236
135 Sudden Death of a Cocaine Body Packer: An Autopsy Examination Findings

Authors: Parthasarathi Pramanik

Abstract:

Body packing is a way of transfer drugs across the international border or any drug prohibited area. The drugs are usually hidden in body packets inside the anatomical body cavities like mouth, intestines, rectum, ear, vagina etc. Cocaine is a very common drug for body packing across the world. A 48 year old male was reported dead in his hotel after complaining of chest pain and vomiting. At autopsy, there were eighty-two white cylindrical body packs in the stomach, small and large intestines. Seals of few of the packets were opened. Toxicological examination revealed presence of cocaine in the stomach, liver, kidney and hair samples. Microscopically, presence of myocardial necrosis with interstitial oedema along with hypertrophy and fibrosis of the myocardial fibre suggested heart failure due to cocaine cardio toxicity. However, focal lymphocyte infiltration and perivascular fibrosis in the myocardium also indicated chronic cocaine toxicity of the deceased. After careful autopsy examination it was considered the victim was died due congestive heart failure secondary to acute and chronic cocaine poisoning.

Keywords: cardiac failure, cocaine, body packer, sudden death

Procedia PDF Downloads 292
134 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 326