CINXE.COM
Search results for: Innocent Mpawenimana
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Innocent Mpawenimana</title> <meta name="description" content="Search results for: Innocent Mpawenimana"> <meta name="keywords" content="Innocent Mpawenimana"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Innocent Mpawenimana" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Innocent Mpawenimana"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 66</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Innocent Mpawenimana</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">66</span> Energy Management System and Interactive Functions of Smart Plug for Smart Home</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Win%20Thandar%20Soe">Win Thandar Soe</a>, <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Mpawenimana"> Innocent Mpawenimana</a>, <a href="https://publications.waset.org/abstracts/search?q=Mathieu%20Di%20Fazio"> Mathieu Di Fazio</a>, <a href="https://publications.waset.org/abstracts/search?q=C%C3%A9cile%20Belleudy"> Cécile Belleudy</a>, <a href="https://publications.waset.org/abstracts/search?q=Aung%20Ze%20Ya"> Aung Ze Ya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Intelligent electronic equipment and automation network is the brain of high-tech energy management systems in critical role of smart homes dominance. Smart home is a technology integration for greater comfort, autonomy, reduced cost, and energy saving as well. These services can be provided to home owners for managing their home appliances locally or remotely and consequently allow them to automate intelligently and responsibly their consumption by individual or collective control systems. In this study, three smart plugs are described and one of them tested on typical household appliances. This article proposes to collect the data from the wireless technology and to extract some smart data for energy management system. This smart data is to quantify for three kinds of load: intermittent load, phantom load and continuous load. Phantom load is a waste power that is one of unnoticed power of each appliance while connected or disconnected to the main. Intermittent load and continuous load take in to consideration the power and using time of home appliances. By analysing the classification of loads, this smart data will be provided to reduce the communication of wireless sensor network for energy management system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy%20management" title="energy management">energy management</a>, <a href="https://publications.waset.org/abstracts/search?q=load%20profile" title=" load profile"> load profile</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20plug" title=" smart plug"> smart plug</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network" title=" wireless sensor network"> wireless sensor network</a> </p> <a href="https://publications.waset.org/abstracts/69157/energy-management-system-and-interactive-functions-of-smart-plug-for-smart-home" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69157.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">273</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">65</span> Innocence Compensation: Motions to Strike and Dismiss to Forestall Financial Recovery</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Myles%20Frederick%20McLellan">Myles Frederick McLellan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When errors in the criminal justice process lead to wrongful convictions and miscarriages of justice, it falls upon the State to make reparation for the egregious harms brought to innocent individuals. Of all the remedies available to seek compensation, private and public law litigation against the police and prosecution services is the most widely used. Unfortunately, all levels of court including the Supreme Court of Canada have explicitly endorsed the prospect of striking out or dismissing these claims at the outset on an expedited basis. The burden on agents of the State as defendants to succeed on motions for such relief is so low that very few actions will survive to give an innocent accused his or her day in court. This paper will be a quantitative and qualitative analysis on the occurrence and success of motions to strike and dismiss to forestall financial recovery for the damage caused when a criminal investigation and prosecution goes wrong. This paper will also include a comparative component on the private law systems at common law (e.g. USA, UK, Australia and New Zealand) with respect to the availability of a similar process to pre-emptively terminate litigation for the recovery of compensation to an innocent individual. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=compensation" title="compensation">compensation</a>, <a href="https://publications.waset.org/abstracts/search?q=innocence" title=" innocence"> innocence</a>, <a href="https://publications.waset.org/abstracts/search?q=miscarriages%20of%20justice" title=" miscarriages of justice"> miscarriages of justice</a>, <a href="https://publications.waset.org/abstracts/search?q=wrongful%20convictions" title=" wrongful convictions"> wrongful convictions</a> </p> <a href="https://publications.waset.org/abstracts/98245/innocence-compensation-motions-to-strike-and-dismiss-to-forestall-financial-recovery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98245.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">64</span> Role of Family for Grooming a Child: A Protective Step for Vulnerable Child</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arpita%20Sabat">Arpita Sabat</a>, <a href="https://publications.waset.org/abstracts/search?q=Kanaklata%20Samal"> Kanaklata Samal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A child is the most innocent being on the earth. It is born innocent but the family, the community, the institution and the world at large always butcher its innocence. This paper aims at the role of family for the development of a child in different ethnic or social groups. Family, in fact, is the nucleus in the growth and development of the child. A child grows up with the idea that a family is the world around him. The child tries to emulate consciously or unconsciously from the surrounding. This imitation has serious impact on the development of the child. It even sometimes cripples or stunts the growth of a mind. It results in the disability of the child. All policies about education or changing of curriculum can not bring about a change in the plight of a child’s life unless there is a serious thinking about the role of a family and the contribution of a family to the development of a child. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vulnerable%20child" title="vulnerable child">vulnerable child</a>, <a href="https://publications.waset.org/abstracts/search?q=grooming" title=" grooming"> grooming</a>, <a href="https://publications.waset.org/abstracts/search?q=surrounding" title=" surrounding"> surrounding</a>, <a href="https://publications.waset.org/abstracts/search?q=role%20of%20family" title=" role of family"> role of family</a> </p> <a href="https://publications.waset.org/abstracts/12033/role-of-family-for-grooming-a-child-a-protective-step-for-vulnerable-child" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12033.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">327</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">63</span> Capital Punishment: A Paradoxical Wrinkle to the Principles of Ethics and Morality</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pranav%20Vaidya">Pranav Vaidya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The recent upheaval of a ballot initiative taken place in California & Los Angeles‘s newspapers shows how the concept of giving Death Penalty obliterates the very soul basis of community and society which rests upon the tripod of values, ethics, and morality. This paper goes on with examining how, by giving death penalties we are, on one hand trying to wipe out those heinous offenders committing such unspeakable crimes against the public; while on the other hand it comes with a devastating effect of corroding and eluding the existence of ethics and morality which is in the very nature of “protecting the life of humankind”. As it can be stated that, by giving capital punishment, we are trying to legitimize an irreversible act of violence by the authority of state and target innocent victims because as long as the human justice is fallible, the risk of executing an innocent can never be eliminated. However, scholars in the legalization of Capital Punishment have argued that the courts should impose punishment befitting the crime so that they could reflect public abhorrence of the crime, create deterrent or rehabilitating effects & deliver the truest form of justice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ethics" title="ethics">ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=heinous%20offenders" title=" heinous offenders"> heinous offenders</a>, <a href="https://publications.waset.org/abstracts/search?q=morality" title=" morality"> morality</a>, <a href="https://publications.waset.org/abstracts/search?q=unspeakable%20crimes" title=" unspeakable crimes"> unspeakable crimes</a> </p> <a href="https://publications.waset.org/abstracts/58727/capital-punishment-a-paradoxical-wrinkle-to-the-principles-of-ethics-and-morality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58727.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">62</span> Cybercrimes in Nigeria: Its Causes, Effects and Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Uzoma%20Igboji">Uzoma Igboji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-crimes" title="cyber-crimes">cyber-crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-terrorism" title=" cyber-terrorism"> cyber-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-criminals" title=" cyber-criminals"> cyber-criminals</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/22647/cybercrimes-in-nigeria-its-causes-effects-and-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">61</span> A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Kiruthika">R. Kiruthika</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Kannan"> A. Kannan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=steganography" title="steganography">steganography</a>, <a href="https://publications.waset.org/abstracts/search?q=lsb" title=" lsb"> lsb</a>, <a href="https://publications.waset.org/abstracts/search?q=embedding" title=" embedding"> embedding</a>, <a href="https://publications.waset.org/abstracts/search?q=Douglas-Peucker%20algorithm" title=" Douglas-Peucker algorithm"> Douglas-Peucker algorithm</a> </p> <a href="https://publications.waset.org/abstracts/29673/a-novel-approach-of-secret-communication-using-douglas-peucker-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29673.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">363</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">60</span> Legislator’s Liability – Sovereign Immunity and Rule of Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Isabel%20Mousinho%20de%20Figueiredo">Isabel Mousinho de Figueiredo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Traditionally it was held that the king can do no wrong. History has proved otherwise, and both the rule of law and the open society call for a diversification of checks and balances, including civil liability in tort. Most jurisdictions are right to fear the excessive cost of such liability for the innocent taxpayer. There are notwithstanding extreme instances where refusing compensation is perceived to be outrageous. Many public bodies end up handing out on a voluntary basis, which leaves room to question its legality and merit. Instead, some criteria can shed light on the fairness of an underlying rationale of such compensation and cordon it off within reasonable limits. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comparative%20law" title="comparative law">comparative law</a>, <a href="https://publications.waset.org/abstracts/search?q=liability%20of%20legislators" title=" liability of legislators"> liability of legislators</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20bodies" title=" public bodies"> public bodies</a>, <a href="https://publications.waset.org/abstracts/search?q=tort%20law" title=" tort law"> tort law</a> </p> <a href="https://publications.waset.org/abstracts/155066/legislators-liability-sovereign-immunity-and-rule-of-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155066.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">59</span> Girl Child Education: A Veritable Tool to Gender Equality and Empowerment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Egena%20Obaje%20Innocent">Egena Obaje Innocent</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Africa generally and Nigeria in particular one the major setbacks for the girl-child is her deprivation or denial if you like to equal opportunity to education. In most Nigerian communities which are male dominated parents make no pretense of their preference of the male children when it come to the choice of who to send to school between the male and female child. Indeed, certain inhibiting cultural and religious practices are the root cause of this annually. It is against this background that this paper looked at the phenomenon the girl-child education, causes of the negligent its effects on the girl child and nation remedies and conclusion. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=education" title="education">education</a>, <a href="https://publications.waset.org/abstracts/search?q=empowerment" title=" empowerment"> empowerment</a>, <a href="https://publications.waset.org/abstracts/search?q=girl%20child" title=" girl child"> girl child</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20equality" title=" gender equality"> gender equality</a> </p> <a href="https://publications.waset.org/abstracts/32708/girl-child-education-a-veritable-tool-to-gender-equality-and-empowerment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32708.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">470</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">58</span> Hate Speech Detection Using Deep Learning and Machine Learning Models</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nabil%20Shawkat">Nabil Shawkat</a>, <a href="https://publications.waset.org/abstracts/search?q=Jamil%20Saquer"> Jamil Saquer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media has accelerated our ability to engage with others and eliminated many communication barriers. On the other hand, the widespread use of social media resulted in an increase in online hate speech. This has drastic impacts on vulnerable individuals and societies. Therefore, it is critical to detect hate speech to prevent innocent users and vulnerable communities from becoming victims of hate speech. We investigate the performance of different deep learning and machine learning algorithms on three different datasets. Our results show that the BERT model gives the best performance among all the models by achieving an F1-score of 90.6% on one of the datasets and F1-scores of 89.7% and 88.2% on the other two datasets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hate%20speech" title="hate speech">hate speech</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=abusive%20words" title=" abusive words"> abusive words</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=text%20classification" title=" text classification"> text classification</a> </p> <a href="https://publications.waset.org/abstracts/164751/hate-speech-detection-using-deep-learning-and-machine-learning-models" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164751.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">57</span> Automated Recognition of Still’s Murmur in Children</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sukryool%20Kang">Sukryool Kang</a>, <a href="https://publications.waset.org/abstracts/search?q=James%20McConnaughey"> James McConnaughey</a>, <a href="https://publications.waset.org/abstracts/search?q=Robin%20Doroshow"> Robin Doroshow</a>, <a href="https://publications.waset.org/abstracts/search?q=Raj%20Shekhar"> Raj Shekhar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Still’s murmur, a vibratory heart murmur, is the most common normal innocent murmur of childhood. Many children with this murmur are unnecessarily referred for cardiology consultation and testing, which exacts a high cost financially and emotionally on the patients and their parents. Pediatricians to date are not successful at distinguishing Still’s murmur from murmurs of true heart disease. In this paper, we present a new algorithmic approach to distinguish Still’s murmur from pathological murmurs in children. We propose two distinct features, spectral width and signal power, which describe the sharpness of the spectrum and the signal intensity of the murmur, respectively. Seventy pediatric heart sound recordings of 41 Still’s and 29 pathological murmurs were used to develop and evaluate our algorithm that achieved a true positive rate of 97% and false positive rate of 0%. This approach would meet clinical standards in recognizing Still’s murmur. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AR%20modeling" title="AR modeling">AR modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=auscultation" title=" auscultation"> auscultation</a>, <a href="https://publications.waset.org/abstracts/search?q=heart%20murmurs" title=" heart murmurs"> heart murmurs</a>, <a href="https://publications.waset.org/abstracts/search?q=Still%27s%20murmur" title=" Still's murmur"> Still's murmur</a> </p> <a href="https://publications.waset.org/abstracts/26956/automated-recognition-of-stills-murmur-in-children" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26956.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">368</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">56</span> The Imperative of Indigenous Entrepreneurship and Sustainable Development in the Globalized Economy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Felix%20Idoko">Innocent Felix Idoko</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The development of indigenous entrepreneurship is critical to the achievement of sustainable development in the internationalized economy. Sustainable development implies a continuous stimulus of growth and improvement of an economy in a fairly stable manner. The paradigms of a globalization are numerous to mention. However, to a great extent, these are trade-offs and dilemmas for indigenous entrepreneurship, particularly in the developing economies with infant industries that are essentially crucial to development. This paper analyses the pros and cons of globalization as relates to the complementary role of both foreign and indigenous entrepreneurs, the conflict of values between globalization and protectionism for local entrepreneurship. Using analytical and descriptive approach, the views of academicians, research fellows, literature reviews and both the theories of the mercantilists and those of free trade mainstream economists, and the G20, the paper concludes that there is a legitimate need for protectionism for domestic entrepreneurship in the developing economies as doing otherwise amount to stifling them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=developing%20countries" title="developing countries">developing countries</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurship" title=" entrepreneurship"> entrepreneurship</a>, <a href="https://publications.waset.org/abstracts/search?q=globalization" title=" globalization"> globalization</a>, <a href="https://publications.waset.org/abstracts/search?q=infant-industries" title=" infant-industries"> infant-industries</a>, <a href="https://publications.waset.org/abstracts/search?q=protectionism" title=" protectionism"> protectionism</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20development" title=" sustainable development"> sustainable development</a> </p> <a href="https://publications.waset.org/abstracts/27141/the-imperative-of-indigenous-entrepreneurship-and-sustainable-development-in-the-globalized-economy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27141.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">446</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">55</span> Innocent Victims and Immoral Women: Sex Workers in the Philippines through the Lens of Mainstream Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sharmila%20Parmanand">Sharmila Parmanand</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines dominant media representations of prostitution in the Philippines and interrogates sex workers’ interactions with the media establishment. This analysis of how sex workers are constituted in media, often as both innocent victims and immoral actors, contributes to an understanding of public discourse on sex work in the Philippines, where decriminalisation has recently been proposed and sex workers are currently classified as potential victims under anti-trafficking laws but also as criminals under the penal code. The first part is an analysis of media coverage of two prominent themes on prostitution: first, raid and rescue operations conducted by law enforcement; and second, prostitution on military bases and tourism hotspots. As a result of pressure from activists and international donors, these two themes often define the policy conversations on sex work in the Philippines. The discourses in written and televised news reports and documentaries from established local and international media sources that address these themes are explored through content analysis. Conclusions are drawn based on specific terms commonly used to refer to sex workers, how sex workers are seen as performing their cultural roles as mothers and wives, how sex work is depicted, associations made between sex work and public health, representations of clients and managers and ‘rescuers’ such as the police, anti-trafficking organisations, and faith-based groups, and which actors are presumed to be issue experts. Images of how prostitution is used as a metaphor for relations between the Philippines and foreign nations are also deconstructed, along with common tropes about developing world female subjects. In general, sex workers are simultaneously portrayed as bad mothers who endanger their family’s morality but also as long-suffering victims who endure exploitation for the sake of their children. They are also depicted as unclean, drug-addicted threats to public health. Their managers and clients are portrayed as cold, abusive, and sometimes violent, and their rescuers as moral and altruistic agents who are essential for sex workers’ rehabilitation and restoration as virtuous citizens. The second part explores sex workers’ own perceptions of their interactions with media, through interviews with members of the Philippine Sex Workers Collective, a loose organisation of sex workers around the Philippines. They reveal that they are often excluded by media practitioners and that they do not feel that they have space for meaningful self-revelation about their work when they do engage with journalists, who seem to have an overt agenda of depicting them as either victims or women of loose morals. In their assessment, media narratives do not necessarily reflect their lived experiences, and in some cases, coverage of rescues and raid operations endangers their privacy and instrumentalises their suffering. Media representations of sex workers may produce subject positions such as ‘victims’ or ‘criminals’ and legitimize specific interventions while foreclosing other ways of thinking. Further, in light of media’s power to reflect and shape public consciousness, it is a valuable academic and political project to examine whether sex workers are able to assert agency in determining how they are represented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discourse%20analysis" title="discourse analysis">discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=news%20media" title=" news media"> news media</a>, <a href="https://publications.waset.org/abstracts/search?q=sex%20work" title=" sex work"> sex work</a>, <a href="https://publications.waset.org/abstracts/search?q=trafficking" title=" trafficking"> trafficking</a> </p> <a href="https://publications.waset.org/abstracts/65628/innocent-victims-and-immoral-women-sex-workers-in-the-philippines-through-the-lens-of-mainstream-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65628.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">54</span> Understanding the Impact of Climate-Induced Rural-Urban Migration on the Technical Efficiency of Maize Production in Malawi</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Pangapanga-Phiri">Innocent Pangapanga-Phiri</a>, <a href="https://publications.waset.org/abstracts/search?q=Eric%20Dada%20Mungatana"> Eric Dada Mungatana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study estimates the effect of climate-induced rural-urban migrants (RUM) on maize productivity. It uses panel data gathered by the National Statistics Office and the World Bank to understand the effect of RUM on the technical efficiency of maize production in rural Malawi. The study runs the two-stage Tobit regression to isolate the real effect of rural-urban migration on the technical efficiency of maize production. The results show that RUM significantly reduces the technical efficiency of maize production. However, the interaction of RUM and climate-smart agriculture has a positive and significant influence on the technical efficiency of maize production, suggesting the need for re-investing migrants’ remittances in agricultural activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=climate-smart%20agriculture" title="climate-smart agriculture">climate-smart agriculture</a>, <a href="https://publications.waset.org/abstracts/search?q=farm%20productivity" title=" farm productivity"> farm productivity</a>, <a href="https://publications.waset.org/abstracts/search?q=rural-urban%20migration" title=" rural-urban migration"> rural-urban migration</a>, <a href="https://publications.waset.org/abstracts/search?q=panel%20stochastic%20frontier%20models" title=" panel stochastic frontier models"> panel stochastic frontier models</a>, <a href="https://publications.waset.org/abstracts/search?q=two-stage%20Tobit%20regression" title=" two-stage Tobit regression"> two-stage Tobit regression</a> </p> <a href="https://publications.waset.org/abstracts/147297/understanding-the-impact-of-climate-induced-rural-urban-migration-on-the-technical-efficiency-of-maize-production-in-malawi" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147297.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">53</span> High-Capacity Image Steganography using Wavelet-based Fusion on Deep Convolutional Neural Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amal%20Khalifa">Amal Khalifa</a>, <a href="https://publications.waset.org/abstracts/search?q=Nicolas%20Vana%20Santos"> Nicolas Vana Santos</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Steganography has been known for centuries as an efficient approach for covert communication. Due to its popularity and ease of access, image steganography has attracted researchers to find secure techniques for hiding information within an innocent looking cover image. In this research, we propose a novel deep-learning approach to digital image steganography. The proposed method, DeepWaveletFusion, uses convolutional neural networks (CNN) to hide a secret image into a cover image of the same size. Two CNNs are trained back-to-back to merge the Discrete Wavelet Transform (DWT) of both colored images and eventually be able to blindly extract the hidden image. Based on two different image similarity metrics, a weighted gain function is used to guide the learning process and maximize the quality of the retrieved secret image and yet maintaining acceptable imperceptibility. Experimental results verified the high recoverability of DeepWaveletFusion which outperformed similar deep-learning-based methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title="deep learning">deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=steganography" title=" steganography"> steganography</a>, <a href="https://publications.waset.org/abstracts/search?q=image" title=" image"> image</a>, <a href="https://publications.waset.org/abstracts/search?q=discrete%20wavelet%20transform" title=" discrete wavelet transform"> discrete wavelet transform</a>, <a href="https://publications.waset.org/abstracts/search?q=fusion" title=" fusion"> fusion</a> </p> <a href="https://publications.waset.org/abstracts/170293/high-capacity-image-steganography-using-wavelet-based-fusion-on-deep-convolutional-neural-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170293.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">90</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">52</span> O.MG- It’s a Cyber-Enabled Fraud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Damola%20O.%20Lawal">Damola O. Lawal</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20W.%20Gresty"> David W. Gresty</a>, <a href="https://publications.waset.org/abstracts/search?q=Diane%20E.%20Gan"> Diane E. Gan</a>, <a href="https://publications.waset.org/abstracts/search?q=Louise%20Hewitt"> Louise Hewitt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=O.MG%20cable" title="O.MG cable">O.MG cable</a>, <a href="https://publications.waset.org/abstracts/search?q=programmable%20USB" title=" programmable USB"> programmable USB</a>, <a href="https://publications.waset.org/abstracts/search?q=file%20tampering%20attack" title=" file tampering attack"> file tampering attack</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20evidence%20credibility" title=" digital evidence credibility"> digital evidence credibility</a>, <a href="https://publications.waset.org/abstracts/search?q=miscarriage%20of%20justice" title=" miscarriage of justice"> miscarriage of justice</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20fraud" title=" cyber fraud"> cyber fraud</a> </p> <a href="https://publications.waset.org/abstracts/143005/omg-its-a-cyber-enabled-fraud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143005.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">159</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">51</span> Seasonal Stirred Variations in Chemical Composition and Antifungal Activity of Medicinal Plants Turraea holstii and Clausena anisata</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francis%20Machumi">Francis Machumi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ester%20Innocent"> Ester Innocent</a>, <a href="https://publications.waset.org/abstracts/search?q=Pius%20Yanda"> Pius Yanda</a>, <a href="https://publications.waset.org/abstracts/search?q=Philip%20C.%20Stevenson"> Philip C. Stevenson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Curative dependence of traditionally used medicinal plants on season of harvest is an alleged claim by traditional health practitioners. This study intended to verify these claims by investigating antifungal activity and chemical composition of traditionally used medicinal plants Turraea holstii and Clausena anisata harvested in rainy season and dry season. The antifungal activities were determined by broth microdilution method whereas chemical profiling of the extracts from the plant materials was done by gas chromatography (GC). Results indicated that extracts of plant materials harvested in dry season showed enhanced antifungal activity as compared to extracts of plant materials harvested in rainy season. GC chromatograms showed overalls increase in number and amount of chemical species for extracts of plant materials harvested in dry season as compared to extracts of plant materials harvested in rainy season. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=antifungal%20activity" title="antifungal activity">antifungal activity</a>, <a href="https://publications.waset.org/abstracts/search?q=chemical%20composition" title=" chemical composition"> chemical composition</a>, <a href="https://publications.waset.org/abstracts/search?q=medicinal%20plants" title=" medicinal plants"> medicinal plants</a>, <a href="https://publications.waset.org/abstracts/search?q=seasonal%20dependence" title=" seasonal dependence"> seasonal dependence</a> </p> <a href="https://publications.waset.org/abstracts/39709/seasonal-stirred-variations-in-chemical-composition-and-antifungal-activity-of-medicinal-plants-turraea-holstii-and-clausena-anisata" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39709.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">424</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">50</span> Electrical Resistivity of Solid and Liquid Pt: Insight into Electrical Resistivity of ε-Fe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Innocent%20C.%20Ezenwa">Innocent C. Ezenwa</a>, <a href="https://publications.waset.org/abstracts/search?q=Takashi%20Yoshino"> Takashi Yoshino</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Knowledge of the transport properties of Fe and its alloys at extreme high pressure (P), temperature (T) conditions are essential for understanding the generation and sustainability of the magnetic field of the rocky planets with a metallic core. Since Pt, an unfilled d-band late transition metal with an electronic structure of Xe4f¹⁴5d⁹6s¹, is paramagnetic and remains close-packed structure at ambient conditions and high P-T, it is expected that its transport properties at these conditions would be similar to those of ε-Fe. We investigated the T-dependent electrical resistivity of solid and liquid Pt up to 8 GPa and found it constant along its melting curve both on the liquid and solid sides in agreement with theoretical prediction and experimental results estimated from thermal conductivity measurements. Our results suggest that the T-dependent resistivity of ε-Fe is linear and would not saturate at high P, T conditions. This, in turn, suggests that the thermal conductivity of liquid Fe at Earth’s core conditions may not be as high as previously suggested by models employing saturation resistivity. Hence, thermal convection could have powered the geodynamo before the birth of the inner core. The electrical resistivity and thermal conductivity on the liquid and solid sides of the inner core boundary of the Earth would be significantly different in values. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electrical%20resistivity" title="electrical resistivity">electrical resistivity</a>, <a href="https://publications.waset.org/abstracts/search?q=thermal%20conductivity" title=" thermal conductivity"> thermal conductivity</a>, <a href="https://publications.waset.org/abstracts/search?q=transport%20properties" title=" transport properties"> transport properties</a>, <a href="https://publications.waset.org/abstracts/search?q=geodynamo%20and%20geomagnetic%20field" title=" geodynamo and geomagnetic field "> geodynamo and geomagnetic field </a> </p> <a href="https://publications.waset.org/abstracts/122046/electrical-resistivity-of-solid-and-liquid-pt-insight-into-electrical-resistivity-of-e-fe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122046.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">143</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">49</span> The Representation of Anies Baswedan about the Issue of the Word 'Pribumi' in His DKI Jakarta Governor Inauguration Speech in Indonesian Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nizar%20Ibnus">Nizar Ibnus</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The term 'pribumi' or indigenous people was originally coined in the colonisation era to differentiate between Dutch colonials and native Indonesian people. The term was also used to trigger nationalism among Indonesian people to liberate their country from any kind of colonialism which had seized their freedom for ages. However, after the war was over and the colonials had fled from the country, the usage began to be altered. It changed from nationalist propaganda term to somewhat racist term. Immigrants and half-blooded people were massively victimized. Then, in 1998 the government forbade the use of this term for public use. Apparently, this racial issue happens again. On 16th October 2017, Anies Baswedan as the new government of DKI Jakarta province mentioned this term in his inauguration speech. This indeed raises controversy among Indonesian people. Using critical discourse analysis, this paper examines how Indonesian media portray the figure of Anies Baswedan regarding the issue. The findings reveal that Indonesian media depict Anies Baswedan differently. Some view him guilty as he mentioned the controversial and forbidden term in public. While, the other media consider him as innocent as he used the term in different contexts. This various media point of view and framing is presumably emerged from their different ideologies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20discourse%20analysis" title="critical discourse analysis">critical discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20framing" title=" media framing"> media framing</a>, <a href="https://publications.waset.org/abstracts/search?q=racism" title=" racism"> racism</a>, <a href="https://publications.waset.org/abstracts/search?q=pribumi" title=" pribumi"> pribumi</a> </p> <a href="https://publications.waset.org/abstracts/83018/the-representation-of-anies-baswedan-about-the-issue-of-the-word-pribumi-in-his-dki-jakarta-governor-inauguration-speech-in-indonesian-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83018.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">188</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">48</span> 6,402: On the Aesthetic Experience of Facticity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nicol%C3%A1s%20Rudas">Nicolás Rudas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sociologists have brought to light the fascination of contemporary societies with numbers but fall short of explaining it. In their accounts, people generally misunderstand the technical intricacies of statistical knowledge and therefore accept numbers as unassailable “facts”. It is due to such pervasive fascination, furthermore, that both old and new forms of social control find fertile ground. By focusing on the process whereby the fetishization of numbers reaches its zenith, i.e., when specific statistics become emblematic of an entire society, it is asserted that numbers primarily function as moral symbols with immense potential for galvanizing collective action. Their “facticity” is not solely a cognitive problem but one that is deeply rooted in myth and connected with social experiences of epiphany and ritual. Evidence from Colombia is used to illustrate how certain quantifications become canonical. In 2021, Colombia’s Peace Court revealed that the national army had executed 6,402 innocent civilians to later report them as members of illegal armed groups. Rapidly, “6,402” transformed into a prominent item in the country’s political landscape. This article reconstructs such a process by following the first six months of the figure’s circulation, both in traditional and social media. In doing so, it is developed a new cultural-sociological conceptualization of numbers as “fact-icons” that departs from traditional understandings of statistics as “technical” objects. Numbers are icons whose appropriation is less rational than aesthetic. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=culture" title="culture">culture</a>, <a href="https://publications.waset.org/abstracts/search?q=statistics" title=" statistics"> statistics</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20memory" title=" collective memory"> collective memory</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20movements" title=" social movements"> social movements</a> </p> <a href="https://publications.waset.org/abstracts/172390/6402-on-the-aesthetic-experience-of-facticity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172390.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">47</span> Understanding the Effect of Fall Armyworm and Integrated Pest Management Practices on the Farm Productivity and Food Security in Malawi</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Pangapanga">Innocent Pangapanga</a>, <a href="https://publications.waset.org/abstracts/search?q=Eric%20Mungatana"> Eric Mungatana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fall armyworm (FAW) (Spodoptera frugiperda), an invasive lepidopteran pest, has caused substantial yield loss since its first detection in September 2016, thereby threatening the farm productivity food security and poverty reduction initiatives in Malawi. Several stakeholders, including households, have adopted chemical pesticides to control FAW without accounting for its costs on welfare, health and the environment. Thus, this study has used panel data endogenous switching regression model to investigate the impact of FAW and the integrated pest management (IPM) –related practices on-farm productivity and food security. The study finds that FAW substantively reduces farm productivity by seven (7) percent and influences the adoption of IPM –related practices, namely, intercropping, mulching, and agroforestry, by 6 percent, ceteris paribus. Interestingly, multiple adoptions of the IPM -related practices noticeably increase farm productivity by 21 percent. After accounting for potential endogeneity through the endogenous switching regression model, the IPM practices further demonstrate tenfold more improvement on food security, implying the role of the IPM –related practices in containing the effect of FAW at the household level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hunger" title="hunger">hunger</a>, <a href="https://publications.waset.org/abstracts/search?q=invasive%20fall%20army%20worms" title=" invasive fall army worms"> invasive fall army worms</a>, <a href="https://publications.waset.org/abstracts/search?q=integrated%20pest%20management%20practices" title=" integrated pest management practices"> integrated pest management practices</a>, <a href="https://publications.waset.org/abstracts/search?q=farm%20productivity" title=" farm productivity"> farm productivity</a>, <a href="https://publications.waset.org/abstracts/search?q=endogenous%20switching%20regression" title=" endogenous switching regression"> endogenous switching regression</a> </p> <a href="https://publications.waset.org/abstracts/147296/understanding-the-effect-of-fall-armyworm-and-integrated-pest-management-practices-on-the-farm-productivity-and-food-security-in-malawi" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147296.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">46</span> Sri Lankan Contribution to Peace and Security in the World: Legal Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muthukuda%20Arachchige%20Dona%20Shiroma%20Jeeva%20Shirajanie%20Niriella">Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20laws" title=" security laws"> security laws</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20justice%20system" title=" criminal justice system"> criminal justice system</a>, <a href="https://publications.waset.org/abstracts/search?q=Sri%20Lanka" title=" Sri Lanka"> Sri Lanka</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20treaty%20law" title=" international treaty law"> international treaty law</a> </p> <a href="https://publications.waset.org/abstracts/73784/sri-lankan-contribution-to-peace-and-security-in-the-world-legal-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73784.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">383</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">45</span> Durability Study of Pultruded CFRP Plates under Sustained Bending in Distilled Water and Seawater Immersions: Effects on the Visco-Elastic Properties</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Kafodya">Innocent Kafodya</a>, <a href="https://publications.waset.org/abstracts/search?q=Guijun%20Xian"> Guijun Xian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents effects of distilled water, seawater and sustained bending strains of 30% and 50% ultimate strain at room temperature, on the durability of unidirectional pultruded carbon fiber reinforced polymer (CFRP) plates. In this study, dynamic mechanical analyzer (DMA) was used to investigate the synergic effects of the immersions and bending strains on the visco-elastic properties of (CFRP) such as storage modulus, tan delta and glass transition temperature. The study reveals that the storage modulus and glass transition temperature increase while tan delta peak decreases in the initial stage of both immersions due to the progression of curing. The storage modulus and Tg subsequently decrease and tan delta increases due to the matrix plasticization. The blister induced damages in the unstrained seawater samples enhance water uptake and cause more serious degradation of Tg and storage modulus than in water immersion. Increasing sustained bending decreases Tg and storage modulus in a long run for both immersions due to resin matrix cracking and debonding. The combined effects of immersions and strains are not clearly reflected due to the statistical effects of DMA sample sizes and competing processes of molecular reorientation and postcuring. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pultruded%20CFRP%20plate" title="pultruded CFRP plate">pultruded CFRP plate</a>, <a href="https://publications.waset.org/abstracts/search?q=bending%20strain" title=" bending strain"> bending strain</a>, <a href="https://publications.waset.org/abstracts/search?q=glass%20transition%20temperature" title=" glass transition temperature"> glass transition temperature</a>, <a href="https://publications.waset.org/abstracts/search?q=storage%20modulus" title=" storage modulus"> storage modulus</a>, <a href="https://publications.waset.org/abstracts/search?q=tan%20delta" title=" tan delta"> tan delta</a> </p> <a href="https://publications.waset.org/abstracts/19878/durability-study-of-pultruded-cfrp-plates-under-sustained-bending-in-distilled-water-and-seawater-immersions-effects-on-the-visco-elastic-properties" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19878.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> Boko Haram Insurgence and Denial of War Crime against Civilians in the Northeast, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aleburu%20Rufus%20Edeki">Aleburu Rufus Edeki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The activities of Boko Haram terrorist group have become worrisome in Nigeria. Boko Haram killed innocent civilians, destroyed schools, churches, military barracks, police stations, and other government establishments. The federal government of Nigerian Military engaged in counter-insurgency to curtail the activities of Boko Haram militant. The engagement of the military led to mass killing across the Northeast region. The reported cases of mass-killing led to petition written to the International Criminal Court by the civil society organization as a result of denial by the military authorities of their involvement. The investigation carried out by the International Criminal Court awash by denial of military involvement in war crimes. As a result of this denial, the ICC called for further investigation of war crimes by the military. This study was carried out among fifty-eight participants. In-depth interviews were conducted among the following participants: civilians 41; human rights commission 5 and civil society 12. This study revealed that professional ethics is associated with denial of military involvement in mass killing in the region. This study also revealed that denial is associated with personality. It was also found that social attributes such as trauma, shame, ostracism, criticism, and punishment are found with denial. It is therefore concluded in this study that protection is needed for war actors, so that situation of denial is minimal in post-conflict truth findings. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boko%20Haram" title="Boko Haram">Boko Haram</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=insurgence" title=" insurgence"> insurgence</a>, <a href="https://publications.waset.org/abstracts/search?q=war" title=" war"> war</a> </p> <a href="https://publications.waset.org/abstracts/111698/boko-haram-insurgence-and-denial-of-war-crime-against-civilians-in-the-northeast-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/111698.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">43</span> Humanitarianism as the New Face of Religious Practice in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nicholas%20Okpe">Nicholas Okpe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The world is no more innocent as previously, as it gets more and more engulfed in both man-made and natural disasters and the call for religious intervention becomes intrinsically louder to the extent that any religious inclination that does not devolve into societal or humanitarian adventures makes no meaning. Issues such as wars, conflicts of different dimensions, natural and man made discomforts in form of environmental disturbances have thrown new challenges hitherto unknown to the doorsteps of religious groups especially faith based organizations. In the last two decades, the above speaks volumes in Nigeria such that Chunua Achebe's "things fallen apart" is real today all over Nigeria. An estimated five million people live in internally displaced camps all over the country as a consequence of various forms of social unrest as well as natural disasters. These incidences have brought to the fore the signifance of religion in societal affairs as many groups who through their interventions have often shown to be the hope of the people. The crux of this paper is to examine the role of religion in not only making people to cope with difficult situations they find themselves in, but also giving hope to the many who otherwise are feeling despondent and at the edge of life. Many religious groups have well developed strategies of interventions in various humanitarian situations. Thus, this paper assesses efforts of religions such as christianity, Islam and the indigenous African religion in this respect. It is discovered that the most potent and effective means of attending to humanitarian crisis today in Nigeria is through the various religious and cultural organizations as governments at various levels have lost credibility in such exercises. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=humanitarianism" title="humanitarianism">humanitarianism</a>, <a href="https://publications.waset.org/abstracts/search?q=religion" title=" religion"> religion</a>, <a href="https://publications.waset.org/abstracts/search?q=practice" title=" practice"> practice</a>, <a href="https://publications.waset.org/abstracts/search?q=nigeria" title=" nigeria"> nigeria</a> </p> <a href="https://publications.waset.org/abstracts/193869/humanitarianism-as-the-new-face-of-religious-practice-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193869.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">8</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> Combating Money Laundering and Inroads into Banking Secrecy: Evidence from Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aspalella%20A.%20Rahman">Aspalella A. Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is widely accepted that the investigation of money laundering and the tracing and confiscation of criminal proceeds have intruded into the principles of banking secrecy. The inroads into banking secrecy present serious threats to democracy, and more importantly, to the traditional banker-customer relationship. It is generally accepted that the fight against money laundering is in conflict with the secrecy rule. Banking secrecy is a customer privilege whereas combating crime is critical for public safety and security. Indeed, achieving a proper balance is a desirable goal. But how we go about achieving such a balance is a question encountered by many law enforcement authorities. Therefore, this paper examines the effect of disclosure under the Malaysian anti-money laundering laws on the traditional duty of banks to keep the customer’s information confidential. It also analyzes whether the Malaysian laws provide a right balance between a duty to keep customer’s information secret and a duty to disclose such information in the fight against money laundering. On closer inspection, it is submitted that the Malaysian laws provide sufficient safeguards to ensure that the disclosure of customer’s information is carried out in a manner that is not prejudicial to the interest of legitimate customers. This is a positive approach that could protect the innocent customers from being mistreated by the law. Ultimately, it can be said that the growing threat of global money laundering and terrorism makes the overriding of banking secrecy justified because without a flow of information from the banks, the effective prevention of the menace is not possible. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-money%20laundering%20law" title="anti-money laundering law">anti-money laundering law</a>, <a href="https://publications.waset.org/abstracts/search?q=banker-customer%20relationship" title=" banker-customer relationship"> banker-customer relationship</a>, <a href="https://publications.waset.org/abstracts/search?q=banking%20secrecy" title=" banking secrecy"> banking secrecy</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a> </p> <a href="https://publications.waset.org/abstracts/4993/combating-money-laundering-and-inroads-into-banking-secrecy-evidence-from-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4993.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">428</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> Protecting Right to Life and Combating Terrorism through the Instrument of Law in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Oyekan%20Kolawole%20Jamiu">Oyekan Kolawole Jamiu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The right to life is a moral principle based on the belief that a human being has the right to life and, in particular, should not be unjustly killed by another human being. However, the most worrisome security challenge in Nigeria which has cut short the lives of innocent Nigerians is the activities of the dreaded terrorist group known as Boko Haram (which means Western Education is a sin). Between 2004 till date, over 15000 people have been gruesomely murdered by this terrorist group. However, despite the facts that suspected terrorists are arrested and paraded almost on a daily basis, cases of terrorism in our courts in Nigeria today have not been expeditiously dealt with by the judiciary. This paper examines the concept of right to life. The right to life is an inherent right for each and every person. From his or her birth; the individual is considered a living being that must be protected. The right to life connotes also right to live and grow in a healthy environment where there is appropriate health care, qualitative education and adequate security of lives and property. The paper also examines the fight against terrorism and the duty of the government to protect right to life of every individual even in the midst of the fight against terrorism. The paper further reviews the Terrorism Act 2011(as amended) and the clogs in the wheel of prosecution of suspected terrorists. The paper concludes that since terrorism is a new security challenge, to prevent conflict of interest, only one security agency should be trained and saddled with the responsibility of prosecuting suspected terrorist, Law should be enacted to compel intelligent gathering and sharing of information among security agencies and in addition, a special court should be established to deal expeditiously with cases of terrorism in Nigeria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligent%20gathering" title=" intelligent gathering"> intelligent gathering</a>, <a href="https://publications.waset.org/abstracts/search?q=right%20to%20life" title=" right to life"> right to life</a>, <a href="https://publications.waset.org/abstracts/search?q=prosecution" title=" prosecution"> prosecution</a> </p> <a href="https://publications.waset.org/abstracts/47729/protecting-right-to-life-and-combating-terrorism-through-the-instrument-of-law-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47729.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> A Retrospective Study of Dog Bite Occurrence and Anti Rabies Vaccination of Dogs in Veterinary Clinics in Aba, Abia State Nigeria from January 2016 to December 2020</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Innocent%20C.%20Abazie">Innocent C. Abazie</a>, <a href="https://publications.waset.org/abstracts/search?q=Odukoya%20A.%20Olatunde"> Odukoya A. Olatunde</a>, <a href="https://publications.waset.org/abstracts/search?q=Ochuko%20Orakpoghenor"> Ochuko Orakpoghenor</a>, <a href="https://publications.waset.org/abstracts/search?q=Bamidele%20J.%20Kolawole"> Bamidele J. Kolawole</a>, <a href="https://publications.waset.org/abstracts/search?q=Hannah%20L.%20Kolawole"> Hannah L. Kolawole</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study was carried out to obtain five-year retrospective data on dog bite cases and antirabies vaccination of dogs in relation to rabies control in Aba, Abia state, Nigeria. Data for retrospective studies (2016 - 2020) was collected from both government and private veterinary clinics in Aba. A total of 66 dog bite cases were reported between January 2016 and December 2020 with a majority of victims being adults (51.5%) within the ages of 18 – 50 years. On the prevalence of dog bite cases according to the gender of victims, males (75.8%) were mostly involved compared to female victims (24.2%). Anatomically, the majority of bite wounds (65.2%) were on the legs. The monthly distribution of bites indicates a higher frequency in the months of January and March (dry season). Local 28 (43.8%) and exotic breeds 30(46.8%) of dogs were mostly involved in the dog bite cases. The majority of the dogs (92.2%) involved in the bite cases were known dogs whose owners could be contacted, while a very few proportion (7.8%) were stray dogs. Results of this study indicated that only 16 (25%) of the offending dogs had a current antirabies vaccination record, 8 (12.5%) had an unknown vaccination record, while the largest proportion, 40 (62.5%) of the offending dogs had no current vaccination record. Public awareness of the danger of dog bites in relation to rabies and increased antirabies vaccination of dogs as a means of controlling the disease is recommended. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aba" title="Aba">Aba</a>, <a href="https://publications.waset.org/abstracts/search?q=dog%20bite" title=" dog bite"> dog bite</a>, <a href="https://publications.waset.org/abstracts/search?q=rabies" title=" rabies"> rabies</a>, <a href="https://publications.waset.org/abstracts/search?q=vaccination%20profile" title=" vaccination profile"> vaccination profile</a> </p> <a href="https://publications.waset.org/abstracts/177745/a-retrospective-study-of-dog-bite-occurrence-and-anti-rabies-vaccination-of-dogs-in-veterinary-clinics-in-aba-abia-state-nigeria-from-january-2016-to-december-2020" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177745.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> Consequences of Adolescent Childbearing Among Teen Mothers In Gatsibo District, Rwanda</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joselyne%20Rugema">Joselyne Rugema</a>, <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Twagirayezu"> Innocent Twagirayezu</a>, <a href="https://publications.waset.org/abstracts/search?q=Aimable%20Nkurunziza"> Aimable Nkurunziza</a>, <a href="https://publications.waset.org/abstracts/search?q=Alice%20Nyirazigama"> Alice Nyirazigama</a>, <a href="https://publications.waset.org/abstracts/search?q=Vedaste%20Bagweneza"> Vedaste Bagweneza</a>, <a href="https://publications.waset.org/abstracts/search?q=Belancilla%20Nikuze"> Belancilla Nikuze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: Burn injuries among children are associated with major complications. Early health care seeking and appropriate management are crucial in saving lives and preventing complications. Objective: To assess home-based management practices and health seeking behaviors among caregivers of children admitted with burn injuries at selected hospitals in Rwanda. Methods: A cross-sectional descriptive study was conducted among caregivers of children admitted with burn injuries at three hospitals in Kigali. A semi-structured questionnaire was used to collect the data that were analyzed using SPSS version 25. Statistical software Results: Most of the children with burn injuries had median age of 36 months, and 89.9% had second-degree burns. 92.4% of burns happened at home and 63.3% were scalds. Only 18% of the caregivers seek care immediately after children’s burn injuries. About 2.5% reported not seeking any care after burn injuries and 3.8% sought care from traditional healers. 65.9% of the participants used wrong practices before seeking care such as applying honey, cooking oil and urine to the burn injuries. Transportation difficulties before consulting health facilities were the main reported faced barriers to success health care (86.1%). Conclusion: Immediate health seeking behavior was low. Wrong practices including application of harmful products to burn injuries are common in the community. There is a need for community based interventions to prevent burn injuries at home and to empower the community with appropriate actions to take after injuries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adolescent%20pregnancy" title="adolescent pregnancy">adolescent pregnancy</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20design" title=" qualitative design"> qualitative design</a>, <a href="https://publications.waset.org/abstracts/search?q=childbearing" title=" childbearing"> childbearing</a>, <a href="https://publications.waset.org/abstracts/search?q=teenage%20mothers" title=" teenage mothers"> teenage mothers</a> </p> <a href="https://publications.waset.org/abstracts/176714/consequences-of-adolescent-childbearing-among-teen-mothers-in-gatsibo-district-rwanda" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176714.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">61</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Uzougbo%20Onwuegbuzie">Innocent Uzougbo Onwuegbuzie</a>, <a href="https://publications.waset.org/abstracts/search?q=Siene%20Elizabeth%20Eke"> Siene Elizabeth Eke</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20challenges" title="cybersecurity challenges">cybersecurity challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threat%20mitigation" title=" cyber threat mitigation"> cyber threat mitigation</a>, <a href="https://publications.waset.org/abstracts/search?q=federal%20polytechnic%20Ado-Ekiti" title=" federal polytechnic Ado-Ekiti"> federal polytechnic Ado-Ekiti</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT%20management" title=" ICT management"> ICT management</a> </p> <a href="https://publications.waset.org/abstracts/188248/cybersecurity-challenges-and-solutions-in-ict-management-at-the-federal-polytechnic-ado-ekiti-a-quantitative-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188248.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">39</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> Understanding the Endogenous Impact of Tropical Cyclones Floods and Sustainable Landscape Management Innovations on Farm Productivity in Malawi</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Pangapanga">Innocent Pangapanga</a>, <a href="https://publications.waset.org/abstracts/search?q=Eric%20Mungatana"> Eric Mungatana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tropical cyclones–related floods (TCRFs) in Malawi have devastating effects on smallholder agriculture, thereby threatening the food security agenda, which is already constrained by poor agricultural innovations, low use of improved varieties, and unaffordable inorganic fertilizers, and fragmenting landholding sizes. Accordingly, households have engineered and indigenously implemented sustainable landscape management (SLM) innovations to contain the adverse effects of TCRFs on farm productivity. This study, therefore, interrogated the efficacy of SLM adoption on farm productivity under varying TCRFs, while controlling for the potential selection bias and unobservable heterogeneity through the application of the Endogenous Switching Regression Model. In this study, we further investigated factors driving SLM adoption. Substantively, we found TCRFs reducing farm productivity by 31 percent, on the one hand, and influencing the adoption of SLM innovations by 27 percent, on the other hand. The study also observed that households that interacted SLM with TCRFs were more likely to enhance farm productivity by 24 percent than their counterparts. Interestingly, the study results further demonstrated that multiple adoptions of SLM-related innovations, including intercropping, agroforestry, and organic manure, enhanced farm productivity by 126 percent, suggesting promoting SLM adoption as a package to appropriately inform existing sustainable development goals’ agricultural productivity initiatives under intensifying TCRFs in the country. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tropical%20cyclones%E2%80%93related%20floods" title="tropical cyclones–related floods">tropical cyclones–related floods</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20landscape%20management%20innovations" title=" sustainable landscape management innovations"> sustainable landscape management innovations</a>, <a href="https://publications.waset.org/abstracts/search?q=farm%20productivity" title=" farm productivity"> farm productivity</a>, <a href="https://publications.waset.org/abstracts/search?q=endogeneity" title=" endogeneity"> endogeneity</a>, <a href="https://publications.waset.org/abstracts/search?q=endogenous%20switching%20regression%20model" title=" endogenous switching regression model"> endogenous switching regression model</a>, <a href="https://publications.waset.org/abstracts/search?q=panel%20data" title=" panel data"> panel data</a>, <a href="https://publications.waset.org/abstracts/search?q=smallholder%20agriculture" title=" smallholder agriculture"> smallholder agriculture</a> </p> <a href="https://publications.waset.org/abstracts/147294/understanding-the-endogenous-impact-of-tropical-cyclones-floods-and-sustainable-landscape-management-innovations-on-farm-productivity-in-malawi" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147294.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">116</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Innocent%20Mpawenimana&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Innocent%20Mpawenimana&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Innocent%20Mpawenimana&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>