Search results for: purpose in life
11043 Characteristics of Female Offenders: Using Childhood Victimization Model for Treatment
Authors: Jane E. Hill
Abstract:
Sexual, physical, or emotional abuses are behaviors used by one person in a relationship or within a family unit to control the other person. Physical abuse can consist of, but not limited to hitting, pushing, and shoving. Sexual abuse is unwanted or forced sexual activity on a person without their consent. Abusive behaviors include intimidation, manipulation, humiliation, isolation, frightening, terrorizing, coercing, threatening, blaming, hurting, injuring, or wounding another individual. Although emotional, psychological and financial abuses are not criminal behaviors, they are forms of abuse and can leave emotional scars on their victim. The purpose of this literature review research was to examine characteristics of female offenders, past abuse, and pathways to offending. The question that guided this research: does past abuse influence recidivism? The theoretical foundation used was relational theory by Jean Baker Miller. One common feature of female offenders is abuse (sexual, physical, or verbal). Abuse can cause mental illnesses and substance abuse. The abuse does not directly affect the women's recidivism. However, results indicated the psychological and maladaptive behaviors as a result of the abuse did contribute to indirect pathways to continue offending. The female offenders’ symptoms of ongoing depression, anxiety, and engaging in substance abuse (self medicating) did lead to the women's incarceration. Using the childhood victimization model as the treatment approach for women's mental illness and substance abuse disorders that were a result from history of child abuse have shown success. With that in mind, if issues surrounding early victimization are not addressed, then the women offenders may not recover from their mental illness or addiction and are at a higher risk of reoffending. However, if the women are not emotionally ready to engage in the treatment process, then it should not be forced onto them because it may cause harm (targeting prior traumatic experiences). Social capital is family support and sources that assist in helping the individual with education, employment opportunities that can lead to success. Human capital refers to internal knowledge, skills, and capacities that help the individual act in new and appropriate ways. The lack of human and social capital is common among female offenders, which leads to extreme poverty and economic marginalization, more often in frequent numbers than men. In addition, the changes in welfare reform have exacerbated women’s difficulties in gaining adequate-paying jobs to support themselves and their children that have contributed to female offenders reoffending. With that in mind, one way to lower the risk factor of female offenders from reoffending is to provide them with educational and vocational training, enhance their self-efficacy, and teach them appropriate coping skills and life skills. Furthermore, it is important to strengthen family bonds and support. Having a supportive family relationship was a statistically significant protective factor for women offenders.Keywords: characteristics, childhood victimization model, female offenders, treatment
Procedia PDF Downloads 11111042 Design and Production of Thin-Walled UHPFRC Footbridge
Authors: P. Tej, P. Kněž, M. Blank
Abstract:
The paper presents design and production of thin-walled U-profile footbridge made of UHPFRC. The main structure of the bridge is one prefabricated shell structure made of UHPFRC with dispersed steel fibers without any conventional reinforcement. The span of the bridge structure is 10 m and the clear width of 1.5 m. The thickness of the UHPFRC shell structure oscillated in an interval of 30-45 mm. Several calculations were made during the bridge design and compared with the experiments. For the purpose of verifying the calculations, a segment of 1.5 m was first produced, followed by the whole footbridge for testing. After the load tests were done, the design was optimized to cast the final footbridge.Keywords: footbridge, non-linear analysis, shell structure, UHPFRC, Ultra-High Performance Fibre Reinforced Concrete
Procedia PDF Downloads 23211041 Indicators to Assess the Quality of Health Services
Authors: Muyatdinova Aigul, Aitkaliyeva Madina
Abstract:
The article deals with the evaluation of the quality of medical services on the basis of quality indicators. For this purpose allocated initially the features of the medical services market. The Features of the market directly affect on the evaluation process that takes a multi-level and multi-stakeholder nature. Unlike ordinary goods market assessment of medical services does not only market. Such an assessment is complemented by continuous internal and external evaluation, including experts and accrediting bodies. In the article highlighted the composition of indicators for a comprehensive evaluationKeywords: health care market, quality of health services, indicators of care quality
Procedia PDF Downloads 43711040 Autophagy Acceleration and Self-Healing by the Revolution against Frequent Eating, High Glycemic and Unabsorbable Substances as One Meal a Day Plan
Authors: Reihane Mehrparvar
Abstract:
Human age could exceed further by altering gene expression through food intaking, although as a consequence of recent century eating patterns, human life-span getting shorter by emerging irregulating in autophagy mechanism, insulin, leptin, gut microbiota which are important etiological factors of type-2 diabetes, obesity, infertility, cancer, metabolic and autoimmune diseases. However, restricted calorie intake and vigorous exercise might be beneficial for losing weight and metabolic regulation in a short period but could not be implementable in the long term as a way of life. Therefore, the lack of a dietary program that is compatible with the genes of the body is essential. Sweet and high-glycemic-index (HGI) foods were associated with type-2 diabetes and cancer morbidity. The neuropsychological perspective characterizes the inclination of sweet and HGI-food consumption as addictive behavior; hence this process engages preference of gut microbiota, neural node, and dopaminergic functions. Moreover, meal composition is not the only factor that affects body hemostasis. In this narrative review, it is believed to attempt to investigate how the body responded to different food intakes and represent an accurate model based on current evidence. Eating frequently and ingesting unassimilable protein and carbohydrates may not be compatible with human genes and could cause impairments in the self-renovation mechanism. This trajectory indicates our body is more adapted to starvation and eating animal meat and marrow. Here has been recommended a model that takes into account three important factors: frequent eating, meal composition, and circadian rhythm, which may offer a promising intervention for obesity, inflammation, cardiovascular, autoimmune disorder, type-2 diabetes, insulin resistance, infertility, and cancer through intensifying autophagy-mechanism and eliminate medical costs.Keywords: metabolic disease, anti-aging, type-2 diabetes, autophagy
Procedia PDF Downloads 8111039 Transmogrification of the Danse Macabre Image: Capturing the Journey towards Creativity
Authors: Javaria Farooqui
Abstract:
This study, “Transmogrification of the Danse Macabre Image: Capturing the Journey towards Creativity,” traces the evolution of the concept of Danse Macabre. In Every man death takes away the sinful when they least expect it, in Solyman and Perseda everyone falls prey to death irrespective of their deeds and in Tauba-tun-Nasuh, the sinner is plagued. The climatic point in this brief research comes with the Modern texts, The Moon and Sixpence, Roohe-e-Insani and Amédéé, ou Comment s’en débarrasser, when Danse Macabre extends its boundaries, uniting the idea of creativity with death. Similarly in the visual context, Danse Macabre image, initially a horrifying idea, becomes a part of the present day comics and serves an entertaining rather than a cathartic purpose.Keywords: Danse macabre, transmogrification, Medieval, death, character
Procedia PDF Downloads 52011038 Development of an Instrument Assessing Participants’ Motivation on Assigning Monetary Value to Quality of Life
Authors: Afentoula Mavrodi, Andreas Georgiou, Georgios Tsiotras, Vassilis Aletras
Abstract:
Placing a monetary value on a quality-adjusted-life-year (QALY) is of utmost importance in economic evaluation. Identifying the population’s preferences is critical in order to understand some of the reasons driving variations in the assigned monetary value. Yet, evidence of the motives behind value assignment to a QALY by the general public is limited. Developing an instrument that would capture the population’s motives could be proven valuable to policy-makers, to guide them in allocating different values to a QALY based on users’ motivations. The aim of this study was to identify the most relevant motives and develop an appropriate instrument to assess them. To design the instrument, we employed: a) the EQ-5D-3L tool to assess participants’ current health status, and b) the Willingness-to-Pay (WTP) approach, within the Contingent Valuation (CV) Method framework, to elicit the monetary value. Advancing the open-ended approach adopted to assess solely protest bidders’ motives; a variety of follow-up item-specific statements were designed (deductive approach), aiming to evaluate motives of both protest bidders and participants willing to pay for the hypothetical treatment under consideration. The initial design of the survey instrument was the outcome of an extensive literature review. This instrument was revised based on 15 semi-structured interviews that took place in September 2018 and a pilot study held during two months (October-November) in 2018. Individuals with different educational, occupational and economical backgrounds and adequate verbal skills were recruited to complete the semi-structured interviews. The follow-up motivation statements of both protest bidders and those willing to pay were revised and rephrased after the semi-structured interviews. In total 4 statements for protest bidders and 3 statements for those willing to pay for the treatment were chosen to be included in the survey tool. Using the CATI (Computer Assisted Telephone Interview) method, a randomly selected sample of 97 persons living in Thessaloniki, Greece, completed the questionnaire on two occasions over a period of 4 weeks. Based on pilot study results, a test-retest reliability assessment was performed using the intra-class correlation coefficient (ICC). All statements formulated for protest bidders showed acceptable reliability (ICC values of 0.84 (95% CI: 0.67, 0.92) and above). Similarly, all statements for those willing to pay for the treatment showed high reliability (ICC values of 0.86 (95% CI: 0.78, 0.91) and above). Overall, the instrument designed in this study was reliable with regards to the item-specific statements assessing participants’ motivation. Validation of the instrument will take place in a future study. For a holistic WTP per QALY instrument, participants’ motivation must be addressed broadly. The instrument developed in this study captured a variety of motives and provided insight with regards to the method through which the latter are evaluated. Last but not least, it extended motive assessment to all study participants and not only protest bidders.Keywords: contingent valuation method, instrument, motives, quality-adjusted life-year, willingness-to-pay
Procedia PDF Downloads 13711037 The Evaluation Model for the Quality of Software Based on Open Source Code
Authors: Li Donghong, Peng Fuyang, Yang Guanghua, Su Xiaoyan
Abstract:
Using open source code is a popular method of software development. How to evaluate the quality of software becomes more important. This paper introduces an evaluation model. The model evaluates the quality from four dimensions: technology, production, management, and development. Each dimension includes many indicators. The weight of indicator can be modified according to the purpose of evaluation. The paper also introduces a method of using the model. The evaluating result can provide good advice for evaluating or purchasing the software.Keywords: evaluation model, software quality, open source code, evaluation indicator
Procedia PDF Downloads 38911036 Challenges of School Leadership
Authors: Stefan Ninković
Abstract:
The main purpose of this paper is to examine the different theoretical approaches and relevant empirical evidence and thus, recognize some of the most pressing challenges faced by school leaders. This paper starts from the fact that the new mission of the school is characterized by the need for stronger coordination among students' academic, social and emotional learning. In this sense, school leaders need to focus their commitment, vision and leadership on the issues of students' attitudes, language, cultural and social background, and sexual orientation. More specifically, they should know what a good teaching is for student’s at-risk, students whose first language is not dominant in school, those who’s learning styles are not in accordance with usual teaching styles, or who are stigmatized. There is a rather wide consensus around the fact that the traditionally popular concept of instructional leadership of the school principal is no longer sufficient. However, in a number of "pro-leadership" circles, including certain groups of academic researchers, consultants and practitioners, there is an established tendency of attributing school principal an extraordinary influence towards school achievements. On the other hand, the situation in which all employees in the school are leaders is a utopia par excellence. Although leadership obviously can be efficiently distributed across the school, there are few findings that speak about sources of this distribution and factors making it sustainable. Another idea that is not particularly new, but has only recently gained in importance is related to the fact that the collective capacity of the school is an important resource that often remains under-cultivated. To understand the nature and power of collaborative school cultures, it is necessary to know that these operate in a way that they make their all collective members' tacit knowledge explicit. In this sense, the question is how leaders in schools can shape collaborative culture and create social capital in the school. Pressure exerted on schools to systematically collect and use the data has been accompanied by the need for school leaders to develop new competencies. The role of school leaders is critical in the process of assessing what data are needed and for what purpose. Different types of data are important: test results, data on student’s absenteeism, satisfaction with school, teacher motivation, etc. One of the most important tasks of school leaders are data-driven decision making as well as ensuring transparency of the decision-making process. Finally, the question arises whether the existing models of school leadership are compatible with the current social and economic trends. It is necessary to examine whether and under what conditions schools are in need for forms of leadership that are different from those that currently prevail. Closely related to this issue is also to analyze the adequacy of different approaches to leadership development in the school.Keywords: educational changes, leaders, leadership, school
Procedia PDF Downloads 33611035 A Machine Learning Decision Support Framework for Industrial Engineering Purposes
Authors: Anli Du Preez, James Bekker
Abstract:
Data is currently one of the most critical and influential emerging technologies. However, the true potential of data is yet to be exploited since, currently, about 1% of generated data are ever actually analyzed for value creation. There is a data gap where data is not explored due to the lack of data analytics infrastructure and the required data analytics skills. This study developed a decision support framework for data analytics by following Jabareen’s framework development methodology. The study focused on machine learning algorithms, which is a subset of data analytics. The developed framework is designed to assist data analysts with little experience, in choosing the appropriate machine learning algorithm given the purpose of their application.Keywords: Data analytics, Industrial engineering, Machine learning, Value creation
Procedia PDF Downloads 16811034 Circular Economy: An Overview of Principles, Strategies, and Case Studies
Authors: Dina Mohamed Ahmed Mahmoud Bakr
Abstract:
The concept of a circular economy is gaining increasing attention as a way to promote sustainable economic growth and reduce the environmental impact of human activities. The circular economy is a systemic approach that aims to keep materials and resources in use for as long as possible, minimize waste and pollution, and regenerate natural systems. The purpose of this article is to present a summary of the principles and tactics employed in the circular economy, along with examples of prosperous circular economy projects implemented in different sectors across Japan, Austria, the Netherlands, South Africa, Germany, and the United States. The paper concludes with a discussion of the challenges and opportunities associated with the transition to a circular economy and the policy interventions that can support this transition.Keywords: circular economy, waste reduction, sustainable development, recycling
Procedia PDF Downloads 10111033 Women's Pathways to Prison in Thailand
Authors: Samantha Jeffries, Chontit Chuenurah
Abstract:
Thailand incarcerates the largest number of women and has the highest female incarceration rate in South East Asia. Since the 1990s, there has been a substantial increase in the number, rate and proportion of women imprisoned. Thailand places a high priority on the gender specific contexts out of which offending arises and the different needs of women in the criminal justice system. This is manifested in work undertaken to guide the development of the United Nations Rules for the Treatment of Women Prisoners and Non-Custodial Measures for Women Offenders (the Bangkok Rules); adopted by the United Nations General Assembly in 2010. The Bangkok Rules make a strong statement about Thailand’s recognition of and commitment to the fair and equitable treatment of women throughout their contact with the criminal justice system including at sentencing and in prison. This makes the comparatively high use of imprisonment for women in Thailand particularly concerning and raises questions about the relationship between gender, crime and criminal justice. While there is an extensive body of research in Western jurisdictions exploring women’s pathways to prison, there is a relative dearth of methodologically robust research examining the possible gendered circumstances leading to imprisonment in Thailand. In this presentation, we will report preliminary findings from a qualitative study of women’s pathways to prison in Thailand. Our research aims were to ascertain: 1) the type, frequency, and context of criminal behavior that led to women’s incarceration, 2) women’s experiences of the criminal justice system, 3) the broader life experiences and circumstances that led women to prison in Thailand. In-depth life history interviews (n=77) were utilized to gain a comprehensive understanding of women’s journeys into prison. The interview schedule was open-ended consisting of prisoner responses to broad discussion topics. This approach provided women with the opportunity to describe significant experiences in their lives, to bring together distinct chronologies of events, and to analyze links between their varied life experiences, offending, and incarceration. Analyses showed that women’s journey’s to prison take one of eight pathways which tentatively labelled as follows, the: 1) harmed and harming pathway, 2) domestic/family violence victimization pathway, 3) drug connected pathway, 4) street woman pathway, 5) economically motivated pathway, 6) jealousy anger and/or revenge pathway, 7) naivety pathway, 8) unjust and/or corrupted criminal justice pathway. Each will be fully discussed during the presentation. This research is significant because it is the first in-depth methodologically robust exploration of women’s journeys to prison in Thailand and one of a few studies to explore gendered pathways outside of western contexts. Understanding women’s pathways into Thailand’s prisons is crucial to the development of effective planning, policy and program responses not only while women are in prison but also post-release. To best meet women’s needs in prison and effectively support their reintegration, we must have a comprehensive understanding of who these women are, what offenses they commit, the reasons that trigger their confrontations with the criminal justice system and the impact of the criminal justice system on them.Keywords: pathways, prison, women, Thailand
Procedia PDF Downloads 24611032 Pregnant Individuals in Rural Areas Benefit from Cognitive Behavioral Therapy: A Literature Review
Authors: Kushal Patel, Manasa Dittakavi, Cyrus Falsafi, Gretchen Lovett
Abstract:
Rural America has seen a surge in opioid addiction rates and overdose deaths in recent years, becoming a significant public health crisis. This may be due to a variety of factors, such as lack of access to healthcare or other economic and social factors that can contribute to addiction such as poverty, unemployment, and social isolation. As the opioid epidemic has disproportionately affected rural communities, pregnant women in these areas may be highly susceptible and face additional difficulties in facing the appropriate care they need. Opioid use disorder has many negative effects on prenatal infants. These include changes in their microbiome, mental health, neurodevelopment and cognition. These can affect how the child performs in various activities in life and how they interact with others. It has been demonstrated that using cognitive behavioral therapy improves not just pain-related results but also mobility, quality of life, disability, and mood outcomes. This indicates that cognitive behavioral therapy (CBT) may be a useful therapeutic strategy for enhancing general health and wellbeing in people with opioid use problems. In terms of treating psychiatric diseases, CBT carries fewer dangers than opioids. One study that illustrates the potential for CBT to promote a reduction in opioid use disorder used self-reported drug use patterns 6 months prior to and during their pregnancy. At the beginning of the study, participants reported an average of 3.78 drug or alcohol use days in the previous 28 days, which decreased to 1.63 days after treatment. The study also found a decrease in depression scores, as measured by IDS scores, from 23.9 to 17.1 at the end of treatment. These and other results show that CBT can have meaningful impacts on pregnant women in Rural America who struggle with an opioid use disorder. This project has been approved by the West Virginia School of Osteopathic Medicine- Office of Research and Sponsored Programs and deemed non-research scholarly work.Keywords: appalachia, CBT, opiods, pregnancy
Procedia PDF Downloads 9111031 Children's Literature and the Study of the Sociological Approach
Authors: Sulmaz Mozaffari, Zahra Mozaffari, Saman Mozaffari
Abstract:
Man has always tried to find the Ideal place for life and he has experienced a lot of problems. So many internal and external limits has been on his way. Today man is threatened by so many crisis because of his specific look to the world. Literature as a universal science has not ignored this problem either. Children's literature has tried to present the social, cultural, religious and economical problems in tales and novels. This research tries to analyse social and cultural problems related to 10th century children from social point of criticism.Keywords: social criticism, crisis, children's literature, tale
Procedia PDF Downloads 48011030 Neoliberalism and Otherness: Convergences or Divergences?
Authors: Juliana Pereira Tigre
Abstract:
In the current critical debate on the process of globalization, on the one hand, arises the accusation that neoliberalism standardizes the so-called American way of life on the cultures of the world, operating as a system of subtle domination, expropriating and incorporating the other. On the other hand, it is defended that neoliberalism begins its career of political and economic order as a sensitive conception to the otherness, imposing itself at present due to its peaceful management of pluralism and defense of individual freedom. In this sense, this paper aims to discuss the extent to which the neoliberalism and the otherness converge or diverge in contemporaneity and the guiding principles of globalization.Keywords: otherness, globalization, neoliberalism, social sciences
Procedia PDF Downloads 43111029 Double Row Taper Roller Bearing Wheel-end System in Rigid Rear Drive Axle in Heavy Duty SUV Passenger Vehicle
Authors: Mohd Imtiaz S, Saurabh Jain, Pothiraj K.
Abstract:
In today’s highly competitive passenger vehicle market, comfortable driving experience is one of the key parameters significantly weighed by the customer. Smooth ride and handling of the vehicle with exceptionally reliable wheel end solution is a paramount requirement in passenger Sports Utility Vehicle (SUV) vehicles subjected to challenging terrains and loads with rigid rear drive axle configuration. Traditional wheel-end bearing systems in passenger segment rigid rear drive axle utilizes the semi-floating layout, which imparts vertical bending loads and torsion to the axle shafts. The wheel-end bearing is usually a Single or Double Row Deep-Groove Ball Bearing (DRDGBB) or Double Row Angular Contact Ball Bearing (DRACBB). This solution is cost effective and simple in architecture. However, it lacks effectiveness against the heavy loads subjected to a SUV vehicle, especially the axial trust at high-speed cornering. This paper describes the solution of Double Row Taper Roller Bearing (DRTRB) wheel-end for a SUV vehicle in the rigid rear drive axle and improvement in terms of maximizing its load carrying capacity along with better reliability in terms of axial thrust in high-speed cornering. It describes the advantage of geometry of DRTRB over DRDGBB and DRACBB highlighting contact and load flow. The paper also highlights the vehicle level considerations affecting the B10 life of the bearing system for better selection of the DRTRB wheel-ends systems. This paper also describes real time vehicle level results along with theoretical improvements.Keywords: axial thrust, b10 life, deep-groove ball bearing, taper roller bearing, semi-floating layout.
Procedia PDF Downloads 7411028 Spectral Efficiency Improvement in 5G Systems by Polyphase Decomposition
Authors: Wilson Enríquez, Daniel Cardenas
Abstract:
This article proposes a filter bank format combined with the mathematical tool called polyphase decomposition and the discrete Fourier transform (DFT) with the purpose of improving the performance of the fifth-generation communication systems (5G). We started with a review of the literature and the study of the filter bank theory and its combination with DFT in order to improve the performance of wireless communications since it reduces the computational complexity of these communication systems. With the proposed technique, several experiments were carried out in order to evaluate the structures in 5G systems. Finally, the results are presented in graphical form in terms of bit error rate against the ratio bit energy/noise power spectral density (BER vs. Eb / No).Keywords: multi-carrier system (5G), filter bank, polyphase decomposition, FIR equalizer
Procedia PDF Downloads 20111027 Design and Optimization of Composite Canopy Structure
Authors: Prakash Kattire, Rahul Pathare, Nilesh Tawde
Abstract:
A canopy is an overhead roof structure generally used at the entrance of a building to provide shelter from rain and sun and may also be used for decorative purposes. In this paper, the canopy structure to cover the conveyor line has been studied. Existing most of the canopy structures are made of steel and glass, which makes a heavier structure, so the purpose of this study is to weight and cost optimization of the canopy. To achieve this goal, the materials of construction considered are Polyvinyl chloride (PVC) natural composite, Fiber Reinforced Plastic (FRP), and Structural steel Fe250. Designing and modeling were done in Solid works, whereas Altair Inspire software was used for the optimization of the structure. Through this study, it was found that there is a total 10% weight reduction in the structure with sufficient reserve for structural strength.Keywords: canopy, composite, FRP, PVC
Procedia PDF Downloads 14711026 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems
Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar
Abstract:
Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.Keywords: medical device, cyber security, attack, detection, machine learning
Procedia PDF Downloads 35711025 Profiling of the Cell-Cycle Related Genes in Response to Efavirenz, a Non-Nucleoside Reverse Transcriptase Inhibitor in Human Lung Cancer
Authors: Rahaba Marima, Clement Penny
Abstract:
The Health-related quality of life (HRQoL) for HIV positive patients has improved since the introduction of the highly active antiretroviral treatment (HAART). However, in the present HAART era, HIV co-morbidities such as lung cancer, a non-AIDS (NAIDS) defining cancer have been documented to be on the rise. Under normal physiological conditions, cells grow, repair and proliferate through the cell-cycle as cellular homeostasis is important in the maintenance and proper regulation of tissues and organs. Contrarily, the deregulation of the cell-cycle is a hallmark of cancer, including lung cancer. The association between lung cancer and the use of HAART components such as Efavirenz (EFV) is poorly understood. This study aimed at elucidating the effects of EFV on the cell-cycle genes’ expression in lung cancer. For this purpose, the human cell-cycle gene array composed of 84 genes was evaluated on both normal lung fibroblasts (MRC-5) cells and adenocarcinoma (A549) lung cells, in response to 13µM EFV or 0.01% vehicle. The ±2 up or down fold change was used as a basis of target selection, with p < 0.05. Additionally, RT-qPCR was done to validate the gene array results. Next, In-silico bio-informatics tools, Search Tool for the Retrieval of Interacting Genes/Proteins (STRING), Reactome, Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway and Ingenuity Pathway Analysis (IPA) were used for gene/gene interaction studies as well as to map the molecular and biological pathways influenced by the identified targets. Interestingly, the DNA damage response (DDR) pathway genes such as p53, Ataxia telangiectasia mutated and Rad3 related (ATR), Growth arrest and DNA damage inducible alpha (GADD45A), HUS1 checkpoint homolog (HUS1) and Role of radiation (RAD) genes were shown to be upregulated following EFV treatment, as revealed by STRING analysis. Additionally, functional enrichment analysis by the KEGG pathway revealed that most of the differentially expressed gene targets function at the cell-cycle checkpoint such as p21, Aurora kinase B (AURKB) and Mitotic Arrest Deficient-Like 2 (MAD2L2). Core analysis by IPA revealed that p53 downstream targets such as survivin, Bcl2, and cyclin/cyclin dependent kinases (CDKs) complexes are down-regulated, following exposure to EFV. Furthermore, Reactome analysis showed a significant increase in cellular response to stress genes, DNA repair genes, and apoptosis genes, as observed in both normal and cancerous cells. These findings implicate the genotoxic effects of EFV on lung cells, provoking the DDR pathway. Notably, the constitutive expression of this pathway (DDR) often leads to uncontrolled cell proliferation and eventually tumourigenesis, which could be the attribute of HAART components’ (such as EFV) effect on human cancers. Targeting the cell-cycle and its regulation holds a promising therapeutic intervention to the potential HAART associated carcinogenesis, particularly lung cancer.Keywords: cell-cycle, DNA damage response, Efavirenz, lung cancer
Procedia PDF Downloads 15611024 Psychosocial Consequences of Discovering Misattributed Paternity in Adulthood: Insider Action Research
Authors: Alyona Cerfontyne, Levita D'Souza, Lefteris Patlamazoglou
Abstract:
Unlike adoption and donor-assisted reproduction, misattributed paternity occurring within the context of spontaneous conception and outside of formally recognised practices of having a child remains largely an understudied phenomenon. In adulthood, to discover misattributed paternity, i.e., that the man you call your father is not related to you genetically, can have profound implications for everyone affected. Until the advent of direct-to-consumer DNA testing 20 years ago, such discoveries were relatively rare. Despite the growing number of individuals uncovering their biogenetic paternity through genetic testing, there is very limited research on misattributed paternity from the perspective of adult children affected by it. No research exists on how to support these individuals through counselling post-discovery. Framed as insider action research, this study aimed to explore the perceived psychosocial consequences of misattributed paternity discoveries and coping strategies used by individuals who discover their misattributed paternity status in adulthood. In total, 12 individuals with misattributed paternity participated in semi-structured interviews in July-August 2022. The collected data was analysed using reflexive thematic analysis. The study’s results indicate that discovering misattributed paternity in adulthood can be likened to a watershed moment forever changing the trajectory of one’s life. Psychological experiences consistent with trauma, as well as grief and loss, re-evaluation of close family relationships, reestablishment of one’s identity, as well as experiencing a profound need to belong are the key themes emerging from the analysis of psychosocial experiences. Post-discovery, individuals with misattributed paternity employ a wide range of emotional and problem-focused coping strategies, amongst which seeking connection with those who understand, searching for information on the new biogenetic family and finding new meanings to life are most prominent. The study contributes both to the academic and practical knowledge of experiences of misattributed paternity and highlights the importance of further research on the topic.Keywords: discovery of misattributed paternity, misattributed paternity, paternal discrepancy, psychosocial consequences, coping
Procedia PDF Downloads 8911023 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)
Authors: Wafa' Slaibi Alsharafat
Abstract:
Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection
Procedia PDF Downloads 47411022 ACOPIN: An ACO Algorithm with TSP Approach for Clustering Proteins in Protein Interaction Networks
Authors: Jamaludin Sallim, Rozlina Mohamed, Roslina Abdul Hamid
Abstract:
In this paper, we proposed an Ant Colony Optimization (ACO) algorithm together with Traveling Salesman Problem (TSP) approach to investigate the clustering problem in Protein Interaction Networks (PIN). We named this combination as ACOPIN. The purpose of this work is two-fold. First, to test the efficacy of ACO in clustering PIN and second, to propose the simple generalization of the ACO algorithm that might allow its application in clustering proteins in PIN. We split this paper to three main sections. First, we describe the PIN and clustering proteins in PIN. Second, we discuss the steps involved in each phase of ACO algorithm. Finally, we present some results of the investigation with the clustering patterns.Keywords: ant colony optimization algorithm, searching algorithm, protein functional module, protein interaction network
Procedia PDF Downloads 61211021 Significant Factor of Magnetic Resonance for Survival Outcome in Rectal Cancer Patients Following Neoadjuvant Combined Chemotherapy and Radiation Therapy: Stratification of Lateral Pelvic Lymph Node
Authors: Min Ju Kim, Beom Jin Park, Deuk Jae Sung, Na Yeon Han, Kichoon Sim
Abstract:
Purpose: The purpose of this study is to determine the significant magnetic resonance (MR) imaging factors of lateral pelvic lymph node (LPLN) on the assessment of survival outcomes of neoadjuvant combined chemotherapy and radiation therapy (CRT) in patients with mid/low rectal cancer. Materials and Methods: The institutional review board approved this retrospective study of 63 patients with mid/low rectal cancer who underwent MR before and after CRT and patient consent was not required. Surgery performed within 4 weeks after CRT. The location of LPLNs was divided into following four groups; 1) common iliac, 2) external iliac, 3) obturator, and 4) internal iliac lymph nodes. The short and long axis diameters, numbers, shape (ovoid vs round), signal intensity (homogenous vs heterogenous), margin (smooth vs irregular), and diffusion-weighted restriction of LPLN were analyzed on pre- and post-CRT images. For treatment response using size, lymph node groups were defined as group 1) short axis diameter ≤ 5mm on both MR, group 2) > 5mm change into ≤ 5mm after CRT, and group 3) persistent size > 5mm before and after CRT. Clinical findings were also evaluated. The disease-free survival and overall survival rate were evaluated and the risk factors for survival outcomes were analyzed using cox regression analysis. Results: Patients in the group 3 (persistent size >5mm) showed significantly lower survival rates than the group 1 and 2 (Disease-free survival rates of 36.1% and 78.8, 88.8%, p < 0.001). The size response (group 1-3), multiplicity of LPLN, the level of carcinoembryonic antigen (CEA), patient’s age, T and N stage, vessel invasion, perineural invasion were significant factors affecting disease-free survival rate or overall survival rate using univariate analysis (p < 0.05). The persistent size (group 3) and multiplicity of LPLN were independent risk factors among MR imaging features influencing disease-free survival rate (HR = 10.087, p < 0.05; HR = 4.808, p < 0.05). Perineural invasion and T stage were shown as independent histologic risk factors (HR = 16.594, p < 0.05; HR = 15.891, p < 0.05). Conclusion: The persistent size greater than 5mm and multiplicity of LPLN on both pre- and post-MR after CRT were significant MR factors affecting survival outcomes in the patients with mid/low rectal cancer.Keywords: rectal cancer, MRI, lymph node, combined chemoradiotherapy
Procedia PDF Downloads 15011020 A Methodological Approach to Digital Engineering Adoption and Implementation for Organizations
Authors: Sadia H. Syeda, Zain H. Malik
Abstract:
As systems continue to become more complex and the interdependencies of processes and sub-systems continue to grow and transform, the need for a comprehensive method of tracking and linking the lifecycle of the systems in a digital form becomes ever more critical. Digital Engineering (DE) provides an approach to managing an authoritative data source that links, tracks, and updates system data as it evolves and grows throughout the system development lifecycle. DE enables the developing, tracking, and sharing system data, models, and other related artifacts in a digital environment accessible to all necessary stakeholders. The DE environment provides an integrated electronic repository that enables traceability between design, engineering, and sustainment artifacts. The DE activities' primary objective is to develop a set of integrated, coherent, and consistent system models for the program. It is envisioned to provide a collaborative information-sharing environment for various stakeholders, including operational users, acquisition personnel, engineering personnel, and logistics and sustainment personnel. Examining the processes that DE can support in the systems engineering life cycle (SELC) is a primary step in the DE adoption and implementation journey. Through an analysis of the U.S Department of Defense’s (DoD) Office of the Secretary of Defense (OSD’s) Digital Engineering Strategy and their implementation, examples of DE implementation by the industry and technical organizations, this paper will provide descriptions of the current DE processes and best practices of implementing DE across an enterprise. This will help identify the capabilities, environment, and infrastructure needed to develop a potential roadmap for implementing DE practices consistent with its business strategy. A capability maturity matrix will be provided to assess the organization’s DE maturity emphasizing how all the SELC elements interlink to form a cohesive ecosystem. If implemented, DE can increase efficiency and improve the systems engineering processes' quality and outcomes.Keywords: digital engineering, digital environment, digital maturity model, single source of truth, systems engineering life-cycle
Procedia PDF Downloads 9311019 Using Structured Analysis and Design Technique Method for Unmanned Aerial Vehicle Components
Authors: Najeh Lakhoua
Abstract:
Introduction: Scientific developments and techniques for the systemic approach generate several names to the systemic approach: systems analysis, systems analysis, structural analysis. The main purpose of these reflections is to find a multi-disciplinary approach which organizes knowledge, creates universal language design and controls complex sets. In fact, system analysis is structured sequentially by steps: the observation of the system by various observers in various aspects, the analysis of interactions and regulatory chains, the modeling that takes into account the evolution of the system, the simulation and the real tests in order to obtain the consensus. Thus the system approach allows two types of analysis according to the structure and the function of the system. The purpose of this paper is to present an application of system analysis of Unmanned Aerial Vehicle (UAV) components in order to represent the architecture of this system. Method: There are various analysis methods which are proposed, in the literature, in to carry out actions of global analysis and different points of view as SADT method (Structured Analysis and Design Technique), Petri Network. The methodology adopted in order to contribute to the system analysis of an Unmanned Aerial Vehicle has been proposed in this paper and it is based on the use of SADT. In fact, we present a functional analysis based on the SADT method of UAV components Body, power supply and platform, computing, sensors, actuators, software, loop principles, flight controls and communications). Results: In this part, we present the application of SADT method for the functional analysis of the UAV components. This SADT model will be composed exclusively of actigrams. It starts with the main function ‘To analysis of the UAV components’. Then, this function is broken into sub-functions and this process is developed until the last decomposition level has been reached (levels A1, A2, A3 and A4). Recall that SADT techniques are semi-formal; however, for the same subject, different correct models can be built without having to know with certitude which model is the good or, at least, the best. In fact, this kind of model allows users a sufficient freedom in its construction and so the subjective factor introduces a supplementary dimension for its validation. That is why the validation step on the whole necessitates the confrontation of different points of views. Conclusion: In this paper, we presented an application of system analysis of Unmanned Aerial Vehicle components. In fact, this application of system analysis is based on SADT method (Structured Analysis Design Technique). This functional analysis proved the useful use of SADT method and its ability of describing complex dynamic systems.Keywords: system analysis, unmanned aerial vehicle, functional analysis, architecture
Procedia PDF Downloads 20411018 Use of Social Media in Political Communications: Example of Facebook
Authors: Havva Nur Tarakci, Bahar Urhan Torun
Abstract:
The transformation that is seen in every area of life by technology, especially internet technology changes the structure of political communications too. Internet, which is at the top of new communication technologies, affects political communications with its structure in a way that no traditional communication tools ever have and enables interaction and the channel between receiver and sender, and it becomes one of the most effective tools preferred among the political communication applications. This state as a result of technological convergence makes Internet an unobtainable place for political communication campaigns. Political communications, which means every kind of communication strategies that political parties called 'actors of political communications' use with the aim of messaging their opinions and party programmes to their present and potential voters who are a target group for them, is a type of communication that is frequently used also among social media tools at the present day. The electorate consisting of different structures is informed, directed, and managed by social media tools. Political parties easily reach their electorate by these tools without any limitations of both time and place and also are able to take the opinions and reactions of their electorate by the element of interaction that is a feature of social media. In this context, Facebook, which is a place that political parties use in social media at most, is a communication network including in our daily life since 2004. As it is one of the most popular social networks today, it is among the most-visited websites in the global scale. In this way, the research is based on the question, “How do the political parties use Facebook at the campaigns, which they conduct during the election periods, for informing their voters?” and it aims at clarifying the Facebook using practices of the political parties. In direction of this objective the official Facebook accounts of the four political parties (JDP–AKParti, PDP–BDP, RPP-CHP, NMP-MHP), which reach their voters by social media besides other communication tools, are treated, and a frame for the politics of Turkey is formed. The time of examination is constricted with totally two weeks, one week before the mayoral elections and one week after the mayoral elections, when it is supposed that the political parties use their Facebook accounts in full swing. As a research method, the method of content analysis is preferred, and the texts and the visual elements that are gotten are interpreted based on this analysis.Keywords: Facebook, political communications, social media, electrorate
Procedia PDF Downloads 38311017 A Detailed Study of Sexism in Mizo Language
Authors: H. C. Laltleipuii, Lalruatdiki Siakeng
Abstract:
Mizo is a language spoken by the natives of Mizoram in North-East India. The Mizo society is a patriarchal society and hence is encumbered with trails of sexism in its language. Sexist language expresses discrimination on the basis of gender. While women are primarily affected, it is not however limited to just the female gender. This paper focuses on the sexist language that reflects the discrimination of women in the male-dominated, male-centered society of the Mizo. The main purpose of this paper is to emphasize with details, sexism that can be found in three aspects of language: in the naming of animate and inanimate objects or words in general, in the idioms and phrases and proverbs. This study will also take into account the gender neutral terms that are in use in the language.Keywords: gender, Mizo, patriarchy, sexism
Procedia PDF Downloads 41111016 Cultural Knowledge Transfer of the Inherited Karen Backstrap Weaving for the 4th Generation of a Pwo Karen Community
Authors: Suphitcha Charoen-Amornkitt, Chokeanand Bussracumpakorn
Abstract:
The tendency of the Karen backstrap weaving succession has gradually decreased due to the difficulty of weaving techniques and the relocation of the young generation. The Yang Nam Klat Nuea community, Nong Ya Plong District, Phetchaburi, is a Pwo Karen community that is seriously confronted with a lack of cultural heritage. Thus, a group of weavers was formed to revive the knowledge of weaving. However, they have been gradually confronted with culture assimilation to mainstream culture from the desire for marketing acceptance and imperative and forced the extinction of culture due to the disappearance of weaving details and techniques. Although there are practical solutions, i.e., product development, community improvement, knowledge improvement, and knowledge transfer, to inherit the Karen weaving culture, people in the community cannot fulfill their deep intention about the weaving inheritance as most solutions have focused on developing the commercial products and making the income instead of inheriting their knowledge. This research employed qualitative user research with an in-depth user interview to study communal knowledge transfer succession based on the internal involved parties, i.e., four expert weavers, three young weavers, and three 4th generation villagers. The purpose is to explore the correlation and mindset of villagers towards the culture with specific issues, including the psychology of culture, core knowledge and learning methods, cultural inheritance, and cultural engagement. As a result, the existing models of knowledge management mostly focused on tangible strategies, which can notice progress in short terms, such as direct teaching and consistent practicing. At the same time, the motivation and passion of inheritors were abolished while the research found that the young generation who profoundly connected with the textile culture will have a more significant intention to continue the culture. Therefore, this research suggests both internal and external solutions to treat the community. Regarding the internal solutions, family, weaving group, and school have an important role to participate with young villagers by encouraging activities to support the cultivating of Karen’s history, understanding their identities, and adapting the culture as a part of daily life. At the same time, collecting all of the knowledge in the archives, e.g., recorded video, instruction, and books, can crucially prevent the culture from extinction. Regarding the external solutions, this study suggests that working with social media will enhance the intimacy of textile culture, while the community should relieve the roles in marketing competition and start to drive cultural experiences to create a new market position. In conclusion, this research intends to explore the causes and motivation to support the transfer of the culture to the 4th generation villagers and to raise awareness of the diversity of culture in society. With these suggestions and the desire to improve pride and confidence in culture, the community agrees that strengthening the relationships between the young villagers and the weaving culture can bring attention and interest back to the weaving culture.Keywords: Pwo Karen textile culture, backstrap weaving succession, cultural inheritance, knowledge transfer, knowledge management
Procedia PDF Downloads 9411015 An Approximation Technique to Automate Tron
Authors: P. Jayashree, S. Rajkumar
Abstract:
With the trend of virtual and augmented reality environments booming to provide a life like experience, gaming is a major tool in supporting such learning environments. In this work, a variant of Voronoi heuristics, employing supervised learning for the TRON game is proposed. The paper discusses the features that would be really useful when a machine learning bot is to be used as an opponent against a human player. Various game scenarios, nature of the bot and the experimental results are provided for the proposed variant to prove that the approach is better than those that are currently followed.Keywords: artificial Intelligence, automation, machine learning, TRON game, Voronoi heuristics
Procedia PDF Downloads 46711014 The Impact of Motivation on Employee Performance in South Korea
Authors: Atabong Awung Lekeazem
Abstract:
The purpose of this paper is to identify the impact or role of incentives on employee’s performance with a particular emphasis on Korean workers. The process involves defining and explaining the different types of motivation. In defining them, we also bring out the difference between the two major types of motivations. The second phase of the paper shall involve gathering data/information from a sample population and then analyzing the data. In the analysis, we shall get to see the almost similar mentality or value which Koreans attach to motivation, which a slide different view coming only from top management personnel. The last phase shall have us presenting the data and coming to a conclusion from which possible knowledge on how managers and potential managers can ignite the best out of their employees.Keywords: motivation, employee’s performance, Korean workers, business information systems
Procedia PDF Downloads 414