Search results for: legal support
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8296

Search results for: legal support

4966 “We’ve Got to Get This Out of Our Game”: A Reddit Study on the Immediate Reaction to Homophobia in the United Soccer League

Authors: Steffanie Kiourkas

Abstract:

This study sought to examine fans’ responses to San Diego Loyal player Collin Martin being called a homophobic slur by Phoenix Rising player Junior Flemmings. Fans’ responses were gathered from Reddit comments on a thread posted immediately after the incident. Fans specifically centered their conversations on the homophobic slur, the coaches’ reactions, and the use of homophobia in sports in general. This study identified five themes present in the conversations between soccer fans. The themes generally highlighted critiques of the Phoenix Rising team and head coach, critiques of the use of homophobia in soccer, and support for the San Diego Loyal and hopefulness about the state of society moving forward.

Keywords: homophobia, LGBTQ+, United Soccer League, Reddit

Procedia PDF Downloads 84
4965 Accident analysis in Small and Medium Enterprises (SMEs) in India

Authors: Pranab Kumar Goswami, Elena Gurung

Abstract:

Small and medium enterprises (SME) are considered as the driving force for the economic growth of a developing country like India. Most of the SMEs are located in residential/non-industrial areas to avoid legal obligations of occupational safety and health (OSH) provisions. This study was conducted in Delhiwith a view to analyze the accidents that occurredduringthe year 2019 & 2020. The objective of the study was to find out the accident prone SMEs in Delhi and major causes of such accidents. Methods: Survey and comprehensive data analysis methods, followed by applying simple statistical techniques, were used for this study. The accident reports for the study period collected from the labour department and police stations were analyzed for the study. The injured workers were interviewed to ascertain safety compliances, training and awareness programs, etc. The study was completed in March2021. Results: It was found that most of the accidents took place in SMEs located in residential/non- industrial areas in Delhi. The accident-prone machines were found to be power presses (42%) and injection moulding machines (37%). Predominantly unsafe machinery or unsafe working conditions and lack of training of worker were observed to be the major causes of accidents in such industries. Conclusions: It was concluded from the study that unsafe machinery/equipment and lack of proper training to the workers were two main reasons for increase in accidents.It was also concluded that the industries located in industrial areas were better placed in terms of workplace compliances. The managements who were running their operations from residential/non-industrial areaswere found to be less aware on health and safety issues. Lack of enforcement by government agencies in such areas has escalated this problem. Adequate training to workers, managing safe & healthy workplace, and sustained enforcement can reduce accidents in such industries.

Keywords: SME, accident prevention, cause of accident, unorganised

Procedia PDF Downloads 96
4964 Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists

Authors: K. Hołda, D. Śliwa, K. Daniec, A. Nawrat

Abstract:

This article was created as part of the developed master's thesis. It attempts to present a newly developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the following article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results.

Keywords: Raspberry Pi, ethernet, automated cybersecurity tests, ARP, DNS, backdoor, TCP, password sniffing

Procedia PDF Downloads 120
4963 Performance Evaluation of Contemporary Classifiers for Automatic Detection of Epileptic EEG

Authors: K. E. Ch. Vidyasagar, M. Moghavvemi, T. S. S. T. Prabhat

Abstract:

Epilepsy is a global problem, and with seizures eluding even the smartest of diagnoses a requirement for automatic detection of the same using electroencephalogram (EEG) would have a huge impact in diagnosis of the disorder. Among a multitude of methods for automatic epilepsy detection, one should find the best method out, based on accuracy, for classification. This paper reasons out, and rationalizes, the best methods for classification. Accuracy is based on the classifier, and thus this paper discusses classifiers like quadratic discriminant analysis (QDA), classification and regression tree (CART), support vector machine (SVM), naive Bayes classifier (NBC), linear discriminant analysis (LDA), K-nearest neighbor (KNN) and artificial neural networks (ANN). Results show that ANN is the most accurate of all the above stated classifiers with 97.7% accuracy, 97.25% specificity and 98.28% sensitivity in its merit. This is followed closely by SVM with 1% variation in result. These results would certainly help researchers choose the best classifier for detection of epilepsy.

Keywords: classification, seizure, KNN, SVM, LDA, ANN, epilepsy

Procedia PDF Downloads 513
4962 Accumulated Gender-Diverse Co-signing Experience, Knowledge Sharing, and Audit Quality

Authors: Anxuan Xie, Chun-Chan Yu

Abstract:

Survey evidence provides support that auditors can gain professional knowledge not only from client firms but also from teammates they work with. Furthermore, given that knowledge is accumulated in nature, along with the reality that auditors today must work in an environment of increased diversity, whether the attributes of teammates will influence the effects of knowledge sharing and accumulation and ultimately influence an audit partner’s audit quality should be interesting research issues. We test whether the gender of co-signers will moderate the effect of a lead partner’s cooperative experiences on financial restatements. Furthermore, if the answer is “yes”, we further investigate the underlying reasons. We use data from Taiwan because, according to Taiwan’s law, engagement partners, who are basically two certificate public accountants from the same audit firm, are required to disclose (i.e., sign) their names in the audit report of public companies since 1983. Therefore, we can trace each engagement partner’s historic direct cooperative (co-signing) records and get large-sample data. We find that the benefits of knowledge sharing manifest primarily via co-signing audit reports with audit partners of different gender from the lead engagement partners, supporting the argument that in an audit setting, accumulated gender-diverse working relationship is positively associated with knowledge sharing, and therefore improve lead engagements’ audit quality. This study contributes to the extant literature in the following ways. First, we provide evidence that in the auditing setting, the experiences accumulated from cooperating with teammates of a different gender from the lead partner can improve audit quality. Given that most studies find evidence of negative effects of surface-level diversity on team performance, the results of this study support the prior literature that the association between diversity and knowledge sharing actually hinges on the context (e.g., organizational culture, task complexity) and “bridge” (a pre-existing commonality among team members that can smooth the process of diversity toward favorable results) among diversity team members. Second, this study also provides practical insights with respect to the audit firms’ policy of knowledge sharing and deployment of engagement partners. For example, for audit firms that appreciate the merits of knowledge sharing, the deployment of auditors of different gender within an audit team can help auditors accumulate audit-related knowledge, which will further benefit the future performance of those audit firms. Moreover, nowadays, client firms also attach importance to the diversity of their engagement partners. As their policy goals, lawmakers and regulators also continue to promote a gender-diverse working environment. The findings of this study indicate that for audit firms, gender diversity will not be just a means to cater to those groups. Third, for audit committees or other stakeholders, they can evaluate the quality of existing (or potential) lead partners by tracking their co-signing experiences, especially whether they have gender-diverse co-signing experiences.

Keywords: co-signing experiences, audit quality, knowledge sharing, gender diversity

Procedia PDF Downloads 75
4961 Disaster Victim Identification: A Social Science Perspective

Authors: Victor Toom

Abstract:

Albeit it is never possible to anticipate the full range of difficulties after a catastrophe, efforts to identify victims of mass casualty events have become institutionalized and standardized with the aim of effectively and efficiently addressing the many challenges and contingencies. Such ‘disaster victim identification’ (DVI) practices are dependent on the forensic sciences, are subject of national legislation, and are reliant on technical and organizational protocols to mitigate the many complexities in the wake of catastrophe. Apart from such technological, legal and bureaucratic elements constituting a DVI operation, victims’ families and their emotions are also part and parcel of any effort to identify casualties of mass human fatality incidents. Take for example the fact that forensic experts require (antemortem) information from the group of relatives to make identification possible. An identified body or body part is also repatriated to kin. Relatives are thus main stakeholders in DVI operations. Much has been achieved in years past regarding facilitating victims’ families’ issues and their emotions. Yet, how families are dealt with by experts and authorities is still considered a difficult topic. Due to sensitivities and required emphatic interaction with families on the one hand, and the rationalized DVI efforts, on the other hand, there is still scope for improving communication, providing information and meaningful inclusion of relatives in the DVI effort. This paper aims to bridge the standardized world of DVI efforts and families’ experienced realities and makes suggestions to further improve DVI efforts through inclusion of victims’ families. Based on qualitative interviews, the paper narrates involvement and experiences of inter alia DVI practitioners, victims’ families, advocates and clergy in the wake of the 1995 Srebrenica genocide which killed approximately 8,000 men, and the 9/11 in New York City with 2,750 victims. The paper shows that there are several models of including victims’ families into a DVI operation, and it argues for a model of where victims’ families become a partner in DVI operations.

Keywords: disaster victim identification (DVI), victims’ families, social science (qualitative), 9/11 attacks, Srebrenica genocide

Procedia PDF Downloads 230
4960 Fatigue Truck Modification Factor for Design Truck (CL-625)

Authors: Mohamad Najari, Gilbert Grondin, Marwan El-Rich

Abstract:

Design trucks in standard codes are selected based on the amount of damage they cause on structures-specifically bridges- and roads to represent the real traffic loads. Some limited numbers of trucks are run on a bridge one at a time and the damage on the bridge is recorded for each truck. One design track is also run on the same bridge “n” times -“n” is the number of trucks used previously- to calculate the damage of the design truck on the same bridge. To make these damages equal a reduction factor is needed for that specific design truck in the codes. As the limited number of trucks cannot be the exact representative of real traffic through the life of the structure, these reduction factors are not accurately calculated and they should be modified accordingly. Started on July 2004, the vehicle load data were collected in six weigh in motion (WIM) sites owned by Alberta Transportation for eight consecutive years. This database includes more than 200 million trucks. Having these data gives the opportunity to compare the effect of any standard fatigue trucks weigh and the real traffic load on the fatigue life of the bridges which leads to a modification for the fatigue truck factor in the code. To calculate the damage for each truck, the truck is run on the bridge, moment history of the detail under study is recorded, stress range cycles are counted, and then damage is calculated using available S-N curves. A 2000 lines FORTRAN code has been developed to perform the analysis and calculate the damages of the trucks in the database for all eight fatigue categories according to Canadian Institute of Steel Construction (CSA S-16). Stress cycles are counted using rain flow counting method. The modification factors for design truck (CL-625) are calculated for two different bridge configurations and ten span lengths varying from 1 m to 200 m. The two considered bridge configurations are single-span bridge and four span bridge. This was found to be sufficient and representative for a simply supported span, positive moment in end spans of bridges with two or more spans, positive moment in interior spans of three or more spans, and the negative moment at an interior support of multi-span bridges. The moment history of the mid span is recorded for single-span bridge and, exterior positive moment, interior positive moment, and support negative moment are recorded for four span bridge. The influence lines are expressed by a polynomial expression obtained from a regression analysis of the influence lines obtained from SAP2000. It is found that for design truck (CL-625) fatigue truck factor is varying from 0.35 to 0.55 depending on span lengths and bridge configuration. The detail results will be presented in the upcoming papers. This code can be used for any design trucks available in standard codes.

Keywords: bridge, fatigue, fatigue design truck, rain flow analysis, FORTRAN

Procedia PDF Downloads 518
4959 The Impact of Total Quality Management Practices on Innovation: An Empirical Study

Authors: Oumayma Tajouri

Abstract:

The relationship between total quality management (TQM) practices and innovation is conflictual. Some scholars suggest that TQM has an effect on incremental improvement and would not lead to innovation and creativity. The purpose of this paper is to analyse the association between TQM and different types of innovation. Our goal is to examine to what extent the implementation of TQM practices is indeed supporting innovation in the Tunisian ISO 9001 certified industries. Using a self-administered survey to sample ISO9001 certified industry companies, this study examines five hypotheses and tests the relation between TQM practices and innovation. The principal finding of this study is that TQM has significant and positive effects on innovation in the Tunisian context. The results support that TQM has an influence on incremental, radical, and administrative innovation.

Keywords: total quality management, incremental innovation product and/service, radical innovation product/service, incremental innovation process, radical innovation process, administrative innovation

Procedia PDF Downloads 151
4958 A Step Towards Automating the Synthesis of a Scene Script

Authors: Americo Pereira, Ricardo Carvalho, Pedro Carvalho, Luis Corte-Real

Abstract:

Generating 3D content is a task mostly done by hand. It requires specific knowledge not only on how to use the tools for the task but also on the fundamentals of a 3D environment. In this work, we show that automatic generation of content can be achieved, from a scene script, by leveraging existing tools so that non-experts can easily engage in a 3D content generation without requiring vast amounts of time in exploring and learning how to use specific tools. This proposal carries several benefits, including flexible scene synthesis with different levels of detail. Our preliminary results show that the automatically generated content is comparable to the content generated by users with low experience in 3D modeling while vastly reducing the amount of time required for the generation and adds support to implement flexible scenarios for visual scene visualization.

Keywords: 3D virtualization, multimedia, scene script, synthesis

Procedia PDF Downloads 259
4957 Formative Assessment of Creative Thinking Skills Embedded in Learning Through Play

Authors: Yigal Rosen, Garrett Jaeger, Michelle Newstadt, Ilia Rushkin, Sara Bakken

Abstract:

All children are capable of advancing their creative thinking skills and engaging in creative play. Creative play puts children in charge of exploring ideas, relationships, spaces and problems. Supported by The LEGO Foundation, the creative thinking formative assessment is designed to provide valid, reliable and informative measurement to support the development of creative skills while children are engaged in Learning through Play. In this paper we provide an overview of the assessment framework underpinned the assessment of creative thinking and report the results from the 2022 pilot study demonstrating promising evidence on the ability to measure creative skills in a conceptually and ecologically valid way to inform the development of creative skills.

Keywords: creativity, creative thinking, assessment, learning through play, creative play, learning progressions

Procedia PDF Downloads 125
4956 Right to Information in Egypt and the Prospects of Renegotiating a New Social Order

Authors: Farida Ibrahim

Abstract:

Right to information is the public's right to know through having access to public information held by state bodies. Recognized as a cornerstone in transparent, participatory and open democracies, the right to information is increasingly perceived today as an emerging human right on the international level. While this right is conceptualized in a range of different contexts, the paper focuses on its conceptualization as a force for socio-economic change for disadvantaged groups. The paper's goal is study the instrumental capacity of this right in empowering the public to access state-held information pertinent to their socio-economic rights. In this regard, the paper views the right to information as an inclusionary tool that is capable of spurring inclusion for individuals excluded from the ambits of both: public participation and social justice. For exploring this, the paper examines the advocacy role played by civil society groups in furthering this instrumental capacity. In particular, the paper presents a focused account on the Egyptian case. While Egypt has recently adopted its constitutional provision on access to information, doubts arise on Egyptian citizens' genuine ability to access information held by state bodies. The politico-economic environment, long term culture of bureaucratic secrecy, and legal framework do not provide promising outcomes on access to public information. Within the particular context of the Egyptian case, this paper questions the extent to which civil society in Egypt is capable of instrumentally employing the political opportunity offered by the constitutional entitlement to information access for pressuring public authorities to disclose information. Through four lawsuits brought by civil society groups in Egypt, the paper argues that the right to information has instrumentally provided civil society actors with new domains of mobilization for furthering the realization of social and economic rights, and ultimately, for renegotiating a new social order lining the relationship between the Egyptian state and its citizens marginalized by socio-economic imbalances.

Keywords: civil society, Egypt, right to information, socio-economic rights

Procedia PDF Downloads 276
4955 Causal Modeling of the Glucose-Insulin System in Type-I Diabetic Patients

Authors: J. Fernandez, N. Aguilar, R. Fernandez de Canete, J. C. Ramos-Diaz

Abstract:

In this paper, a simulation model of the glucose-insulin system for a patient undergoing diabetes Type 1 is developed by using a causal modeling approach under system dynamics. The OpenModelica simulation environment has been employed to build the so called causal model, while the glucose-insulin model parameters were adjusted to fit recorded mean data of a diabetic patient database. Model results under different conditions of a three-meal glucose and exogenous insulin ingestion patterns have been obtained. This simulation model can be useful to evaluate glucose-insulin performance in several circumstances, including insulin infusion algorithms in open-loop and decision support systems in closed-loop.

Keywords: causal modeling, diabetes, glucose-insulin system, diabetes, causal modeling, OpenModelica software

Procedia PDF Downloads 326
4954 Queueing Modeling of M/G/1 Fault Tolerant System with Threshold Recovery and Imperfect Coverage

Authors: Madhu Jain, Rakesh Kumar Meena

Abstract:

This paper investigates a finite M/G/1 fault tolerant multi-component machining system. The system incorporates the features such as standby support, threshold recovery and imperfect coverage make the study closer to real time systems. The performance prediction of M/G/1 fault tolerant system is carried out using recursive approach by treating remaining service time as a supplementary variable. The numerical results are presented to illustrate the computational tractability of analytical results by taking three different service time distributions viz. exponential, 3-stage Erlang and deterministic. Moreover, the cost function is constructed to determine the optimal choice of system descriptors to upgrading the system.

Keywords: fault tolerant, machine repair, threshold recovery policy, imperfect coverage, supplementary variable technique

Procedia PDF Downloads 288
4953 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 357
4952 International Service Learning 3.0: Using Technology to Improve Outcomes and Sustainability

Authors: Anthony Vandarakis

Abstract:

Today’s International Service Learning practices require an update: modern technologies, fresh educational frameworks, and a new operating system to accountably prosper. This paper describes a model of International Service Learning (ISL), which combines current technological hardware, electronic platforms, and asynchronous communications that are grounded in inclusive pedagogy. This model builds on the work around collaborative field trip learning, extending the reach to international partnerships across continents. Mobile technology, 21st century skills and summit-basecamp modeling intersect to support novel forms of learning that tread lightly on fragile natural ecosystems, affirm local reciprocal partnership in projects, and protect traveling participants from common yet avoidable cultural pitfalls.

Keywords: International Service Learning, ISL, field experiences, mobile technology, out there in here, summit basecamp pedagogy

Procedia PDF Downloads 169
4951 Structure and Dimensions Of Teacher Professional Identity

Authors: Vilma Zydziunaite, Gitana Balezentiene, Vilma Zydziunaite

Abstract:

Teaching is one of most responsible profession, and it is not only a job of an artisan. This profes-sion needs a developed ability to identify oneself with the chosen teaching profession. Research questions: How teachers characterize their authentic individual professional identity? What factors teachers exclude, which support and limit the professional identity? Aim was to develop the grounded theory (GT) about teacher’s professional identity (TPI). Research methodology is based on Charmaz GT version. Data were collected via semi-structured interviews with the he sample of 12 teachers. Findings. 15 extracted categories revealed that the core of TPI is teacher’s professional calling. Premises of TPI are family support, motives for choos-ing teacher’s profession, teacher’s didactic competence. Context of TPI consists of teacher compli-ance with the profession, purposeful preparation for pedagogical studies, professional growth. The strategy of TPI is based on teacher relationship with school community strengthening. The profes-sional frustration limits the TPI. TPI outcome includes teacher recognition, authority; professional mastership, professionalism, professional satisfaction. Dimensions of TPI GT the past (reaching teacher’s profession), present (teacher’s commitment to professional activity) and future (teacher’s profession reconsideration). Conclusions. The substantive GT describes professional identity as complex, changing and life-long process, which develops together with teacher’s personal identity and is connected to professional activity. The professional decision "to be a teacher" is determined by the interaction of internal (professional vocation, personal characteristics, values, self-image, talents, abilities) and external (family, friends, school community, labor market, working condi-tions) factors. The dimensions of the TPI development includes: the past (the pursuit of the teaching profession), the present (the teacher's commitment to professional activity) and the future (the revi-sion of the teaching profession). A significant connection emerged - as the teacher's professional commitment strengthens (creating a self-image, growing the teacher's professional experience, recognition, professionalism, mastery, satisfaction with pedagogical activity), the dimension of re-thinking the teacher's profession weakens. This proves that professional identity occupies an im-portant place in a teacher's life and it affects his professional success and job satisfaction. Teachers singled out the main factors supporting a teacher's professional identity: their own self-image per-ception, professional vocation, positive personal qualities, internal motivation, teacher recognition, confidence in choosing a teaching profession, job satisfaction, professional knowledge, professional growth, good relations with the school community, pleasant experiences, quality education process, excellent student achievements.

Keywords: grounded theory, teacher professional identity, semi-structured interview, school, students, school community, family

Procedia PDF Downloads 67
4950 The Role of University in High-Level Human Capital Cultivation in China’s West Greater Bay Area

Authors: Rochelle Yun Ge

Abstract:

University has played an active role in the country’s development in China. There has been an increasing research interest on the development of higher education cooperation, talent cultivation and attraction, and innovation in the regional development. The Triple Helix model, which indicates that regional innovation and development can be engendered by collaboration among university, industry and government, is often adopted as research framework. The research using triple helix model emphasizes the active and often leading role of university in knowledge-based economy. Within this framework, universities are conceptualized as key institutions of knowledge production, transmission and transference potentially making critical contributions to regional development. Recent research almost uniformly consistent in indicating the high-level research labours (i.e., doctoral, post-doctoral researchers and academics) as important actors in the innovation ecosystem with their cross-geographical human capital and resources presented. In 2019, the development of the Guangdong-Hong Kong-Macao Greater Bay Area (GBA) was officially launched as an important strategy by the Chinese government to boost the regional development of the Pearl River Delta and to support the realization of “One Belt One Road” strategy. Human Capital formation is at the center of this plan. One of the strategic goals of the GBA development is set to evolve into an international educational hub and innovation center with high-level talents. A number of policies have been issued to attract and cultivate human resources in different GBA cities, in particular for the high-level R&D (research and development) talents such as doctoral and post-doctoral researchers. To better understand the development of high-level talents hub in the GBA, more empirical considerations should be given to explore the approaches of talents cultivation and attraction in the GBA. What remains to explore is the ways to better attract, train, support and retain these talents in the cross-systems context. This paper aims to investigate the role of university in human capital development under China’s national agenda of GBA integration through the lens of universities and actors. Two flagship comprehensive universities are selected to be the cases and 30 interviews with university officials, research leaders, post-doctors and doctoral candidates are used for analysis. In particular, we look at in what ways have universities aligned their strategies and practices to the Chinese government’s GBA development strategy? What strategies and practices have been developed by universities for the cultivation and attraction of high-level research labor? And what impacts the universities have made for the regional development? The main arguments of this research highlights the specific ways in which universities in smaller sub-regions can collaborate in high-level human capital formation and the role policy can play in facilitating such collaborations.

Keywords: university, human capital, regional development, triple-helix model

Procedia PDF Downloads 107
4949 The Unspoken Learning Landscape of Indigenous Peoples (IP) Learners: A Process Documentation and Analysis

Authors: Ailene B. Anonuevo

Abstract:

The aim of the study was to evaluate the quality of life presently available for the IP students in selected schools in the Division of Panabo City. This further explores their future dreams and current status in classes and examines some implications relative to their studies. The study adopted the mixed methodology and used a survey research design as the operational framework for data gathering. Data were collected by self-administered questionnaires and interviews with sixty students from three schools in Panabo City. In addition, this study describes the learners’ background and school climate as variables that might influence their performance in school. The study revealed that an IP student needs extra attention due to their unfavorable learning environment. The study also found out that like any other students, IP learners yearns for a brighter future with the support of our government.

Keywords: IP learners, learning landscape, school climate, quality of life

Procedia PDF Downloads 214
4948 A Framework for Evaluation of Enterprise Architecture Implementation Methodologies

Authors: Babak Darvish Rouhani, Mohd Naz'ri Mahrin, Fatemeh Nikpay, Maryam Khanian Najafabadi

Abstract:

Enterprise Architecture (EA) Implementation Methodologies have become an important part of EA projects. Several implementation methodologies have been proposed, as a theoretical and practical approach, to facilitate and support the development of EA within an enterprise. A significant question when facing the starting of EA implementation is deciding which methodology to utilize. In order to answer this question, a framework with several criteria is applied in this paper for the comparative analysis of existing EA implementation methodologies. Five EA implementation methodologies including: EAP, TOGAF, DODAF, Gartner, and FEA are selected in order to compare with proposed framework. The results of the comparison indicate that those methodologies have not reached a sufficient maturity as whole due to lack of consideration on requirement management, maintenance, continuum, and complexities in their process. The framework has also ability for the evaluation of any kind of EA implementation methodologies.

Keywords: enterprise architecture, EAIM, evaluating EAIM, framework for evaluation, enterprise architecture implementation methodology

Procedia PDF Downloads 375
4947 Understanding Sixteen Basic Desires and Modern Approaches to Agile Team Motivation: Case Study

Authors: Anna Suvorova

Abstract:

Classical motivation theories hold that there are two kinds of motivation, intrinsic and extrinsic. Leaders are looking for effective motivation techniques, but frequently external influences do not work or, even worse, reduce team productivity. We see only the tip of the iceberg -human behavior. However, beneath the surface of the water are factors that directly affect our behavior -desires. Believing that employees need to be motivated, companies design a motivation system based on the principle: do it and get a reward. As a matter of fact, we all have basic desires. Everybody is motivated but to different extents. Following the principle "intrinsic motivation over extrinsic rewards", we need to create an environment that will support intrinsic motivation and potential of employees, and team, rather than individual work.

Keywords: motivation profile, motivation techniques, agile HR, basic desires, agile people, human behavior, people management

Procedia PDF Downloads 107
4946 Silencing the Protagonist: Gender and Rape Depiction in Pakistani Dramas

Authors: Saman R. Khan, Najma Sadiq

Abstract:

Silencing of opinions is an important aspect of Spiral of Silence theory however its applicability in rape-themed dramas requires investigation. This study focuses on the portrayal of female rape victim protagonists in Pakistani dramas and the factors influencing their behavior after rape. A quantitative content analysis was conducted on two prime-time dramas which directly dealt with female rape victims. Results indicate that the female protagonists who faced rape are shown as silent and submissive characters who are unable to communicate about their ordeal due to fear of social isolation. These findings lend support to the Spiral of Silence theory and indicate that the theory’s basic elements (inability to express opinions and fear of social isolation) exist in these TV dramas.

Keywords: gender stereotyping, rape victims, the spiral of silence, TV dramas

Procedia PDF Downloads 164
4945 Getting to Know ICU Nurses and Their Duties

Authors: Masih Nikgou

Abstract:

ICU nurses or intensive care nurses are highly specialized and trained healthcare personnel. These nurses provide nursing care for patients with life-threatening illnesses or conditions. They provide the experience, knowledge and specialized skills that patients need to survive and recover. Intensive care nurses (ICU) are trained to make momentary decisions and act quickly when the patient's condition changes. Their primary work environment is in the hospital in intensive care units. Typically, ICU patients require a high level of care. ICU nurses work in challenging and complex fields in their nursing profession. They have the primary duty of caring for and saving patients who are fighting for their lives. Intensive care (ICU) nurses are highly trained to provide exceptional care to patients who depend on 24/7 nursing care. A patient in the ICU is often equipped with a ventilator, intubated and connected to several life support machines and medical equipment. Intensive Care Nurses (ICU) have full expertise in considering all aspects of bringing back their patients. Some of the specific responsibilities of ICU nurses include (a) Assessing and monitoring the patient's progress and identifying any sudden changes in the patient's medical condition. (b) Administration of drugs intravenously by injection or through gastric tubes. (c) Provide regular updates on patient progress to physicians, patients, and their families. (d) According to the clinical condition of the patient, perform the approved diagnostic or treatment methods. (e) In case of a health emergency, informing the relevant doctors. (f) To determine the need for emergency interventions, evaluate laboratory data and vital signs of patients. (g) Caring for patient needs during recovery in the ICU. (h) ICU nurses often provide emotional support to patients and their families. (i) Regulating and monitoring medical equipment and devices such as medical ventilators, oxygen delivery devices, transducers, and pressure lines. (j) Assessment of pain level and sedation needs of patients. (k) Maintaining patient reports and records. As the name suggests, critical care nurses work primarily in ICU health care units. ICUs are completely healthy and have proper lighting with strict adherence to health and safety from medical centers. ICU nurses usually move between the intensive care unit, the emergency department, the operating room, and other special departments of the hospital. ICU nurses usually follow a standard shift schedule that includes morning, afternoon, and night schedules. There are also other relocation programs depending on the hospital and region. Nurses who are passionate about data and managing a patient's condition and outcomes typically do well as ICU nurses. An inquisitive mind and attention to processes are equally important. ICU nurses are completely compassionate and are not afraid to advocate for their patients and family members. who are distressed.

Keywords: nursing, intensive care unit, pediatric intensive care unit, mobile intensive care unit, surgical intensive care unite

Procedia PDF Downloads 69
4944 On Modeling Data Sets by Means of a Modified Saddlepoint Approximation

Authors: Serge B. Provost, Yishan Zhang

Abstract:

A moment-based adjustment to the saddlepoint approximation is introduced in the context of density estimation. First applied to univariate distributions, this methodology is extended to the bivariate case. It then entails estimating the density function associated with each marginal distribution by means of the saddlepoint approximation and applying a bivariate adjustment to the product of the resulting density estimates. The connection to the distribution of empirical copulas will be pointed out. As well, a novel approach is proposed for estimating the support of distribution. As these results solely rely on sample moments and empirical cumulant-generating functions, they are particularly well suited for modeling massive data sets. Several illustrative applications will be presented.

Keywords: empirical cumulant-generating function, endpoints identification, saddlepoint approximation, sample moments, density estimation

Procedia PDF Downloads 158
4943 Blockchain-Based Decentralized Architecture for Secure Medical Records Management

Authors: Saeed M. Alshahrani

Abstract:

This research integrated blockchain technology to reform medical records management in healthcare informatics. It was aimed at resolving the limitations of centralized systems by establishing a secure, decentralized, and user-centric platform. The system was architected with a sophisticated three-tiered structure, integrating advanced cryptographic methodologies, consensus algorithms, and the Fast Healthcare Interoperability Resources (HL7 FHIR) standard to ensure data security, transaction validity, and semantic interoperability. The research has profound implications for healthcare delivery, patient care, legal compliance, operational efficiency, and academic advancements in blockchain technology and healthcare IT sectors. The methodology adapted in this research comprises of Preliminary Feasibility Study, Literature Review, Design and Development, Cryptographic Algorithm Integration, Modeling the data and testing the system. The research employed a permissioned blockchain with a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm and Ethereum-based smart contracts. It integrated advanced cryptographic algorithms, role-based access control, multi-factor authentication, and RESTful APIs to ensure security, regulate access, authenticate user identities, and facilitate seamless data exchange between the blockchain and legacy healthcare systems. The research contributed to the development of a secure, interoperable, and decentralized system for managing medical records, addressing the limitations of the centralized systems that were in place. Future work will delve into optimizing the system further, exploring additional blockchain use cases in healthcare, and expanding the adoption of the system globally, contributing to the evolution of global healthcare practices and policies.

Keywords: healthcare informatics, blockchain, medical records management, decentralized architecture, data security, cryptographic algorithms

Procedia PDF Downloads 52
4942 Regulating Transnational Corporations and Protecting Human Rights: Analyzing the Efficiency of International Legal Framework

Authors: Stellina Jolly

Abstract:

July 18th to August 19th 2013 has gone down in the history of India for undertaking the country’s first environment referendum. The Supreme Court had ruled that the Vedanta Group's bauxite mining project in the Niyamgiri Hills of Orissa will have to get clearance from the gram sabha, which will consider the cultural and religious rights of the tribals and forest dwellers living in Rayagada and Kalahandi districts. In the Niyamgiri hills, people of small tribal hamlets were asked to voice their opinion on bauxite mining in their habitat. The ministry has reiterated its stand that mining cannot be allowed on the Niyamgiri hills because it will affect the rights of the Dongria Kondhs. The tribal person who occupies the Niyamgiri Hills in Eastern India accomplished their first success in 2010 in their struggle to protect and preserve their existence, culture and land against Vedanta a London-based mining giant. In August, 2010 Government of India revoked permission for Vedanta Resources to mine bauxite from hills in Orissa State where the Dongria Kondh live as forest dwellers. This came after various protests and reports including amnesty report wherein it highlighted that an alumina refinery in eastern India operated by a subsidiary of mining company. Vedanta was accused of causing air and water pollution that threatens the health of local people and their access to water. The abuse of human rights by corporate is not a new issue it has occurred in Africa, Asia and other parts of the world. Paper focuses on the instances and extent of human right especially in terms of environment violations by corporations. Further Paper details on corporations and sustainable development. Paper finally comes up with certain recommendation including call for a declaration by United Nations on Corporate environment Human Rights Liability.

Keywords: environment, corporate, human rights, sustainable development

Procedia PDF Downloads 473
4941 Supervised Learning for Cyber Threat Intelligence

Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk

Abstract:

The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.

Keywords: threat information sharing, supervised learning, data classification, performance evaluation

Procedia PDF Downloads 144
4940 Strategic Policy Formulation to Ensure the Atlantic Forest Regeneration

Authors: Ramon F. B. da Silva, Mateus Batistella, Emilio Moran

Abstract:

Although the existence of two Forest Transition (FT) pathways, the economic development and the forest scarcity, there are many contexts that shape the model of FT observed in each particular region. This means that local conditions, such as relief, soil quality, historic land use/cover, public policies, the engagement of society in compliance with legal regulations, and the action of enforcement agencies, represent dimensions which combined, creates contexts that enable forest regeneration. From this perspective we can understand the regeneration process of native vegetation cover in the Paraíba Valley (Forest Atlantic biome), ongoing since the 1960s. This research analyzed public information, land use/cover maps, environmental public policies, and interviewed 17 stakeholders from the Federal and State agencies, municipal environmental and agricultural departments, civil society, farmers, aiming comprehend the contexts behind the forest regeneration in the Paraíba Valley, Sao Paulo State, Brazil. The first policy to protect forest vegetation was the Forest Code n0 4771 of 1965, but this legislation did not promote the increase of forest, just the control of deforestation, not enough to the Atlantic Forest biome that reached its highest pick of degradation in 1985 (8% of Atlantic Forest remnants). We concluded that the Brazilian environmental legislation acted in a strategic way to promote the increase of forest cover (102% of regeneration between 1985 and 2011) from 1993 when the Federal Decree n0 750 declared the initial and advanced stages of secondary succession protected against any kind of exploitation or degradation ensuring the forest regeneration process. The strategic policy formulation was also observed in the Sao Paulo State law n0 6171 of 1988 that prohibited the use of fire to manage agricultural landscape, triggering a process of forest regeneration in formerly pasture areas.

Keywords: forest transition, land abandonment, law enforcement, rural economic crisis

Procedia PDF Downloads 549
4939 An Overview of Nano-Particles Effect on Mechanical Properties of Composites

Authors: Ganiyu I. Lawal, Olatunde I. Sekunowo, Stephen I. Durowaye

Abstract:

Composites depending on the nature of their constituents and mode of production are regarded as one of the advanced materials that drive today’s technology. This paper attempts a short review of the subject matter with a general aim of pushing to the next level the frontier of knowledge as it impacts the technology of nano-particles manufacturing. The objectives entail an effort to; aggregate recent research efforts in this field, analyse research findings and observations, streamline research efforts and support industry in taking decision on areas of fund deployment. It is envisaged that this work will serve as a quick hand-on compendium material for researchers in this field and a guide to relevant government departments wishing to fund a research whose outcomes have the potential of improving the nation’s GDP.

Keywords: advanced materials, composites, mechanical properties, nano-particles

Procedia PDF Downloads 272
4938 General and Sport Specific Fitness Testing Practices: Global Developments

Authors: Peter Smolianov, Jed Smith, Lisa Chen, Steven Dion, Christopher Schoen, Jaclyn Norberg

Abstract:

This study compared general conditioning and sport specific fitness tests used in China, European Union (EU), Russia, and the United States. A constant content comparison method was used to identify the differences. Data from the study indicated that there were shared test components, including aerobic fitness, muscular strength, endurance, and flexibility. However, the testing components and items, as well as the cut-off values of the analyzed tests varied by country for the same gender and age. Culturally unique methods of testing and preparing for the tests were identified. Additionally, evidence revealed support for lifelong fitness and long-term sport participation through comprehensive fitness and wellness guidelines for different age groups and through new internet-based technologies.

Keywords: fitness testing, global trends, new developments, worldwide comparison

Procedia PDF Downloads 153
4937 Machine Learning for Disease Prediction Using Symptoms and X-Ray Images

Authors: Ravija Gunawardana, Banuka Athuraliya

Abstract:

Machine learning has emerged as a powerful tool for disease diagnosis and prediction. The use of machine learning algorithms has the potential to improve the accuracy of disease prediction, thereby enabling medical professionals to provide more effective and personalized treatments. This study focuses on developing a machine-learning model for disease prediction using symptoms and X-ray images. The importance of this study lies in its potential to assist medical professionals in accurately diagnosing diseases, thereby improving patient outcomes. Respiratory diseases are a significant cause of morbidity and mortality worldwide, and chest X-rays are commonly used in the diagnosis of these diseases. However, accurately interpreting X-ray images requires significant expertise and can be time-consuming, making it difficult to diagnose respiratory diseases in a timely manner. By incorporating machine learning algorithms, we can significantly enhance disease prediction accuracy, ultimately leading to better patient care. The study utilized the Mask R-CNN algorithm, which is a state-of-the-art method for object detection and segmentation in images, to process chest X-ray images. The model was trained and tested on a large dataset of patient information, which included both symptom data and X-ray images. The performance of the model was evaluated using a range of metrics, including accuracy, precision, recall, and F1-score. The results showed that the model achieved an accuracy rate of over 90%, indicating that it was able to accurately detect and segment regions of interest in the X-ray images. In addition to X-ray images, the study also incorporated symptoms as input data for disease prediction. The study used three different classifiers, namely Random Forest, K-Nearest Neighbor and Support Vector Machine, to predict diseases based on symptoms. These classifiers were trained and tested using the same dataset of patient information as the X-ray model. The results showed promising accuracy rates for predicting diseases using symptoms, with the ensemble learning techniques significantly improving the accuracy of disease prediction. The study's findings indicate that the use of machine learning algorithms can significantly enhance disease prediction accuracy, ultimately leading to better patient care. The model developed in this study has the potential to assist medical professionals in diagnosing respiratory diseases more accurately and efficiently. However, it is important to note that the accuracy of the model can be affected by several factors, including the quality of the X-ray images, the size of the dataset used for training, and the complexity of the disease being diagnosed. In conclusion, the study demonstrated the potential of machine learning algorithms for disease prediction using symptoms and X-ray images. The use of these algorithms can improve the accuracy of disease diagnosis, ultimately leading to better patient care. Further research is needed to validate the model's accuracy and effectiveness in a clinical setting and to expand its application to other diseases.

Keywords: K-nearest neighbor, mask R-CNN, random forest, support vector machine

Procedia PDF Downloads 140