Search results for: early detection of violence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7359

Search results for: early detection of violence

3249 A Fuzzy Logic Based Health Assesment Platform

Authors: J. Al-Dmour, A. Sagahyroon, A. Al-Ali, S. Abusnana

Abstract:

Radio Frequency Based Identification Systems have emerged as one of the possible valuable solutions that can be utilized in healthcare systems. Nowadays, RFID tags are available with built-in human vital signs sensors such as Body Temperature, Blood Pressure, Heart Rate, Blood Sugar level and Oxygen Saturation in Blood. This work proposes the design, implementation, and testing of an integrated mobile RFID-based health care system. The system consists of a wireless mobile vital signs data acquisition unit (RFID-DAQ) integrated with a fuzzy-logic–based software algorithm to monitor and assess patients conditions. The system is implemented and tested in ‘Rashid Center for Diabetes and Research’, Ajman, UAE. System testing results are compared with the Modified Early Warning System (MEWS) that is currently used in practice. We demonstrate that the proposed and implemented system exhibits an accuracy level that is comparable and sometimes better than the widely adopted MEWS system.

Keywords: healthcare, fuzzy logic, MEWS, RFID

Procedia PDF Downloads 353
3248 Infection of Phlebotomus Sergenti with Leishmania Tropica in a Classical Focus of Leishmania Major in Tunisia

Authors: Kaouther Jaouadi, Jihene Bettaieb, Amira Bennour, Ghassen Kharroubi, Sadok Salem, Afif Ben Salah

Abstract:

In Tunisia, chronic cutaneous leishmaniasis due to Leishmania (L) tropica is an important health problem. Its spreading has not been fully elucidated. Information on sandfly vectors, as well as their associated Leishmania species, is of paramount importance since vector dispersion is one of the major factors responsible for pathogen dissemination. In total, 650 sandflies were captured between June and August 2015 using sticky paper traps in the governorate of Sidi Bouzid, a classical focus of L. major in the Central-West of Tunisia. Polymerase chain reaction-restriction fragment length polymorphism analysis of the internal transcribed spacer 1 and sequencing were used for Leishmania detection and identification. Ninety-seven unfed females were tested for the presence of Leishmania parasite DNA. Six Phlebotomus sergenti were found positive for L. tropica. This finding enhances the understanding of the cycle extension of L. tropica outside its original focus of Tataouine in the South-East of the country.

Keywords: cutaneous leishmaniasis, Leishmania tropica, sandflies, Tunisia

Procedia PDF Downloads 160
3247 Influences of Victimization Experiences on Delinquency: Comparison between Young Offenders and Non-Offenders

Authors: Yoshihiro Horio

Abstract:

Many young offenders grow up in difficult environments. It has often been suggested that many young offenders are victims of abuse. However, there were restricted to abuse or family’s problem. Little research has examined data on ‘multiple victimization’ experiences of young offenders. Thus, this study investigated the victimization experiences of young offenders, including child abuse at home, bullying at school, and crime in the community. Specifically, the number of victimization experiences of young offenders was compared with those of non-delinquents at home, school, and in the community. It was found that young offenders experienced significantly more victimization than non-delinquents. Additionally, the influence of childhood victimization on later misconduct and/or delinquency was examined, then it was founded that victimization experiences to be a risk factor for subsequent delinquency. The hierarchical multiple regression analysis showed that young offenders who had a strong emotional reaction to their experience of abuse began their misconduct at an earlier age. If juveniles start their misconduct early, the degree of delinquency will increase. The anger of young offenders was stronger than that of non-delinquents. A strong emotion of anger may be related to juvenile delinquency.

Keywords: abuse, bullying, delinquency, victimization, young offenders

Procedia PDF Downloads 248
3246 Developing a Comprehensive Model for the Prevention of Tension Neck Syndrome: A Focus on Musculoskeletal Disorder Prevention Strategies

Authors: Behnaz Sohani, Ifeoluwa Joshua Adigun, Amir Rahmani, Khaled Goher

Abstract:

This paper provides initial results on the efficacy of the designed ergonomic-oriented neck support to mitigate and alleviate tension neck syndrome musculoskeletal disorder. This is done using both simulations and measurements. Tension Neck Syndrome Musculoskeletal Disorder (TNS MSD) causes discomfort in the muscles around the neck and shoulder. TNS MSD is one of the leading causes of early retirement. This research focuses on the design of an adaptive neck supporter by integrating a soft actuator massager to help deliver a soothing massage. The massager and adaptive neck supporter prototype were validated by finite element analysis prior to fabrication to envisage the feasibility of the design concept. Then a prototype for the massager was fabricated and tested for concept validation. Future work will be focused on fabricating the full-scale prototype and upgrading and optimizing the design concept for the adaptive neck supporter.

Keywords: adaptive neck supporter, tension neck syndrome, musculoskeletal disorder, soft actuator massager, soft robotics

Procedia PDF Downloads 115
3245 Effect of Pre-Construction on Construction Schedule and Client Loyalty

Authors: Jong Hoon Kim, Hyun-Soo Lee, Moonseo Park, Min Jeong, Inbeom Lee

Abstract:

Pre-construction is essential in achieving the success of a construction project. Due to the early involvement of project participants in the construction phase, project managers are able to plan ahead and solve issues well in advance leading to the success of the project and the satisfaction of the client. This research utilizes quantitative data derived from construction management projects in order to identify the relationship between pre-construction, construction schedule, and client satisfaction. A total of 65 construction projects and 93 clients were investigated for this research in an attempt to identify (a) the relationship between pre-construction and schedule reduction, and (b) pre-construction and client loyalty. Based on the quantitative analysis, this research was able to establish a negative correlation based on 65 construction projects between pre-construction and project schedule existed. This finding represents that the more pre-construction is performed for a certain project, the overall construction schedule decreased. Then, to determine the relationship between pre-construction and client satisfaction, Net Promoter Score (NPS) of 93 clients from the 65 projects was utilized. Pre-construction and NPS was further analyzed and a positive correlation was found between the two. This infers that clients tend to be more satisfied with projects with higher ratio of pre-construction than those projects with less pre-construction.

Keywords: client loyalty, NPS, pre-construction, schedule reduction

Procedia PDF Downloads 365
3244 A Statistical Energy Analysis Model of an Automobile for the Prediction of the Internal Sound Pressure Level

Authors: El Korchi Ayoub, Cherif Raef

Abstract:

Interior noise in vehicles is an essential factor affecting occupant comfort. Over recent decades, much work has been done to develop simulation tools for vehicle NVH. At the medium high-frequency range, the statistical energy analysis method (SEA) shows significant effectiveness in predicting noise and vibration responses of mechanical systems. In this paper, the evaluation of the sound pressure level (SPL) inside an automobile cabin has been performed numerically using the statistical energy analysis (SEA) method. A test car cabin was performed using a monopole source as a sound source. The decay rate method was employed to obtain the damping loss factor (DLF) of each subsystem of the developed SEA model. These parameters were then used to predict the sound pressure level in the interior cabin. The results show satisfactory agreement with the directly measured SPL. The developed SEA vehicle model can be used in early design phases and allows the engineer to identify sources contributing to the total noise and transmission paths.

Keywords: SEA, SPL, DLF, NVH

Procedia PDF Downloads 95
3243 A Retrospective Study - Demographical, Clinical and Pharmacological Correlate of Seclusion, Self-Discharge, Physical Aggression and Use of PRN Psychotropics Within The First 72 Hours Of Admission in The Acute Psychiatric Unit in Saudi Arabia

Authors: Asma AlAmri, Ahmed Hassab Errasoul

Abstract:

Background & Objectives: Psychiatric disorders are common, affecting approximately one of five adults (17.6%) of the population. While most patients can be successfully treated as outpatients, admission to psychiatric wards is required during relapses or as part of crisis intervention. The first 72h of admission could be particularly critical due to increased risk of physical violence, non-medical discharge and absconding. Many patients requiring interventions such as seclusion, physical restrain, PRN psychotropic medications. This study aims to investigate the relationship between demographical, clinical and pharmacological factors in one hand and certain outcomes (physical aggression, use of PRN medications, need for seclusions and non-medical discharges) within the first 72hours of admission to acute psychiatric wards in KKUH/Riyadh Methods: All admissions to psychiatric wards over a 20 month period, between (May 2015- January 2017) were included. Data was collected on demographics, diagnosis, psychotropic medications prescription, documented physical aggression, and seclusion, self-discharge and absconding. Results: 134 males and 171 females were admitted over the study period. Mean age was 34.2 years (SD 11.96).48.9% (n=149) were single and most patients (n=198) were either unemployed or in educations. Bipolar disorder was the most frequent diagnosis recorded on admission (39.3%, n=120); followed by Schizophrenia and related disorders (34.8%; n=106). Most patients (77.4%, n= 236) received regular psychotropic medications on admission. Vis a vis, 223 patients (73%) received PRN medications. Nominal regression model revealed positive relationship between “no psychotropics prescribed on admission” and self-discharge in women but not in men. No statistically significant relationship was found between age, gender, admission diagnosis and use of regular psychotropic medications on admission and need for seclusion, time spent in seclusion, documented physical aggression and use of PRN medications. Conclusion: Contrary to what is expected, our study does not show association between gender, physical aggression and need for seclusion. This could be due to poor documentation practices by nursing staff in male ward comparing with those in the female ward. Use of PRN psychotropics in the first 72 hours of admission was quite high possibly leading to a “ceiling effect”. A limitation of this study is the retrospective data collection.

Keywords: discharge against medical advice, physical aggression, psychotropics, seclusion

Procedia PDF Downloads 134
3242 The Late Bronze Age Archeometallurgy of Copper in Mountainous Colchis (Lechkhumi), Georgia

Authors: Nino Sulava, Brian Gilmour, Nana Rezesidze, Tamar Beridze, Rusudan Chagelishvili

Abstract:

Studies of ancient metallurgy are a subject of worldwide current interest. Georgia with its famous early metalworking traditions is one of the central parts of in the Caucasus region. The aim of the present study is to introduce the results of archaeometallurgical investigations being undertaken in the mountain region of Colchis, Lechkhumi (the Tsageri Municipality of western Georgia) and establish their place in the existing archaeological context. Lechkhumi (one of the historic provinces of Georgia known from Georgian, Greek, Byzantine and Armenian written sources as Lechkhumi/Skvimnia/Takveri) is the part of the Colchian mountain area. It is one of the important but little known centres of prehistoric metallurgy in the Caucasian region and of Colchian Bronze Age culture. Reconnaissance archaeological expeditions (2011-2015) revealed significant prehistoric metallurgical sites in Lechkhumi. Sites located in the vicinity of Dogurashi Village (Tsageri Municipality) have become the target area for archaeological excavations. During archaeological excavations conducted in 2016-2018 two archaeometallurgical sites – Dogurashi I and Dogurashi II were investigated. As a result of an interdisciplinary (archaeological, geological and geophysical) survey, it has been established that at both prehistoric Dogurashi mountain sites, it was copper that was being smelted and the ore sources are likely to be of local origin. Radiocarbon dating results confirm they were operating between about the 13th and 9th century BC. More recently another similar site has been identified in this area (Dogurashi III), and this is about to undergo detailed investigation. Other prehistoric metallurgical sites are being located and investigated in the Lechkhumi region as well as chance archaeological finds (often in hoards) – copper ingots, metallurgical production debris, slag, fragments of crucibles, tuyeres (air delivery pipes), furnace wall fragments and other related waste debris. Other chance finds being investigated are the many copper, bronze and (some) iron artefacts that have been found over many years. These include copper ingots, copper, bronze and iron artefacts such as tools, jewelry, and decorative items. These show the important but little known or understood the role of Lechkhumi in the late Bronze Age culture of Colchis. It would seem that mining and metallurgical manufacture form part of the local agricultural yearly lifecycle. Colchian ceramics have been found and also evidence for artefact production, small stone mould fragments and encrusted material from the casting of a fylfot (swastika) form of Colchian bronze buckle found in the vicinities of the early settlements of Tskheta and Dekhviri. Excavation and investigation of previously unknown archaeometallurgical sites in Lechkhumi will contribute significantly to the knowledge and understanding of prehistoric Colchian metallurgy in western Georgia (Adjara, Guria, Samegrelo, and Svaneti) and will reveal the importance of this region in the study of ancient metallurgy in Georgia and the Caucasus. Acknowledgment: This work has been supported by the Shota Rustaveli National Science Foundation (grant FR # 217128).

Keywords: archaeometallurgy, Colchis, copper, Lechkhumi

Procedia PDF Downloads 138
3241 Cytotoxicity and Apoptosis Activity of Areca catechu Linn. Extract as Natural Anticancer Agent for Oral Squamous Cell Carcinoma

Authors: Liza Meutia Sari, Gus Permana Subita, Elza Ibrahim Auerkari

Abstract:

Background: Many herbs have been discovered to be potential sources of anticancer drugs. Biji Pinang or areca nut (Areca catechu Linn.) has a high content of phenolics and flavonoids, and which is related to antioxidant activity. However, data on its effects on oral squamous cell carcinoma is not available. Objectives: Identification of the cytotoxicity and apoptosis activity in HSC-2 and HSC-3. Methods: The areca nut was extracted by ethanol 96%, MTS assay and apoptosis activity with flow cytometry. Results: The extract of areca nut showed higher toxicity on HSC-3 cell compared to HSC-2. The IC₅₀ of HSC-3 was 164.06 μg/ml vs. 629.50 μg/ml in HSC-2. There was an increase in late apoptosis percentage after 24 and 48 hours in HSC-2. There was a significant increase in early apoptosis percentage after 24 hours and late in 48 hours in HSC-3. Conclusion: The antioxidant activity of the extract of areca nut might be associated with the selective cytotoxicity on HSC-2 and HSC-3. Apoptosis is the major cell death mechanism involved. The areca nut may play an important role in anticancer herb medicine.

Keywords: areca nut, cytotoxicity, apoptosis, oral carcinoma

Procedia PDF Downloads 233
3240 Automatic Detection of Proliferative Cells in Immunohistochemically Images of Meningioma Using Fuzzy C-Means Clustering and HSV Color Space

Authors: Vahid Anari, Mina Bakhshi

Abstract:

Visual search and identification of immunohistochemically stained tissue of meningioma was performed manually in pathologic laboratories to detect and diagnose the cancers type of meningioma. This task is very tedious and time-consuming. Moreover, because of cell's complex nature, it still remains a challenging task to segment cells from its background and analyze them automatically. In this paper, we develop and test a computerized scheme that can automatically identify cells in microscopic images of meningioma and classify them into positive (proliferative) and negative (normal) cells. Dataset including 150 images are used to test the scheme. The scheme uses Fuzzy C-means algorithm as a color clustering method based on perceptually uniform hue, saturation, value (HSV) color space. Since the cells are distinguishable by the human eye, the accuracy and stability of the algorithm are quantitatively compared through application to a wide variety of real images.

Keywords: positive cell, color segmentation, HSV color space, immunohistochemistry, meningioma, thresholding, fuzzy c-means

Procedia PDF Downloads 214
3239 Novel Ultrasensitive Point of Care Device for Diagnosis of Human Schistosomiasis Mansoni

Authors: Ibrahim Aly, Waleed Elawamy, Hanan Taher, Amira Matar

Abstract:

Schistosomiasis is infection with blood flukes of the genus Schistosoma, which are acquired trans-cutaneously by swimming or wading in contaminated freshwater. The present study was proposed to produce ultra-sensitive, field-friendly high-throughput rapid immunochromatography diagnostic device for accurate detection of asymptomatic parasite carriers in schistosomiasis pre-elimination settings.For assessing diagnostic potential of rapid device, 50 blood samples from patients with schistosomiasis mansoni, 29 other proven parasitic diseases and 25 blood samples as negative control were from healthy individuals were used. The sensitivity of Quantitative antigen-capture nano-ELISAwas 82 %, and specificity was 87.1 %, where the sensitivity of Nano Dot- ELISA was 86 % and specificity was 90.7 %. The sensitivity of diagnostic device was 78 % and specificity was 85.2 %, with PPV and NPV of 86.2 % and 83.1 %, respectively.The Point of care device resulted in a good performance for the diagnosis of low-intensity infections, it was able to identify 19 out of 25 (76 %) individuals with ⩽7 eggs, 10 out of 14 individuals (71.4 %) with 11–99 eggs and 100 % of individuals with 100–399 eggs.

Keywords: schistosomiasis, immunochromatography, naon-dot-ELISa, diagnostis device

Procedia PDF Downloads 80
3238 A Comparative and Mixed Methods Study of Possible Selves of Adolescent Boys in an Observation Home and a Children's Home in India

Authors: Apurva Sapra

Abstract:

The aim of this research was to study and compare the nature of expected, feared and hoped-for selves in institutionalized adolescent boys in two residential settings – an observation home with children in conflict with the law, and a children’s home with children in need of care and protection. The study uses a concurrent mixed methods design, in which eight adolescent boys from each group, aged 13-17, were asked to respond to a questionnaire, followed by an in-depth interview. The questionnaire looked into the total scores on current, probable and hoped-for/feared positive and negative self-descriptors. Possible selves of both groups were found to be influenced by their unique histories, such as with their experience of violence, interaction with the police and emphasis given on education. Expected selves and hoped-for selves were similar within the two groups. However, they were more concrete and attainable in the observation home and more ambitious in the children’s home. Quantitative results showed that on the positive self-descriptors, the participants in the observation home had a slightly lower total score on the current parameter as on the probable and hoped-for parameters. The participants in the children’s home showed similar results on current and probable positive self-descriptors, with higher scores on the hoped-for parameter. For most of the negative self-descriptors, the current score for the observation home group was lower than the expected score, and for the children’s home group, they were feared slightly more than they were expected. Along with the nature of possible selves, the study also looked into threats and support to desired and feared possible selves, as well as strategies to attain the desired possible selves and avoid feared possible selves. While threats to possible selves were identified as external and internal in both groups, the participants in the children’s home tended to identify threats as external. The categories of support were similar across the two groups, although the nature of support provided differed. Strategies adopted by participants in the observation home could be clearly divided as past, present and future strategies, while those adopted by participants in the children’s home had an overlap with past and future strategies. The institution was perceived as having a negative influence for the future in the observation home group, but positive in the children’s home group. Limitations of the study and recommendations for future research, policy setting and the counselling profession are discussed.

Keywords: adolescents, expected self, feared self, hoped-for self, institutions, possible selves

Procedia PDF Downloads 242
3237 An Auxiliary Technique for Coronary Heart Disease Prediction by Analyzing Electrocardiogram Based on ResNet and Bi-Long Short-Term Memory

Authors: Yang Zhang, Jian He

Abstract:

Heart disease is one of the leading causes of death in the world, and coronary heart disease (CHD) is one of the major heart diseases. Electrocardiogram (ECG) is widely used in the detection of heart diseases, but the traditional manual method for CHD prediction by analyzing ECG requires lots of professional knowledge for doctors. This paper introduces sliding window and continuous wavelet transform (CWT) to transform ECG signals into images, and then ResNet and Bi-LSTM are introduced to build the ECG feature extraction network (namely ECGNet). At last, an auxiliary system for coronary heart disease prediction was developed based on modified ResNet18 and Bi-LSTM, and the public ECG dataset of CHD from MIMIC-3 was used to train and test the system. The experimental results show that the accuracy of the method is 83%, and the F1-score is 83%. Compared with the available methods for CHD prediction based on ECG, such as kNN, decision tree, VGGNet, etc., this method not only improves the prediction accuracy but also could avoid the degradation phenomenon of the deep learning network.

Keywords: Bi-LSTM, CHD, ECG, ResNet, sliding window

Procedia PDF Downloads 95
3236 Criminal Protection Objectivity of the Child's Right to Life and Physical and Psychological Safety

Authors: Hezha Hewa, Taher Sur

Abstract:

Nowadays, child affairs is a matter of both national and international interests. This issue is regarded a vital topic for various scientific fields across ages, and for all the communities without exception. However, the nature of child caring may vary due to the verities in science perspectives. So, considering child's affairs from different perspectives is helpful to have a complementary image about this matter. The purpose behind selecting this topic is to keep a balance between the victim on the one hand, and the guardian and the offender on the other hand, (i.e.) to avoid any kind of excessiveness either in the protection of the child and its rights not in the punishment of the offender. This is achieved through considering various legal materials in the Iraqi legislation and in the comparative legislations that are concerned with the child's issue and the extent to which the child makes use of these rights. The scope of this study involves the crimes that are considered as aggressions against the child's right to life, and the crimes that are dangerous to their physical and psychological safety. So, this study comprehensively considers the intentional murder of child, child murder to avoid disgrace, child kidnapping, child abandonment, physical abuse for the sake of punishment or not, child circumcision, verbal violence, and abstaining from leaving a child with a person who has the right of custody. This study ends with the most significant concluding points that have been derived throughout this study, which are: Unlike the Iraqi legislation, the Egyptian legislation defines the child in the Article 2 of the Child Law No. 12 of 1996 amended by the Law No. 126 of 2008 that the child is a person who does not exceed 18 years of age. Some legislation does not provide special criminal protection for child intentional murder, as in the Iraqi and the Egyptian legislation. However, some others have provided special criminal protection for a child, as in French and Syrian legislations. Child kidnapping is regarded as one of the most dangerous crimes that affects the child and the family as well, as it may expose the child's life to danger or to death. The most significant recommendations from the researcher are: The Iraqi legislation is recommended to take the necessary measures to establish a particular legislation for the child by including all the legal provisions that are associated with this weak creature, and make use of the Egyptian legislator’s experience as a pioneer in this respect. Both the Iraqi legislation and the Egyptian legislation are recommended to enact special laws to protect a child from the crimes of intentional murder, as the crime of child murder is currently subjected to the same provisions consider for adult murder.

Keywords: child, criminal, penal, law, safety

Procedia PDF Downloads 264
3235 Highly Sensitive and Selective H2 Gas Sensor Based on Pd-Pt Decorated Nanostructured Silicon Carbide Thin Films for Extreme Environment Application

Authors: Satyendra Mourya, Jyoti Jaiswal, Gaurav Malik, Brijesh Kumar, Ramesh Chandra

Abstract:

Present work describes the fabrication and sensing characteristics of the Pd-Pt decorated nanostructured silicon carbide (SiC) thin films on anodized porous silicon (PSi) substrate by RF magnetron sputtering. The gas sensing performance of Pd-Pt/SiC/PSi sensing electrode towards H2 gas under low (10–400 ppm) detection limit and high operating temperature regime (25–600 °C) were studied in detail. The chemiresistive sensor exhibited high selectivity, good sensing response, fast response/recovery time with excellent stability towards H2 at high temperature. The selectivity measurement of the sensing electrode was done towards different oxidizing and reducing gases and proposed sensing mechanism discussed in detail. Therefore, the investigated Pd-Pt/SiC/PSi structure may be a highly sensitive and selective hydrogen gas sensing electrode for deployment in extreme environment applications.

Keywords: RF Sputtering, silicon carbide, porous silicon, hydrogen gas sensor

Procedia PDF Downloads 309
3234 A NoSQL Based Approach for Real-Time Managing of Robotics's Data

Authors: Gueidi Afef, Gharsellaoui Hamza, Ben Ahmed Samir

Abstract:

This paper deals with the secret of the continual progression data that new data management solutions have been emerged: The NoSQL databases. They crossed several areas like personalization, profile management, big data in real-time, content management, catalog, view of customers, mobile applications, internet of things, digital communication and fraud detection. Nowadays, these database management systems are increasing. These systems store data very well and with the trend of big data, a new challenge’s store demands new structures and methods for managing enterprise data. The new intelligent machine in the e-learning sector, thrives on more data, so smart machines can learn more and faster. The robotics are our use case to focus on our test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of robotics; we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.

Keywords: NoSQL databases, database management systems, robotics, big data

Procedia PDF Downloads 359
3233 Computation of ΔV Requirements for Space Debris Removal Using Orbital Transfer

Authors: Sadhvi Gupta, Charulatha S.

Abstract:

Since the dawn of the early 1950s humans have launched numerous vehicles in space. Be it from rockets to rovers humans have done tremendous growth in the technology sector. While there is mostly upside for it for humans the only major downside which cannot be ignored now is the amount of junk produced in space due to it i.e. space debris. All this space junk amounts from objects we launch from earth which so remains in orbit until it re-enters the atmosphere. Space debris can be of various sizes mainly the big ones are of the dead satellites floating in space and small ones can consist of various things like paint flecks, screwdrivers, bolts etc. Tracking of small space debris whose size is less than 10 cm is impossible and can have vast implications. As the amount of space debris increases in space the chances of it hitting a functional satellite also increases. And it is extremely costly to repair or recover the satellite once hit by a revolving space debris. So the proposed solution is, Actively removing space debris while keeping space sustainability in mind. For this solution a total of 8 modules will be launched in LEO and in GEO and these models will be placed in their desired orbits through Hohmann transfer and for that calculating ΔV values is crucial. After which the modules will be placed in their designated positions in STK software and thorough analysis is conducted.

Keywords: space debris, Hohmann transfer, STK, delta-V

Procedia PDF Downloads 90
3232 The Predictors of Self-Esteem among Business School Students

Authors: Suchitra Pal, Arjun Mitra

Abstract:

Objective: The purpose of this empirical study is to ascertain if gender, personality traits and social support predict the self-esteem amongst business school students. Method: The study was conducted through an online survey administered on 160 business school students of which equal-number of males and females were taken, with controls for education and family income status. The participants were contacted through emails. Data was gathered and statistically analyzed to determine the relationship between the variables. Results: The results showed that gender was not associated with self-esteem. Whilst all the personality and social support factors were found to be significantly inter-correlated with self-esteem, only extraversion, openness to new experiences, conscientiousness, emotional stability and total perceived social support were found to predict self-esteem. Conclusion: The findings were explained in the light of existing conceptualizations in the field of self-concept. Recommendations for early identification and interventions for a population with lower self-esteem levels have been made based on findings of the study. Major implications for researchers and practitioners are discussed.

Keywords: self-esteem, personality, social support, gender, self-concept

Procedia PDF Downloads 507
3231 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 247
3230 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 281
3229 The Search of New Laws for a Gluten Kingdom

Authors: Mohammed Saleem Tariq

Abstract:

The enthusiasm for gluten avoidance in a growing market is met by improvements in sensitive detection methods for analysing gluten content. Paradoxically, manufacturers employ no such systems in the production process but continue to market their product as gluten free, a significant risk posed to an undetermined coeliac population. The paper resonates with an immunological response that causes gastrointestinal scarring and villous atrophy with the conventional description of personal injury. The current developing regime in the UK however, it is discussed, has avoided creating specific rules to provide an adequate level of protection for this type of vulnerable ‘characteristic’. Due to the struggle involved with identifying an appropriate cause of action, this paper analyses whether a claim brought in misrepresentation, negligence and/or under the Consumer Protect Act 1987 could be sustained. A necessary comparison is then made with the approach adopted by the Americans with Disability Act 1990 which recognises this chronic disease as a disability. The ongoing failure to introduce a level of protection which matches that afforded to those who fall into any one of the ‘protected characteristics’ under the Equality Act 2010, is inconceivable given the outstanding level of legal vulnerability.

Keywords: coeliac, litigation, misrepresentation, negligence

Procedia PDF Downloads 365
3228 Phase Detection Using Infrared Spectroscopy: A Build up to Inline Gas–Liquid Flow Characterization

Authors: Kwame Sarkodie, William Cheung, Andrew R. Fergursson

Abstract:

The characterization of multiphase flow has gained enormous attention for most petroleum and chemical industrial processes. In order to fully characterize fluid phases in a stream or containment, there needs to be a profound knowledge of the existing composition of fluids present. This introduces a problem for real-time monitoring of fluid dynamics such as fluid distributions, and phase fractions. This work presents a simple technique of correlating absorbance spectrums of water, oil and air bubble present in containment. These spectra absorption outputs are derived by using an Fourier Infrared spectrometer. During the testing, air bubbles were introduced into static water column and oil containment and with light absorbed in the infrared regions of specific wavelength ranges. Attenuation coefficients are derived for various combinations of water, gas and oil which reveal the presence of each phase in the samples. The results from this work are preliminary and viewed as a build up to the design of a multiphase flow rig which has an infrared sensor pair to be used for multiphase flow characterization.

Keywords: attenuation, infrared, multiphase, spectroscopy

Procedia PDF Downloads 371
3227 Instructional Material Development in ODL: Achievements, Prospects, and Challenges

Authors: Felix Gbenoba, Opeyemi Dahunsi

Abstract:

Customised, self-instructional materials are at the heart of instructional delivery in Open and Distance Learning (ODL). The success of any ODL institution depends on the availability of learning materials in quality and quantity. An ODL study material is expected to imitate what the teacher does in the face-to-face learning environment. This paper evaluates these expectation based on existing data and evidence. It concludes that the reality has not matched the expectation so far in terms of pedagogic aspect of instructional delivery especially in West Africa. This does not mean that instructional materials development has not produced any significant positive results in improving the overall learning (and teaching) experience in these institutions; it implies what will help further to identify the new challenges. Obstacles and problems of instructional materials development that could have affected the open educational resource initiatives are well established. The first section of this paper recalls some of the proposed values of instructional materials. The second section compares achievements so far and suggests that instructional materials development should be consider first at an early stage to realise the aspirations of instructional delivery. The third section highlights the challenges of instructional materials development in the future.

Keywords: face-to-face learning, instructional delivery, open and distance education, self-instructional materials

Procedia PDF Downloads 378
3226 Development of a Computer Vision System for the Blind and Visually Impaired Person

Authors: Rodrigo C. Belleza, Jr., Roselyn A. Maaño, Karl Patrick E. Camota, Darwin Kim Q. Bulawan

Abstract:

Eyes are an essential and conspicuous organ of the human body. Human eyes are outward and inward portals of the body that allows to see the outside world and provides glimpses into ones inner thoughts and feelings. Inevitable blindness and visual impairments may result from eye-related disease, trauma, or congenital or degenerative conditions that cannot be corrected by conventional means. The study emphasizes innovative tools that will serve as an aid to the blind and visually impaired (VI) individuals. The researchers fabricated a prototype that utilizes the Microsoft Kinect for Windows and Arduino microcontroller board. The prototype facilitates advanced gesture recognition, voice recognition, obstacle detection and indoor environment navigation. Open Computer Vision (OpenCV) performs image analysis, and gesture tracking to transform Kinect data to the desired output. A computer vision technology device provides greater accessibility for those with vision impairments.

Keywords: algorithms, blind, computer vision, embedded systems, image analysis

Procedia PDF Downloads 322
3225 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network

Authors: M. Hilani, B. Nassih

Abstract:

Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.

Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering

Procedia PDF Downloads 132
3224 A Look Back at America’s Transit History and the Impacts of Household Income on Walkability

Authors: Jackson Becker

Abstract:

Transportation produces the largest amount of carbon dioxide emissions in the United States of America. Today, cars are the predominant mode of transportation across the country, and our cities have been reshaped due to them. This was not always the case. Streetcars were seen in almost every American city of the early 1900s. These streetcar systems were viewed as obsolete with the rise of the automobile. With fewer streetcars came lower public transport ridership. Austin, Texas is one of the fastest growing cities in the country, and it used to have an extensive streetcar line. Today, it plans to build a light rail line with less rail mileage than 100 years ago. This research looks at the areas of Austin that are not included in the city’s new transit plan. Transit connectivity is one factor that goes into walkability rates for cities. This study also looks at the correlation between walkability ratings with median household income levels from the 2019 Census. The results showed a correlation between higher income neighborhoods having higher walkability rates, which was influenced by the lack of public transportation options.

Keywords: transportation, walkability, income, austin

Procedia PDF Downloads 20
3223 Asylum Seekers' Legal Limbo under the Migrant Protection Protocols: Implications from a US-Mexico Border Project

Authors: Tania M. Guerrero, Ileana Cortes Santiago

Abstract:

Estamos Unidos Asylum Project has served more than 2,000 asylum seekers and migrants who are under the Migrant Protection Protocols (MPP) policy in Ciudad Juarez, Mexico. The U.S. policy, implemented in January 2019, has stripped asylum seekers of their rights—forcing people fleeing violence and discrimination to wait in similar or worse conditions from which they fled and navigate their entire asylum process in a different country. Several civil rights groups, including the American Civil Liberties Union (ACLU), challenged MPP in U.S. federal courts in February 2019, arguing a violation of international U.S. obligations towards refugees and asylum-seekers under the 1951 Refugee Convention and the Refugee Act of 1980 in regards to the non-refoulement principle. MPP has influenced Mexico's policies, enforcement, and prioritization of the presence of asylum seekers and migrants; it has also altered the way international non-governmental organizations work at the Mexican Northern border. Estamos Unidos is a project situated in a logistical conundrum, as it provides needed legal services to a population in a legal and humanitarian void, i.e., a liminal space. The liminal space occupied by asylum seekers living under MPP is one that, in today's world, should not be overlooked; it dilutes asylum law and U.S. commitments to international protections. This paper provides analysis of and broader implications from a project whose main goal is to uphold the protections of asylum seekers and international refugee law. The authors identified and analyzed four critical points based on field work conducted since August 2019: (1) strategic coalition building with international, local, and national organizations; (2) brokering between domestic and international contexts and critical legal constraints; (3) flexibility to sudden policy changes and the diverse needs of the multiethnic groups of migrants and asylum seekers served by the project; and (4) the complexity of providing legal assistance to asylum seekers who are survivors of trauma. The authors concur with scholarship when highlighting the erosion of protections of asylum seekers and migrants as a dangerous and unjust global phenomenon.

Keywords: asylum, human rights, migrant protection protocols, refugees law

Procedia PDF Downloads 138
3222 Method for Evaluating the Monetary Value of a Customized Version of the Digital Twin for the Additive Manufacturing

Authors: Fabio Oettl, Sebastian Hoerbrand, Tobias Wittmeir, Johannes Schilp

Abstract:

By combining the additive manufacturing (AM)- process with digital concepts, like the digital twin (DT) or the downsized and basing concept of the digital part file (DPF), the competitiveness of additive manufacturing is enhanced and new use cases like decentral production are enabled. But in literature, one can´t find any quantitative approach for valuing the usage of a DT or DPF in AM. Out of this fact, such an approach will be developed within this paper in order to further promote or dissuade the usage of these concepts. The focus is set on the production as an early lifecycle phase, which means that the AM-production process gets analyzed regarding the potential advantages of using DPF in AM. These advantages are transferred to a monetary value with this approach. By calculating the costs of the DPF, an overall monetary value is a result. Thereon a tool, based on a simulation environment is constructed, where the algorithms are transformed into a program. The results of applying this tool show that an overall value of 20,81 € for the DPF can be realized for one special use case. For the future application of the DPF there is the recommendation to integrate especially sustainable information because out of this, a higher value of the DPF can be expected.

Keywords: additive manufacturing, digital concept costs, digital part file, digital twin, monetary value estimation

Procedia PDF Downloads 206
3221 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 157
3220 Design and Manufacture Detection System for Patient's Unwanted Movements during Radiology and CT Scan

Authors: Anita Yaghobi, Homayoun Ebrahimian

Abstract:

One of the important tools that can help orthopedic doctors for diagnose diseases is imaging scan. Imaging techniques can help physicians in see different parts of the body, including the bones, muscles, tendons, nerves, and cartilage. During CT scan, a patient must be in the same position from the start to the end of radiation treatment. Patient movements are usually monitored by the technologists through the closed circuit television (CCTV) during scan. If the patient makes a small movement, it is difficult to be noticed by them. In the present work, a simple patient movement monitoring device is fabricated to monitor the patient movement. It uses an electronic sensing device. It continuously monitors the patient’s position while the CT scan is in process. The device has been retrospectively tested on 51 patients whose movement and distance were measured. The results show that 25 patients moved 1 cm to 2.5 cm from their initial position during the CT scan. Hence, the device can potentially be used to control and monitor patient movement during CT scan and Radiography. In addition, an audible alarm situated at the control panel of the control room is provided with this device to alert the technologists. It is an inexpensive, compact device which can be used in any CT scan machine.

Keywords: CT scan, radiology, X Ray, unwanted movement

Procedia PDF Downloads 467