Search results for: criminal records
1058 The Ecosystem of Food Allergy Clinical Trials: A Systematic Review
Authors: Eimar Yadir Quintero Tapias
Abstract:
Background: Science is not generally self-correcting; many clinical studies end with the same conclusion "more research is needed." This study hypothesizes that first, we need a better appraisal of the available (and unavailable) evidence instead of creating more of the same false inquiries. Methods: Systematic review of ClinicalTrials.gov study records using the following Boolean operators: (food OR nut OR milk OR egg OR shellfish OR wheat OR peanuts) AND (allergy OR allergies OR hypersensitivity OR hypersensitivities). Variables included the status of the study (e g., active and completed), availability of results, sponsor type, sample size, among others. To determine the rates of non-publication in journals indexed by PubMed, an advanced search query using the specific Number of Clinical Trials (e.g., NCT000001 OR NCT000002 OR...) was performed. As a prophylactic measure to prevent P-hacking, data analyses only included descriptive statistics and not inferential approaches. Results: A total of 2092 study records matched the search query described above (date: September 13, 2019). Most studies were interventional (n = 1770; 84.6%) and the remainder observational (n = 322; 15.4%). Universities, hospitals, and research centers sponsored over half of these investigations (n = 1208; 57.7%), 308 studies (14.7%) were industry-funded, and 147 received NIH grants; the remaining studies got mixed sponsorship. Regarding completed studies (n = 1156; 55.2%), 248 (21.5%) have results available at the registry site, and 417 (36.1%) matched NCT numbers of journal papers indexed by PubMed. Conclusions: The internal and external validity of human research is critical for the appraisal of medical evidence. It is imperative to analyze the entire dataset of clinical studies, preferably at a patient-level anonymized raw data, before rushing to conclusions with insufficient and inadequate information. Publication bias and non-registration of clinical trials limit the evaluation of the evidence concerning therapeutic interventions for food allergy, such as oral and sublingual immunotherapy, as well as any other medical condition. Over half of the food allergy human research remains unpublished.Keywords: allergy, clinical trials, immunology, systematic reviews
Procedia PDF Downloads 1381057 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'
Authors: Arianna Vedaschi
Abstract:
This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.Keywords: radicalization, free speech, international terrorism, national security
Procedia PDF Downloads 1991056 Rupture in the Paradigm of the International Policy of Illicit Drugs in the Field of Public Health and within the Framework of the World Health Organization, 2001 to 2016
Authors: Emy Nayana Pinto, Denise Bomtempo Birche De Carvalho
Abstract:
In the present study, the harmful use of illicit drugs is seen as a public health problem and as one of the expressions of the social question, since its consequences fall mainly on the poorer classes of the population. This perspective is a counterpoint to the dominant paradigm on illicit drug policy at the global level, whose centrality lies within the criminal justice arena. The 'drug problem' is internationally combated through fragmented approaches that focus its actions on banning and criminalizing users. In this sense, the research seeks to answer the following key questions: What are the influences of the prohibitionism in the recommendations of the United Nations (UN), the World Health Organization (WHO), and the formulation of drug policies in member countries? What are the actors that have been provoking the prospect of breaking with the prohibitionist paradigm? What is the WHO contribution to the rupture with the prohibitionist paradigm and the displacement of the drug problem in the field of public health? The general objective of this work is to seek evidence from the perspective of rupture with the prohibitionist paradigm in the field of drugs policies at the global and regional level, through analysis of documents of the World Health Organization (WHO), between the years of 2001 to 2016. The research was carried out in bibliographical and documentary sources. The bibliographic sources contributed to the approach with the object and the theoretical basis of the research. The documentary sources served to answer the research questions and evidence the existence of the perspective of change in drug policy. Twenty-two documents of the UN system were consulted, of which fifteen had the contribution of the World Health Organization (WHO). In addition to the documents that directly relate to the subject of the research, documents from various agencies, programs, and offices, such as the Joint United Nations Program on HIV/AIDS (UNAIDS) and the United Nations Office on Drugs and Crime (UNODC), which also has drugs as the central or transversal theme of its performance. The results showed that from the 2000s it was possible to find in the literature review and in the documentary analysis evidence of the critique of the prohibitionist paradigm parallel to the construction of a new perspective for drug policy at the global level and the displacement of criminal justice approaches for the scope of public health, with the adoption of alternative and pragmatic interventions based on human rights, scientific evidence and the reduction of social damages and health by the misuse of illicit drugs.Keywords: illicit drugs, international organizations, prohibitionism, public health, World Health Organization
Procedia PDF Downloads 1571055 Constructing a Semi-Supervised Model for Network Intrusion Detection
Authors: Tigabu Dagne Akal
Abstract:
While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.Keywords: intrusion detection, data mining, computer science, data mining
Procedia PDF Downloads 2971054 Calculation of Instrumental Results of the Tohoku Earthquake, Japan (Mw 9.0) on March 11, 2011 and Other Destructive Earthquakes during Seismic Hazard Assessment
Authors: J. K. Karapetyan
Abstract:
In this paper seismological-statistical analysis of actual instrumental data on the main tremor of the Great Japan earthquake 11.03.2011 is implemented for finding out the dependence between maximal values of peak ground accelerations (PGA) and epicentric distances. A number of peculiarities of manifestation of accelerations' maximum values at the interval of long epicentric distances are revealed which do not correspond with current scales of seismic intensity.Keywords: earthquakes, instrumental records, seismic hazard, Japan
Procedia PDF Downloads 3671053 Comparison of Patient Stay at Withy Bush Same Day Emergency Care and Then Those at the Emergency Department
Authors: Joshua W. Edefo, Shafiul Azam, Murray D. Smith
Abstract:
Introduction: In April 2022, the Welsh Government introduced the six goals for urgent and emergency care programs. One of these goals was to provide access to clinically safe alternatives, leading to the establishment of the Same Day Emergency Care (SDEC) program. The SDEC initiative aims to offer viable options that maintain patient safety while avoiding unnecessary hospital stays. The aim of the study is to determine the duration of patient stay in SDEC and compare it with that of Emergency department (ED) stay to ascertain if one of the objectives of SDEC is achieved. Methods: Patient stays and attendance datasets were constructed from Withybush SDEC and ED patient records. These records were provided by Hywel Dda University Health Board Informatics. Some hypothetical pathways were identified, notably SDEC visits involving a single attendance and ED visits then immediately transferred to SDEC. Descriptive statistics were used to summarise the data, and hypothesis tests for mean differences used the student t-test. Propensity scoring was employed to match a set of ED patient stays to SDEC patient stays which were then used to determine the average treatment effect (ATE) to compare durations of stay in SDEC with ED. Regression methods were used to model the natural logarithm of the duration of SDEC attendance, and the level of statistical significance was set to 0.05. Results: SDEC visits involving a single attendance (170 of 384; 44.3%) is the most frequently observed pathway with patient length of stay at 256 minutes (95%CI 237.4 - 275.1). The next most frequently observed pathway of patient stay was SDEC attendance after presenting to ED (80 of 384; 20.8%) and gave the length of stay of 440 minutes (95%CI 351.6 - 529.2). Time spent in this pathway significantly increased by 184 minutes (95%CI 118.0 - 250.2, support for no difference p<0.001) compared to the most seen pathway. When SDEC data were compared with ED, the estimate for the ATE from SDEC single attendance was -272 minutes (95%CI -334.1 - -210.5; p<0.001), while that of ED then SDEC pathway was -50.6 min (95%CI -182.7-81.5; p=0.453). Conclusion: When patients are admitted to SDEC and successfully discharged, their stays are significantly shorter, approximately 4.5 hours, compared to patients who spend their entire stay in the Emergency Department. That difference vanishes when the patient stay includes a period spent previously in ED before transfer to SDEC.Keywords: attendance, emergency-department, patient-stay, same-day-emergency-care
Procedia PDF Downloads 471052 Big Data and Health: An Australian Perspective Which Highlights the Importance of Data Linkage to Support Health Research at a National Level
Authors: James Semmens, James Boyd, Anna Ferrante, Katrina Spilsbury, Sean Randall, Adrian Brown
Abstract:
‘Big data’ is a relatively new concept that describes data so large and complex that it exceeds the storage or computing capacity of most systems to perform timely and accurate analyses. Health services generate large amounts of data from a wide variety of sources such as administrative records, electronic health records, health insurance claims, and even smart phone health applications. Health data is viewed in Australia and internationally as highly sensitive. Strict ethical requirements must be met for the use of health data to support health research. These requirements differ markedly from those imposed on data use from industry or other government sectors and may have the impact of reducing the capacity of health data to be incorporated into the real time demands of the Big Data environment. This ‘big data revolution’ is increasingly supported by national governments, who have invested significant funds into initiatives designed to develop and capitalize on big data and methods for data integration using record linkage. The benefits to health following research using linked administrative data are recognised internationally and by the Australian Government through the National Collaborative Research Infrastructure Strategy Roadmap, which outlined a multi-million dollar investment strategy to develop national record linkage capabilities. This led to the establishment of the Population Health Research Network (PHRN) to coordinate and champion this initiative. The purpose of the PHRN was to establish record linkage units in all Australian states, to support the implementation of secure data delivery and remote access laboratories for researchers, and to develop the Centre for Data Linkage for the linkage of national and cross-jurisdictional data. The Centre for Data Linkage has been established within Curtin University in Western Australia; it provides essential record linkage infrastructure necessary for large-scale, cross-jurisdictional linkage of health related data in Australia and uses a best practice ‘separation principle’ to support data privacy and security. Privacy preserving record linkage technology is also being developed to link records without the use of names to overcome important legal and privacy constraint. This paper will present the findings of the first ‘Proof of Concept’ project selected to demonstrate the effectiveness of increased record linkage capacity in supporting nationally significant health research. This project explored how cross-jurisdictional linkage can inform the nature and extent of cross-border hospital use and hospital-related deaths. The technical challenges associated with national record linkage, and the extent of cross-border population movements, were explored as part of this pioneering research project. Access to person-level data linked across jurisdictions identified geographical hot spots of cross border hospital use and hospital-related deaths in Australia. This has implications for planning of health service delivery and for longitudinal follow-up studies, particularly those involving mobile populations.Keywords: data integration, data linkage, health planning, health services research
Procedia PDF Downloads 2161051 Influence of the Popular Literature on Consciousness of the Person
Authors: Alua Temirbolat, Sergei Kibalnik, Zhuldyz Essimova
Abstract:
The article is devoted to research of influence of the modern literature on the consciousness of the person. Tendencies and features of the progress of the historical-cultural and artistic process at the end of XX–the beginning of XXI centuries are considered. The object of the analysis is the popular literature which has found last decades greater popularity among readers of different generations. In the article, such genres, as melodramas, female, espionage, criminal, pink, costume-historical novels, thrillers, elements, a fantasy are considered. During research, specific features of the popular literature, its difference from works of classics is revealed. On specific examples, its negative and positive influence on consciousness, psychology of the reader is shown, its role and value in a modern society are defined.Keywords: the popular literature, the person, consciousness, a genre, psychology
Procedia PDF Downloads 3011050 Estimation of Dynamic Characteristics of a Middle Rise Steel Reinforced Concrete Building Using Long-Term
Authors: Fumiya Sugino, Naohiro Nakamura, Yuji Miyazu
Abstract:
In earthquake resistant design of buildings, evaluation of vibration characteristics is important. In recent years, due to the increment of super high-rise buildings, the evaluation of response is important for not only the first mode but also higher modes. The knowledge of vibration characteristics in buildings is mostly limited to the first mode and the knowledge of higher modes is still insufficient. In this paper, using earthquake observation records of a SRC building by applying frequency filter to ARX model, characteristics of first and second modes were studied. First, we studied the change of the eigen frequency and the damping ratio during the 3.11 earthquake. The eigen frequency gradually decreases from the time of earthquake occurrence, and it is almost stable after about 150 seconds have passed. At this time, the decreasing rates of the 1st and 2nd eigen frequencies are both about 0.7. Although the damping ratio has more large error than the eigen frequency, both the 1st and 2nd damping ratio are 3 to 5%. Also, there is a strong correlation between the 1st and 2nd eigen frequency, and the regression line is y=3.17x. In the damping ratio, the regression line is y=0.90x. Therefore 1st and 2nd damping ratios are approximately the same degree. Next, we study the eigen frequency and damping ratio from 1998 after 3.11 earthquakes, the final year is 2014. In all the considered earthquakes, they are connected in order of occurrence respectively. The eigen frequency slowly declined from immediately after completion, and tend to stabilize after several years. Although it has declined greatly after the 3.11 earthquake. Both the decresing rate of the 1st and 2nd eigen frequencies until about 7 years later are about 0.8. For the damping ratio, both the 1st and 2nd are about 1 to 6%. After the 3.11 earthquake, the 1st increases by about 1% and the 2nd increases by less than 1%. For the eigen frequency, there is a strong correlation between the 1st and 2nd, and the regression line is y=3.17x. For the damping ratio, the regression line is y=1.01x. Therefore, it can be said that the 1st and 2nd damping ratio is approximately the same degree. Based on the above results, changes in eigen frequency and damping ratio are summarized as follows. In the long-term study of the eigen frequency, both the 1st and 2nd gradually declined from immediately after completion, and tended to stabilize after a few years. Further it declined after the 3.11 earthquake. In addition, there is a strong correlation between the 1st and 2nd, and the declining time and the decreasing rate are the same degree. In the long-term study of the damping ratio, both the 1st and 2nd are about 1 to 6%. After the 3.11 earthquake, the 1st increases by about 1%, the 2nd increases by less than 1%. Also, the 1st and 2nd are approximately the same degree.Keywords: eigenfrequency, damping ratio, ARX model, earthquake observation records
Procedia PDF Downloads 2171049 Reliability of Eyewitness Statements in Fire and Explosion Investigations
Authors: Jeff Colwell, Benjamin Knox
Abstract:
While fire and explosion incidents are often observed by eyewitnesses, the weight that fire investigators should place on those observations in their investigations is a complex issue. There is no doubt that eyewitness statements can be an important component to an investigation, particularly when other evidence is sparse, as is often the case when damage to the scene is severe. However, it is well known that eyewitness statements can be incorrect for a variety of reasons, including deception. In this paper, we reviewed factors that can have an effect on the complex processes associated with the perception, retention, and retrieval of an event. We then review the accuracy of eyewitness statements from unique criminal and civil incidents, including fire and explosion incidents, in which the accuracy of the statements could be independently evaluated. Finally, the motives for deceptive eyewitness statements are described, along with techniques that fire and explosion investigators can employ, to increase the accuracy of the eyewitness statements that they solicit.Keywords: fire, explosion, eyewitness, reliability
Procedia PDF Downloads 3831048 Diversion of Airplanes for Medical Emergencies at Taoyuan International Airport
Authors: Chin-Hsiang Lo, Wey Chia, Shih-Tien Hsu
Abstract:
Introduction: Since 2016, the annual number of passengers on commercial flights at Taoyuan International Airport (TIA) has been ~40 million. Due to the outbreak and spread of COVID-19, the number of international flights sharply diminished in recent years. However, TIA is located at an East-Asian flight transportation junction; thus, many commercial and cargo flights continue service. When severe medical events happen on a commercial airliner, the decision to divert or not is based on consideration of both medical and operational issues. This study discusses the events related to the diversion of airplanes or reentry after taxiing for medical emergencies at Taoyuan International Airport. Background: We analyzed emergency medical records from the medical clinic of TIA from January 1, 2017, to December 31, 2022, for patients who needed emergency medical services but were unable to reach the airport clinic by themselves. We also collected data for patients treated after diversion from other airports or reentry after taxiing due to medical emergencies. Information such as when and where the event occurred, chief signs and symptoms, the tentative diagnosis (using the ICD-9-CM), management, and the sociodemographic features of the passengers were extracted from the medical records. Summary of Cases: TIA handled approximately 152 million passengers and 1,093,762 flights during the study period; a total of 2,804 emergencies occurred during this time period. Thirty-three medical emergencies warranted diversion (21 cases) or reentry (12 cases); 13 cases were diverted from Asia-Pacific flights and five from Asia-North America flights. The age of the passengers with diversion emergencies ranged from 2–85 years (mean, 46±20-years-old). Twenty-seven patients were transported to an emergency department, and four patients died. For all cases of diversion or reentry, the most common diagnoses were neurogenic problems (42.4%), Out-of-hospital cardiac arrest (OHCA) (15.2%), and cardiovascular problems (12.1%). Discussion: Most aircraft diversions were related to syncope, seizure, and OHCA. The decision to divert depends on medical and operational considerations. Emergency conditions are often serious; thus, improvement of the effectiveness of cooperation between airlines and medical teams remains a challenge.Keywords: diversion, syncope, seizure, OHCA
Procedia PDF Downloads 831047 Gender Identification Using Digital Forensics
Authors: Vinod C. Nayak
Abstract:
In day-to-day forensic practice, identification is always a difficult task. Availability of anti-mortem and postmortem records plays a major rule in facilitating this tough task. However, the advent of digital forensic is a boon for forensic experts. This study has made use of digital forensics to establish identity by radiological dimensions of maxillary sinus using workstation software. The findings suggest a significant association between maxillary sinus dimensions and human gender. The author will be discussing the methods and results of the study in this e-poster.Keywords: digital forensics, identification, maxillary sinus, radiology
Procedia PDF Downloads 4221046 A Method for Clinical Concept Extraction from Medical Text
Authors: Moshe Wasserblat, Jonathan Mamou, Oren Pereg
Abstract:
Natural Language Processing (NLP) has made a major leap in the last few years, in practical integration into medical solutions; for example, extracting clinical concepts from medical texts such as medical condition, medication, treatment, and symptoms. However, training and deploying those models in real environments still demands a large amount of annotated data and NLP/Machine Learning (ML) expertise, which makes this process costly and time-consuming. We present a practical and efficient method for clinical concept extraction that does not require costly labeled data nor ML expertise. The method includes three steps: Step 1- the user injects a large in-domain text corpus (e.g., PubMed). Then, the system builds a contextual model containing vector representations of concepts in the corpus, in an unsupervised manner (e.g., Phrase2Vec). Step 2- the user provides a seed set of terms representing a specific medical concept (e.g., for the concept of the symptoms, the user may provide: ‘dry mouth,’ ‘itchy skin,’ and ‘blurred vision’). Then, the system matches the seed set against the contextual model and extracts the most semantically similar terms (e.g., additional symptoms). The result is a complete set of terms related to the medical concept. Step 3 –in production, there is a need to extract medical concepts from the unseen medical text. The system extracts key-phrases from the new text, then matches them against the complete set of terms from step 2, and the most semantically similar will be annotated with the same medical concept category. As an example, the seed symptom concepts would result in the following annotation: “The patient complaints on fatigue [symptom], dry skin [symptom], and Weight loss [symptom], which can be an early sign for Diabetes.” Our evaluations show promising results for extracting concepts from medical corpora. The method allows medical analysts to easily and efficiently build taxonomies (in step 2) representing their domain-specific concepts, and automatically annotate a large number of texts (in step 3) for classification/summarization of medical reports.Keywords: clinical concepts, concept expansion, medical records annotation, medical records summarization
Procedia PDF Downloads 1351045 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain
Authors: Malaw Ndiaye, Karim Konate
Abstract:
Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks
Procedia PDF Downloads 2771044 Comparative Forensic Analysis of Lipsticks Using Thin Layer Chromatography and Gas Chromatography
Authors: M. O. Ezegbogu, H. B. Osadolor
Abstract:
Lipsticks constitute a significant source of transfer evidence, and can, therefore, provide corroborative or inclusionary evidence in criminal investigation. This study aimed to determine the uniqueness and persistence of different lipstick smears using Thin Layer Chromatography (TLC), and Gas Chromatography with a Flame Ionisation Detector (GC-FID). In this study, we analysed lipstick smears retrieved from tea cups exposed to the environment for up to four weeks. The n-alkane content of each sample was determined using GC-FID, while TLC was used to determine the number of bands, and retention factor of each band per smear. This study shows that TLC gives more consistent results over a 4-week period than GC-FID. It also proposes a maximum exposure time of two weeks for the analysis of lipsticks left in the open using GC-FID. Finally, we conclude that neither TLC nor GC-FID can distinguish lipstick evidence recovered from hypothetical crime scenes.Keywords: forensic science, chromatography, identification, lipstick
Procedia PDF Downloads 1881043 Development of a Secured Telemedical System Using Biometric Feature
Authors: O. Iyare, A. H. Afolayan, O. T. Oluwadare, B. K. Alese
Abstract:
Access to advanced medical services has been one of the medical challenges faced by our present society especially in distant geographical locations which may be inaccessible. Then the need for telemedicine arises through which live videos of a doctor can be streamed to a patient located anywhere in the world at any time. Patients’ medical records contain very sensitive information which should not be made accessible to unauthorized people in order to protect privacy, integrity and confidentiality. This research work focuses on a more robust security measure which is biometric (fingerprint) as a form of access control to data of patients by the medical specialist/practitioner.Keywords: biometrics, telemedicine, privacy, patient information
Procedia PDF Downloads 2901042 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria
Authors: Auwal Nata'ala
Abstract:
The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.Keywords: cyber crimes, e-banking, policies, ICT
Procedia PDF Downloads 4071041 Sustainable Opportunities of Educational Facilities Provided to the Imprisoned Women's Children in Karachi's Central Jail
Authors: Waqar Un Nisa Faizi, Anila Fatima Shakil, Wilayat Bibi, Sajjad Hayat Akhtar
Abstract:
This study will discuss the sustainable opportunities regarding educational facilities provided to the children of imprisoned women in the different jails of Pakistan particularly in Central Jail of Karachi. It will also discuss the importance of educational facilities which are required for the mental and personal growth of the children as education has the capability to enhance the general knowledge and the personality of any individual. Education is extremely important for the children whether they live in a society or in prison, because they are the future of any country. Therefore, the point of discussion in this paper will be the provision of educational facilities and sustainable opportunities regarding these facilities to the children of imprisoned women in Karachi and other countries of the world.Keywords: imprisoned, educational facilities, criminal activities, positive atmosphere
Procedia PDF Downloads 3451040 Polish Police in the Fight against Terrorism and Cyberterrorism
Authors: Izabela Nowicka, Jacek Dworzecki
Abstract:
The paper will be presented to selected legal and organizational solutions for the prevention and combating of terrorism by the police in Poland. Development will include information on the organization and functioning of the police anti-terrorist sub-units, whose officers are on the front line of the fight against terrorism. They will be presented to the conditions and cases of use of firearms by police officers in the course of special operations aimed against organizations and terrorist groups, and the perpetrators of criminal acts of terrorism as well as the legal foundation for the Polish police to take immediate counterterrorism operations. Article will be prepared in the context of an international research project entitled. Understand the Dimensions of Organised Crime and Terrorist Networks for Developing Effective and Efficient Security Solutions for First-line-practitioners and Professionals [Project: H2020-FCT-2015, No: 700688].Keywords: the fight against terrorism, police, Poland, takedown
Procedia PDF Downloads 3351039 The Need for a More Robust Legal Framework to Curb the Rise in Violence against Game Officials
Authors: A. Roomy
Abstract:
The dramatic rise in violence against game officials has affected all levels of sports including recreational, amateur, and professional sports. One way to combat this rise in violence is through the creation of laws specifically aimed at preventing and punishing this kind of violence. This paper will use related legal cases as a starting point to explore possible ways of better protecting the safety of game officials. It will do this by looking at relevant cases, related legal issues, and two specific ways of reducing violence against game officials. In closing, it will be argued that there needs to be a more robust legal approach with emphasis on criminal and civil penalties for assault and battery, and a more comprehensive social approach with emphasis on raising social awareness on the need to protect game officials from violence.Keywords: game officials, legal issues, safety, violence
Procedia PDF Downloads 3741038 Geopolitics over Ukraine: International Policies and Domestic Problems
Authors: Daniel Silander
Abstract:
This article explores the EU Initiated European Neighborhood Policy (ENP) towards Ukraine. It also explores Russian geopolitics in the region. We argue that Ukraine is sandwiched between two regional powers in the EU and Russia. By analyzing EU democracy promotion towards Ukraine and neighbors, we assess a weak EU normative capacity. Instead of building a “ring of friends”, as argued by the EU Commission, in an enlarged democratic community, the EU has achieved poor democratic records in Ukraine which opened for a revival of Russia in the region and causes the international crisis over Crime of 2014.Keywords: regional neighborhood policy, European Union, Russia, Ukraine, domestic elites
Procedia PDF Downloads 5241037 Kidnapping of Migrants by Drug Cartels in Mexico as a New Trend in Contemporary Slavery
Authors: Itze Coronel Salomon
Abstract:
The rise of organized crime and violence related to drug cartels in Mexico has created serious challenges for the authorities to provide security to those who live within its borders. However, to achieve a significant improvement in security is absolute respect for fundamental human rights by the authorities. Irregular migrants in Mexico are at serious risk of abuse. Research by Amnesty International as well as reports of the NHRC (National Human Rights) in Mexico, have indicated the major humanitarian crisis faced by thousands of migrants traveling in the shadows. However, the true extent of the problem remains invisible to the general population. The fact that federal and state governments leave no proper record of abuse and do not publish reliable data contributes to ignorance and misinformation, often spread by the media that portray migrants as the source of crime rather than their victims. Discrimination and intolerance against irregular migrants can generate greater hostility and exclusion. According to the modus operandi that has been recorded criminal organizations and criminal groups linked to drug trafficking structures deprive migrants of their liberty for forced labor and illegal activities related to drug trafficking, even some have been kidnapped for be trained as murderers . If the victim or their family cannot pay the ransom, the kidnapped person may suffer torture, mutilation and amputation of limbs or death. Migrant women are victims of sexual abuse during her abduction as well. In 2011, at least 177 bodies were identified in the largest mass grave found in Mexico, located in the town of San Fernando, in the border state of Tamaulipas, most of the victims were killed by blunt instruments, and most seemed to be immigrants and travelers passing through the country. With dozens of small graves discovered in northern Mexico, this may suggest a change in tactics between organized crime groups to the different means of obtaining revenue and reduce murder profile methods. Competition and conflict over territorial control drug trafficking can provide strong incentives for organized crime groups send signals of violence to the authorities and rival groups. However, as some Mexican organized crime groups are increasingly looking to take advantage of income and vulnerable groups, such as Central American migrants seem less interested in advertising his work to authorities and others, and more interested in evading detection and confrontation. This paper pretends to analyze the introduction of this new trend of kidnapping migrants for forced labors by drug cartels in Mexico into the forms of contemporary slavery and its implications.Keywords: international law, migration, transnational organized crime
Procedia PDF Downloads 4181036 Practice on Design Knowledge Management and Transfer across the Life Cycle of a New-Built Nuclear Power Plant in China
Authors: Danying Gu, Xiaoyan Li, Yuanlei He
Abstract:
As a knowledge-intensive industry, nuclear industry highly values the importance of safety and quality. The life cycle of a NPP (Nuclear Power Plant) can last 100 years from the initial research and design to its decommissioning. How to implement the high-quality knowledge management and how to contribute to a more safe, advanced and economic NPP (Nuclear Power Plant) is the most important issue and responsibility for knowledge management. As the lead of nuclear industry, nuclear research and design institute has competitive advantages of its advanced technology, knowledge and information, DKM (Design Knowledge Management) of nuclear research and design institute is the core of the knowledge management in the whole nuclear industry. In this paper, the study and practice on DKM and knowledge transfer across the life cycle of a new-built NPP in China is introduced. For this digital intelligent NPP, the whole design process is based on a digital design platform which includes NPP engineering and design dynamic analyzer, visualization engineering verification platform, digital operation maintenance support platform and digital equipment design, manufacture integrated collaborative platform. In order to make all the design data and information transfer across design, construction, commissioning and operation, the overall architecture of new-built digital NPP should become a modern knowledge management system. So a digital information transfer model across the NPP life cycle is proposed in this paper. The challenges related to design knowledge transfer is also discussed, such as digital information handover, data center and data sorting, unified data coding system. On the other hand, effective delivery of design information during the construction and operation phase will contribute to the comprehensive understanding of design ideas and components and systems for the construction contractor and operation unit, largely increasing the safety, quality and economic benefits during the life cycle. The operation and maintenance records generated from the NPP operation process have great significance for maintaining the operating state of NPP, especially the comprehensiveness, validity and traceability of the records. So the requirements of an online monitoring and smart diagnosis system of NPP is also proposed, to help utility-owners to improve the safety and efficiency.Keywords: design knowledge management, digital nuclear power plant, knowledge transfer, life cycle
Procedia PDF Downloads 2731035 Hybrid Knowledge Approach for Determining Health Care Provider Specialty from Patient Diagnoses
Authors: Erin Lynne Plettenberg, Jeremy Vickery
Abstract:
In an access-control situation, the role of a user determines whether a data request is appropriate. This paper combines vetted web mining and logic modeling to build a lightweight system for determining the role of a health care provider based only on their prior authorized requests. The model identifies provider roles with 100% recall from very little data. This shows the value of vetted web mining in AI systems, and suggests the impact of the ICD classification on medical practice.Keywords: electronic medical records, information extraction, logic modeling, ontology, vetted web mining
Procedia PDF Downloads 1741034 Truthful or Untruthful Social Media Posts: Applying Statement Analysis to Decode online Deception
Authors: Christa L. Arnold, Margaret C. Stewart
Abstract:
This research shares the results of an exploratory study examining Statement Analysis (SA) to detect deception in online truthful and untruthful social media posts. Applying a Law Enforcement methodology SA, used in criminal interview statements, this research analyzes what is stated to assist in evaluating written deceptive information. Preliminary findings reveal qualitative and quantitative nuances for SA in online deception detection and uncover insights regarding digital deceptive behavior. Thus far, findings reveal truthful statements tend to differ from untruthful statements in both content and quality.Keywords: deception detection, online deception, social media content, statement analysis
Procedia PDF Downloads 661033 State Violence: The Brazilian Amnesty Law and the Fight Against Impunity
Authors: Flavia Kroetz
Abstract:
From 1964 to 1985, Brazil was ruled by a dictatorial regime that, under the discourse of fight against terrorism and subversion, implemented cruel and atrocious practices against anyone who opposed the State ideology. At the same time, several Latin American countries faced dictatorial periods and experienced State repression through apparatuses of violence institutionalized in the very governmental structure. Despite the correspondence between repressive methods adopted by authoritarian regimes in States such as Argentina, Chile, El Salvador, Peru and Uruguay, the mechanisms of democratic transition adopted with the end of each dictatorship were significantly different. While some States have found ways to deal with past atrocities through serious and transparent investigations of the crimes perpetrated in the name of repression, in others, as in Brazil, a culture of impunity remains rooted in society, manifesting itself in the widespread disbelief of the population in governmental and democratic institutions. While Argentina, Chile, Peru and Uruguay are convincing examples of the possibility and importance of the prosecution of crimes such as torture, forced disappearance and murder committed by the State, El Salvador demonstrates the complete failure to punish or at least remove from power the perpetrators of serious crimes against civilians and political opponents. In a scenario of widespread violations of human rights, State violence becomes entrenched within society as a daily and even necessary practice. In Brazil, a lack of political and judicial will withstands the impunity of those who, during the military regime, committed serious crimes against human rights under the authority of the State. If the reproduction of violence is a direct consequence of the culture of denial and the rejection of everyone considered to be different, ‘the other’, then the adoption of transitional mechanisms that underpin the historical and political contexts of the time seems essential. Such mechanisms must strengthen democracy through the effective implementation of the rights to memory and to truth, the right to justice and reparations for victims and their families, as well as institutional changes in order to remove from power those who, when in power, could not distinguish between legality and authoritarianism. Against this background, this research analyses the importance of transitional justice for the restoration of democracy, considering the adoption of amnesty laws as a strategy to preclude criminal prosecution of offenses committed during dictatorial regimes. The study investigates the scope of Law No 6.683/79, the Brazilian amnesty law, which, according to a 2010 decision of the Brazilian Constitutional Supreme Court, granted amnesty to those responsible for political crimes and related crimes, committed between September 2, 1961 and August 15, 1979. Was the purpose of this Law to grant amnesty to violent crimes committed by the State? If so, is it possible to recognize the legitimacy of a Congress composed of indirectly elected politicians controlled by the dictatorship?Keywords: amnesty law, criminal justice, dictatorship, state violence
Procedia PDF Downloads 4391032 The Ordinary Way of the Appeal in Penalty Part
Authors: Abdelkadir Elhaouari
Abstract:
The priciest thing in human life since his birth is his freedom, basing on this idea, the conflict exists till now, the fight against oppression, injustice, tyranny and slavery, searching for freedom and political resistances, and this makes the freedom is deeply related to the defense for its existence all over years. This project attempts using any way to preserve this freedom, and building and maintaining bases and rules to organize this life. Appeal is a one of the most important method that human uses to protect his freedom, and we will mention in this thesis our attempt to clarify this aspect to the individual. We can say that the law does not know just one color or one logic, and is not based on one rule to be taken by heart, but the law is neutrality, the diversity, abstraction and diligence diversity. The penal law is a valued law and it deserves to be studied and searched more… so that to attempt to master it. Our thesis is just a brief explanation of an important point in this law, where we attempt to clarify and simplify the image to the normal person, so that he can preserve his rights, and we hope that we had succeeded to choose the right topic for that.Keywords: appeal, penalization, judgement, criminal
Procedia PDF Downloads 2821031 The Road to Abolition of Death Penalty in China: With the Perspective of the Ninth Amendment
Authors: Huang Gui
Abstract:
This paper supplies some possible approaches of the death penalty reform in China basic on the analyzing the reformation conducted by the Ninth Amendment. There now are 46 crimes punishable by death, and this penalty still plays a significant role in the criminal punishment structure. In order to abolish entirely the death penalty in Penal Code, the legislature of China should gradually abolish the death penalty for the nonviolent crimes and then for the nonlethal violent crimes and finally for the lethal violent crimes. In the case where the death penalty has not yet been abolished completely, increasing the applicable conditions of suspension of execution of death penalty and reducing the scope of applicable objects (elderly defendant and other kinds of special objects) of death penalty would be an effective road to control and limit the use of death penalty in judicial practice.Keywords: death penalty, the eighth amendment, the ninth amendment, suspension of execution of death, immediate execution of death, China
Procedia PDF Downloads 4811030 Prevalence of Adverse Events in Children and Adolescents on Antiretroviral Therapy: Examining the Pediatric Cohort in the Eastern Cape
Authors: Shannon Glaspy, Gerald Boon, Jack Lambert
Abstract:
Studies on AE of highly active antiretroviral therapy (HAART) in children and adolescents are rare. The aim of this study is to observe the frequency of treatment limiting adverse drug reactions against years on ARVs and specific ARV regimen. Methods: A retrospective cohort study was conducted in East London, South Africa. All patient files in the pediatric (0 – 18 years) ARV cohort were examined, selecting only those patients started on HAART. ARV regimen changes explicitly due to AE, age on ARV treatment onset, age of AE onset, and gender were extrapolated. Eligible subjects were obtained from patient folders, anonymized and cross-referenced with data obtained from electronic records. A total of 1120 patients [592 male (52.9%) and 528 female (47.1%)] were charted by incidence and year. Additional information was extrapolated in cases where the patient experienced lipodystrophy and lipoatrophy to include the number of years on ARVs prior to the onset of the AE. Results: Of the 1120 HIV infected children of the hospital cohort, a total of 105 (9.37%) AE (53.3% male) observed were deemed eligible for the study due to completeness of medical history and agreement between electronic records and paper files. The AE cited were as follows: lipoatrophy 62 (5.53% of all subjects), lipodystrophy 27 (2.41%), neuropathy 9 (0.8%), anemia 2 (0.17%), Steven Johnsons Syndrome 1 (0.08%), elevated LFTs 1 (0.8%), breast hypertrophy (0.08%), gastritis 1 (0.08%) and rash 1 (0.08%). The most prevalence ARV regimens associated with the onset of the AE are: D4T/3TC/EFV 72 cases (64.86% of all AE), D4T/3TC/LOPr 24 cases (21.62%). Lipoatrophy and lipodystrophy combined represent 84.76% (89 cases) of all adverse events documented in this cohort. Within the 60 cases of lipoatrophy, the average number of years on ARVs associated with an AE is 3.54, with 14 cases experiencing an AE between 0-2 years of HAART. Within the 29 cases of lipodystrophy, the average number of years on ARVs associated with an AE is 3.89, with 4 cases experiencing an AE between 0-2 years on HAART. The regimen D4T/3TC/EFV is associated with 43 cases (71.66%) of lipoatrophy and 21 cases (72.41%) of lipodystrophy. D4T/3TC/LOPr is associated with 15 cases (25%) of lipoatrophy and 7 cases (24.14%) of lipodystrophy. The frequency of AE associated with ARV regimens could be misrepresented due to prevalence of different 1st line regimens which were not captured in this study, particularly with the systematic change of 1st line drugs from D4T to ABC in 2010. Conclusion: In this descriptive study we found a 9.37% prevalence of AE were significant enough to be treatment limiting among our cohort. Lipoatrophy accounted for 59.04% of all documented AE. Overall, D4T/3TC/EFV was associated with 64.86% of all AE, 71.66% of lipoatrophy cases and 72.41% of lipodystrophy cases.Keywords: ARV, adverse events, HAART, pediatric
Procedia PDF Downloads 1981029 Where the Girls Are: Gender Trends in Juvenile Crime
Authors: Revital Sela-Shayovitz
Abstract:
There is growing evidence that female rates of criminal nonlethal violent offending have increased during the 1990s. However, the debate regarding whether the gender gap in violence is closing is ongoing. This paper examines the trends in juvenile violent offending in Israel between the years 1996 and 2012. The findings indicate that female-to-male offending rate ratios have increased over time for simple assaults, aggravated assault, and knife crime. Moreover, the closing of the gender gap among youth (ages 12 to 14 years), principally results from the increase in female rates of offending, which is greater than the rise in male rates of offending. These findings are discussed in the context of existing research on the gender gap in the perpetration of violence with reference to future directions in research.Keywords: gender violence, youth violence, crime rates, juvenile delinquency, crime policy
Procedia PDF Downloads 383