Search results for: vulnerable narcissism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1071

Search results for: vulnerable narcissism

651 Morphology of the Acetabular Cartilage Surface in Elderly Cadavers Analyzing the Contact between the Acetabulum and Femoral Head

Authors: Keisuke Akiyama, Takashi Sakai, Junichiro Koyanagi, Hideki Yoshikawa, Kazuomi Sugamoto

Abstract:

The geometry of acetabular cartilage surface plays an important role in hip joint biomechanics. The aim of this study was to analyze the morphology of acetabular articular cartilage surface in elderly subjects using a 3D-digitizer. Twenty hemipelves from 12 subjects (mean ages 85 years) were scanned with 3D-digitizer. Each acetabular surface model was divided into four regions: anterosuperior (AS), anteroinferior (AI), posterosuperior (PS), and posteroinferior (PI). In the global acetabulum and each region, the acetabular sphere radius and the standard deviation (SD) of the distance from the acetabular sphere center to the acetabular cartilage surface were calculated. In the global acetabulum, the distance between the acetabular surface model and the maximum sphere which did not penetrate over the acetabular surface model was calculated as the inferred femoral head, and then the distribution was mapped at intervals of 0.5 mm. The SD in AS was significantly larger than that in AI (p = 0.006) and PI (p = 0.001). The SD in PS was significantly larger than that in PI (p = 0.005). The closest region (0-0.5 mm) tended to be distributed at anterior or posterosuperior acetabular edge. The contact between the femoral head and acetabulum might start at the periphery of the lunate surface, especially in the anterior or posterosuperior region. From viewpoint of acetabular morphology, the acetabular articular cartilage in the anterior or posterosuperior edge could be more vulnerable due to direct contact mechanism.

Keywords: acetabulum, cartilage, morphology, 3D-digitizer

Procedia PDF Downloads 324
650 Elevated of Interleukin-6 Serum Levels in Pregnant Women with Corona Virus Disease 2019

Authors: Dzatur Rizqi Fathienah Syarifuddin, Isharyah Sunarno, Eddy Hartono, Siti Maisuri T. Chalid

Abstract:

Introduction: The potential impact of coronavirus disease 2019 (COVID-19) on the health of expectant mothers and fetuses has strained attention. Pregnant women are considered a vulnerable category to respiratory infections. Moreover, several inflammatory cytokines are 2-100 times more abundant in COVID-19 with cytokine storms than in normal individuals; interleukin 6 (IL-6) exhibits much higher elevations. Investigating potential relationships between IL-6 serum levels and the severity of COVID-19 symptoms in pregnant women is the aim of this study. Material and Methods: Sixty-two eligible pregnant women were divided into a positive COVID-19 group (n=31) and a negative COVID-19 group (n=31) in this cross-sectional study. The research subjects were selected using consecutive sampling. The IL-6 was measured from a vein blood specimen using ELISA methods. Results: The COVID-19 positive group had a higher median IL-6 serum level (45.35 (35.15- 153.99) vs. 38.86 ± 11.43 (15.02-59.52), p=0.03) than the negative group. On the other hand, the IL-6 serum level had comparable value according to the COVID-19 symptoms severity (88.35 ± 36.14 ng/mL vs. 51.09 ± 25.48 ng/mL vs. 56.02 ± 33.20 ng/mL in moderate symptoms, mild symptoms, and asymptomatic, respectively; p=0.152). Conclusion: Although the IL-6 serum levels are not related to COVID-19 symptoms severity, an elevated of this biomarker was found in pregnant women with affected diagnoses.

Keywords: interleukin-6, pregnancy, COVID-19, several inflammatory

Procedia PDF Downloads 36
649 Exploring the Physical Environment and Building Features in Earthquake Disaster Areas

Authors: Chang Hsueh-Sheng, Chen Tzu-Ling

Abstract:

Earthquake is an unpredictable natural disaster and intensive earthquakes have caused serious impacts on social-economic system, environmental and social resilience. Conventional ways to mitigate earthquake disaster are to enhance building codes and advance structural engineering measures. However, earthquake-induced ground damage such as liquefaction, land subsidence, landslide happen on places nearby earthquake prone or poor soil condition areas. Therefore, this study uses spatial statistical analysis to explore the spatial pattern of damaged buildings. Afterwards, principle components analysis (PCA) is applied to categorize the similar features in different kinds of clustered patterns. The results show that serious landslide prone area, close to fault, vegetated ground surface and mudslide prone area are common in those highly damaged buildings. In addition, the oldest building might not be directly referred to the most vulnerable one. In fact, it seems that buildings built between 1974 and 1989 become more fragile during the earthquake. The incorporation of both spatial statistical analyses and PCA can provide more accurate information to subsidize retrofit programs to enhance earthquake resistance in particular areas.

Keywords: earthquake disaster, spatial statistic analysis, principle components analysis (pca), clustered patterns

Procedia PDF Downloads 286
648 Naive Art Communication Guideline to Enhance Meditation of the Person Preparing to Be Quality Elders

Authors: Muanfun Kongsomsawaeng, Bavonsan Chiadamrong

Abstract:

According to statistics, Chanthaburi Province has a high proportion of persons who will become elders, and the knowledge gap surrounding Naive art activities is still not significant. It leads the researcher to discover an exciting possibility. This research will produce an alternate activity to increase meditation in a way that is not directly tied to religion or must be done solely at religious places. This article describes the Naive art communication guideline to enhance the meditation of the person preparing to be a quality elder that must consider communication elements, which consists of sender, message, channel, which includes mainly personal media and activity media, receiver, and the factors that contribute to the success of Naive art, that are the activity leader (if any), the person preparing to be quality elders, communication context, and related person or agency. The intrapersonal communication with this activity brings those people to get an experience of meditation at the momentary level. Therefore, it is another option to enhance meditation in daily life, which can be done continuously and developed into a career. However, if those preparing to be quality elders want to focus more on meditation practice, they can try both Naive art activity and direct meditation practice together. In addition, Naive art activity can be applied to people who are interested in art activity and other target groups as well, such as children with ADHD and other vulnerable groups. However, Naive art activity has no fixed rules and no restrictions on creativity. This affects both the ease of making the works of art and, at the same time, it may be a too broad proposition for some people.

Keywords: naive art, communication guideline, meditation, quality elders

Procedia PDF Downloads 23
647 Mastery and Lifestyle Intervention to Prevent Preterm Birth among Latinas

Authors: Kathie Records, R. Jeanne Ruiz, Kimberly Ayers, Rebecca Pasillas

Abstract:

Background: Preterm births of less than 37 weeks gestation occur disproportionately to Hispanics living along the U.S.-Mexico border. Prematurity has devastating and costly effects on children, families and the health care system. Few preventive interventions have been tested for this vulnerable group. Objectives: To present the modeling and pilot testing of the theory-based Mastery Lifestyle Intervention (MLI), designed to reduce and prevent PTB among Mexican American women (the terms Hispanics or Latinas will also be used to represent this group) living in the United States. Design and Methods: The conceptualization of the problem of preterm births and the available literature underpinning the mastery lifestyle intervention will be reviewed. The lifestyle intervention includes foundational components of problem solving therapy and acceptance and commitment therapy. Findings from implementation of a one-group pilot test and focus group evaluated the feasibility and acceptability of the MLI. Summary: Participants found the MLI to be feasible and acceptable, and reported perceiving improved health status and familial relationships. Suggestions were provided for modifications prior to efficacy testing. The MLI appears to be a theoretically and empirically grounded intervention that holds promise for preventing preterm births among Latinas.

Keywords: birth, Hispanic, intervention, stress

Procedia PDF Downloads 346
646 Gender Based of Sustainable Food Self-Resilience for Village Using Dynamic System Model

Authors: Kholil, Laksanto Utomo

Abstract:

The food needs of the Indonesian people will continue increase year to year due to the increase of population growth. For ensuring food securityand and resilience, the government has developed a program food self-resilience village since 2006. Food resilience is a complex system, consisting of subsystem availability, distribution and consumption of the sufficiency of food consumed both in quantity and quality. Low access, and limited assets to food sources is the dominant factor vulnerable of food. Women have a major role in supporting the productive activities of the family to meet food sufficiency and resilience. The purpose of this paper is to discuss the model of food self-resilience village wich gender responsive by using a dynamic system model. Model will be developed into 3 level: family, vilage, and regency in accordance with the concept of village food resilience model wich has been developed by ministry of agriculture. Model development based on the results of experts discussion and field study. By some scenarios and simulation models we will able to develop appropriate policy strategies for family food resilience. The result of study show that food resilience was influenced by many factors: goverment policies, technology, human resource, and in the same time it will be a feed back for goverment policies and number of poor family.

Keywords: food availability, food sufficiency, gender, model dynamic, law enfrocement

Procedia PDF Downloads 515
645 Development of an Information System Based on the Establishment and Evaluation of Performance Rating by Application Part/Type of Remodeling Element Technologies

Authors: Sungwon Jung

Abstract:

The percentage of 20 years or older apartment houses in South Korea is approximately 20% (1.55 million houses), and the explosive increase of aged houses is expected around the first planned new towns. Accordingly, we should prepare for social issues such as difficulty of housing lease and degradation of housing performance. The improvement of performance of aged houses is essential for achieving the national energy and carbon reduction goals, and we should develop techniques to respond to the changing construction environment. Furthermore, we should develop a performance evaluation system that is appropriate for the demands of residents such as the improvement of remodeling floor plan by performance improvement in line with the residence type of the housing vulnerable groups such as low-income group and elderly people living alone. For this purpose, remodeling techniques and business models optimized for the target complexes must be spread through the development of various business models. In addition, it is necessary to improve the remodeling business by improving the laws and systems related to the improvement of the residential performance and to prepare techniques to respond to the increasing business demands. In other words, performance improvement and evaluation and knowledge systems need to be researched as new issues related to remodeling that has not been addressed in the existing research.

Keywords: remodelling, performance evaluation, web-based system, big data

Procedia PDF Downloads 204
644 The Effect of Vertical Shear-link in Improving the Seismic Performance of Structures with Eccentrically Bracing Systems

Authors: Mohammad Reza Baradaran, Farhad Hamzezarghani, Mehdi Rastegari Ghiri, Zahra Mirsanjari

Abstract:

Passive control methods can be utilized to build earthquake resistant structures, and also to strengthen the vulnerable ones. One of the most effective, yet simple passive control methods is the use of vertical shear-links (VSL) in systems with eccentric bracing. In fact, vertical shear-links dissipate the earthquake energy and act like a ductile fuse. In this paper, we studied the effect of this system in increasing the ductility and energy dissipation and also modeled the behavior of this type of eccentric bracing, and compared the hysteresis diagram of the modeled samples with the laboratory samples. We studied several samples of frames with vertical shear-links in order to assess the behavior of this type of eccentric bracing. Each of these samples was modeled in finite element software ANSYS 9.0, and was analyzed under the static cyclic loading. It was found that vertical shear-links have a more stable hysteresis loops. Another analysis showed that using honeycomb beams as the horizontal beam along with steel reinforcement has no negative effect on the hysteresis behavior of the sample.

Keywords: vertical shear-link, passive control, cyclic analysis, energy dissipation, honeycomb beam

Procedia PDF Downloads 464
643 Differential Infection of Primary Human B-Cells and EBV Positive B-Lymphoma Cell Lines by Recombinant AAV Serotypes

Authors: Elham Ahmadi, Mehrdad Ravanshad, Joyce Fingeroth, Mazyar Ziyaeyan, Rajesh Panigrahi, Jun Xie, Gao Guangping

Abstract:

B-cell proliferative disorders often occur among persons that are T-cell compromised. These disorders are primarily EBV+ and can first present with a focal lesion. Direct introduction of oncolytic viruses into localized tumors provides theoretical advantages over chemotherapy and immunotherapy by reducing systemic toxicity, to which the immunocompromised host is most vulnerable. Widely studied as a vehicle for gene therapy, AAV has only rarely been applied to treat cancer. As a prelude to development of a therapeutic vehicle, we assessed the ability of 15 distinct recombinant AAV serotypes (rAAV1, rAAV2, rAAV3b, rAAV4, rAAV5, rAAV6, rAAV6.2, rAAV6TM, rAAV7, rAAV8, rAAVrh8, rAAV9, rAAVrh10, rAAV39, rAAV43) bearing eGFP to infect human B-cell tumor lines compared with primary B-cells in vitro. Enhanced infection of tumor lines by AAV 6.2 was demonstrated by flow cytometry. EBV superinfection of EBV negative B-cell tumor lines increased susceptibility to AAV6.2 infection. As proof of concept, AAV6.2 bearing HSV-1 thymidine kinase in place of eGFP eliminated tumor cells upon exposure to ganciclovir.

Keywords: AAV, gene therapy, lymphoma, malignancy, tropism

Procedia PDF Downloads 92
642 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 310
641 The Political Economy of Human Trafficking and Human Insecurity in Asia: The Case of Japan, Thailand and India

Authors: Mohammed Bashir Uddin

Abstract:

Human trafficking remains as a persistent problem in many parts of the world. It is considered by many countries as an issue of a threat to national security. Border enforcement to prevent trafficking has been the main incentive, which eventually causes human insecurity for vulnerable people, especially for women. This research argues that focus needs to be placed on the political economy of trafficking, hence on the supply and demand sides of trafficking from a broader socio-economic perspective. Trafficking is a global phenomenon with its contemporary origins in the international capitalist market system. This research investigates particularly the supply-demand nexus on the backdrop of globalization and its impact on human security. It argues that the nexus varies across the countries, particularly the demand side. While prostitution has been the sole focus of the demand side in all countries in Asia, the paper argues that organ trade, bonded labor, cheap and exploitable labor through false recruitment (male trafficking) and adoption are some of the rising demands that explore new trends of trafficking, which could be better explained through international political economy (IPE). Following a qualitative research method, the paper argues that although demands vary in destination countries, they are the byproducts of IPE which have different socio-economic impacts both on trafficked individuals and the states.

Keywords: globalization, human security, human trafficking, political economy

Procedia PDF Downloads 446
640 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 261
639 Feeding Ecology and Habitat Preference of Red Panda in Dhorpatan Hunting Reserve, Nepal

Authors: Saroj Panthi

Abstract:

The red panda (Ailurus fulgens fulgens) is distributed throughout the Himalayas and is found in both protected and unprotected areas of Nepal. Loss and fragmentation of habitat threaten red panda population throughout its range, and as a consequence, it is listed as vulnerable on the IUCN Red List of Threatened Species. Despite this pressing situation, data on the ecology of the red panda in western Nepal are lacking. Our aim in the current study was to determine the distribution, associated habitats, and summer diet of the red panda in Dhorpatan Hunting Reserve (DHR), Nepal. Evidence of red pandas was found in all 7 blocks of the reserve, spanning an area of 345.8 km2, between elevations of 2800 m and 4000 m and predominantly (> 75%) in forests comprising plant communities dominated by Abies spectabilis, Acer caesium, Tsuga domusa, and Betula utilis, with ground cover of Arundinaria spp. The dominant plant found in scat of the red panda was Arundinaria spp. (81.7%), with Acer spp., B. utilis, and lichen also frequently present. Livestock grazing and human activities were significantly higher in habitats where signs of pandas were recorded than in areas where they were absent. This habitat overlap between the red panda and livestock potentially poses a major threat to the panda’s survival in the DHR, a fact that should be taken into account in devising management strategies for this threatened species.

Keywords: red panda, Dhorpatan hunting reserve, diet, habitat preference

Procedia PDF Downloads 326
638 Climate Variability on Hydro-Energy Potential: An MCDM and Neural Network Approach

Authors: Apu Kumar Saha, Mrinmoy Majumder

Abstract:

The increase in the concentration of Green House gases all over the World has induced global warming phenomena whereby the average temperature of the world has aggravated to impact the pattern of climate in different regions. The frequency of extreme event has increased, early onset of season and change in an average amount of rainfall all are engrossing the conclusion that normal pattern of climate is changing. Sophisticated and complex models are prepared to estimate the future situation of the climate in different zones of the Earth. As hydro-energy is directly related to climatic parameters like rainfall and evaporation such energy resources will have to sustain the onset of the climatic abnormalities. The present investigation has tried to assess the impact of climatic abnormalities upon hydropower potential of different regions of the World. In this regard multi-criteria, decision making, and the neural network is used to predict the impact of the change cognitively by an index. The results from the study show that hydro-energy potential of Asian region is mostly vulnerable with respect to other regions of the world. The model results also encourage further application of the index to analyze the impact of climate change on the potential of hydro-energy.

Keywords: hydro-energy potential, neural networks, multi criteria decision analysis, environmental and ecological engineering

Procedia PDF Downloads 526
637 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 206
636 To Improve or Not to Improve Reflections from Jerash Urban Improvement Project, Jordan

Authors: Dina Dahood Dabash

Abstract:

Palestine Refugee Camps have never been settings that can be overlooked; they even became (as physical settings) a cornerstone topic of negotiations whenever Palestinian matters are on the table (specifically in Jordan). Consequently, maintaining the familiar face of the camp with its dilapidated shelters and narrow streets that rarely allowed its residents to extinguish a fire or evacuate a building safely has become a fundamental method to protect the “right of the return” from the perspective of various stakeholders. When the Infrastructure and Camp Improvement Programme (ICIP) was established in 2007 as an additional UNRWA program, some concerns were raised around the newly established section, mainly due to its direct impact on the “image” of the camp through a provision of a relatively nonconventional service that differs from what the Agency used to provide in the past seventy years. By presenting the Urban Improvement Project in Jerash camp (UIP) -Jordan, this paper aims to contribute to the ongoing discussion around enduring the improvement of Palestine refugee camps “programmatically” in UNRWA or not. The UIP as a co-product by UNRWA and the camp’s community within one of the most vulnerable refugee camps in Jordan offers a remarkable opportunity to excerpt lessons that can contribute to the strategic shaping of the ICIP. The paper concludes with five mine uptakes mainly related to community engagement, power structures and UNRWA's role in camps.

Keywords: camp improvement program, Jerash camp, Palestine refugee camps, UNRWA.

Procedia PDF Downloads 182
635 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 333
634 An Ethnographic Study on How Namibian Sex Workers Experience Their Violation of Rights

Authors: Tessa Verhallen, Mama Africa

Abstract:

By co-constructing personal narratives of sex workers in Namibia this paper represents how sex workers experience their violation of rights in Namibia. It is written from an emic (as an advisor for a sex worker-led organization named Rights not Rescue Trust) and an etic (as an ethnographer) point of view, in collaboration with the staff of the organization Rights not Rescue Trust. This organization represents circa 3000 members. The paper describes the current deplorable situation of sex workers in Namibia, encompassing the stigma and discrimination they face, their struggle to have their work decriminalized and their urge to advocate for human rights and the end of violations. Based on a triangular research design (ethnography, narratives, literature study, human rights’ training and counseling sessions) the authors show that sex workers, particularly LGBTI sex workers, are extremely vulnerable to emotional, physical, and sexual violence in Namibia. The main perpetrators of violence turn out to be not only clients and intimate partners but also law enforcement officers and health care workers who are supposed to protect and support sex workers. The sex workers’ narratives voice their disgraceful circumstances regarding how their rights are violated. It also highlights their importance to fight for their rights and access to health care, legal services and education in order to improve the sexual reproductive health of sex workers.

Keywords: HIV/aids, LGBTI, methodological innovative, sex work

Procedia PDF Downloads 287
633 Effects of Artificial Intelligence Technology on Children: Positives and Negatives

Authors: Paula C. Latorre Arroyo, Andrea C. Latorre Arroyo

Abstract:

In the present society, children are exposed to and impacted by technology from very early on in various ways. Artificial intelligence (AI), in particular, directly affects them, be it positively or negatively. The concept of artificial intelligence is commonly defined as the technological programming of computers or robotic mechanisms with humanlike capabilities and characteristics. These technologies are often designed as helpful machines or disguised as handy tools that could ultimately steal private information for illicit purposes. Children, being one of the most vulnerable groups due to their lack of experience and knowledge, do not have the ability to recognize or have the malice to distinguish if an apparatus with artificial intelligence is good or bad for them. For this reason, as a society, there must be a sense of responsibility to regulate and monitor different types of uses for artificial intelligence to protect children from potential risks that might arise. This article aims to investigate the many implications that artificial intelligence has in the lives of children, starting from a home setting, within the classroom, and, ultimately, in online spaces. Irrefutably, there are numerous beneficial aspects to the use of artificial intelligence. However, due to its limitless potential and lack of specific and substantial regulations to prevent the illicit use of this technology, safety and privacy concerns surface, specifically regarding the youth. This written work aims to provide an in-depth analysis of how artificial intelligence can both help children and jeopardize their safety. Concluding with resources and data supporting the aforementioned statement.

Keywords: artificial intelligence, children, privacy, rights, safety

Procedia PDF Downloads 40
632 Leveraging Hyperledger Iroha for the Issuance and Verification of Higher-Education Certificates

Authors: Vasiliki Vlachou, Christos Kontzinos, Ourania Markaki, Panagiotis Kokkinakos, Vagelis Karakolis, John Psarras

Abstract:

Higher Education is resisting the pull of technology, especially as this concerns the issuance and verification of degrees and certificates. It is widely known that education certificates are largely produced in paper form making them vulnerable to damage while holders of such certificates are dependent on the universities and other issuing organisations. QualiChain is an EU Horizon 2020 (H2020) research project aiming to transform and revolutionise the domain of public education and its ties with the job market by leveraging blockchain, analytics and decision support to develop a platform for the verification and sharing of education certificates. Blockchain plays an integral part in the QualiChain solution in providing a trustworthy environment to store, share and manage such accreditations. Under the context of this paper, three prominent blockchain platforms (Ethereum, Hyperledger Fabric, Hyperledger Iroha) were considered as a means of experimentation for creating a system with the basic functionalities that will be needed for trustworthy degree verification. The methodology and respective system developed and presented in this paper used Hyperledger Iroha and proved that this specific platform can be used to easily develop decentralize applications. Future papers will attempt to further experiment with other blockchain platforms and assess which has the best potential.

Keywords: blockchain, degree verification, higher education certificates, Hyperledger Iroha

Procedia PDF Downloads 113
631 Trade-Offs between Verb Frequency and Syntactic Complexity in Children with Developmental Language Disorder

Authors: Pui I. Chao, Shanju Lin

Abstract:

Purpose: Children with developmental language disorder (DLD) have persistent language difficulties and often face great challenges when demands are high. The aim of this study was to investigate whether verb frequency would trade-off with syntactic complexity when they talk. Method: Forty-five children with DLD, 45 chronological age matches with TD (AGE), and 45 MLU-matches with TD (MLU) who were Mandarin speakers were selected from the previous study. Language samples were collected under three contexts: conversation about children’s family and school, story retelling, and free play. MLU, verb density, utterance length difference, verb density difference, and average verb frequency were calculated and further analyzed by ANOVAs. Results: Children with DLD and their MLU matches produced shorter utterances and used fewer verbs in expressions than the AGE matches. Compared to their AGE matches, the DLD group used more verbs and verbs with lower frequency in shorter utterances but used fewer verbs and verbs with higher frequency in longer utterances. Conclusion: Mandarin-speaking children with DLD showed difficulties in verb usage and were more vulnerable to trade-offs than their age-matched peers in utterances with high demand. As a result, task demand should be taken into account as speech-language pathologists assess whether children with DLD have adequate abilities in verb usage.

Keywords: developmental language disorder, syntactic complexity, trade-offs, verb frequency

Procedia PDF Downloads 130
630 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 130
629 Comparison of Impulsivity Trait in Males and Females: Exploring the Sex Difference in Impulsivity

Authors: Pinhas Dannon, Aviv Weinstein

Abstract:

Impulsivity is raising major interest clinically because it is associated with various clinical conditions such as delinquency, antisocial behavior, suicide attempts, aggression, and criminal activity. The evolutionary perspective argued that impulsivity relates to self-regulation and it has predicted that female individuals should have evolved a greater ability to inhibit pre-potent responses. There is supportive evidence showing that female individuals have better performance on cognitive tasks measuring impulsivity such as delay in gratification and delayed discounting mainly in childhood. During adolescence, brain imaging studies using diffusion tensor imaging on white matter architecture indicated contrary to the evolutionary perspective hypothesis, that young adolescent male individuals may be less vulnerable than age-matched female individuals to risk- and reward- related maladaptive behaviors. In adults, the results are mixed presumably owing to hormonal effects on neuro-biological mechanisms of reward. Consequently, female individuals were less impulsive than male individuals only during fertile stages of the menstrual cycle. Finally, there is evidence the serotonin (5-HT) system is more involved in the impulsivity of men than in that of women. Overall, there seem to be sex differences in impulsivity but these differences are more pronounced in childhood and they are later subject to maturational and hormonal changes during adolescence and adulthood and their effects on the brain, cognition, and behavior.

Keywords: impulse control, male population, female population, gender differences, reward, neurocognitive tests

Procedia PDF Downloads 325
628 The confluence of Societal Dogmas and Extremist (Religious) Ideologies: A Case Study of Male Youth Involved in Violent Extremism in Sargodha and Jhang, Punjab

Authors: Tehmina Aslam

Abstract:

South-Asian societies elicit a male-dominant hierarchy, socio-economically and politico-religiously. The aim of the study was to examine the contribution of gender to violent extremism in order to devise means for its control in Pakistan. A qualitative case study based on interviews was conducted of de-radicalized former militants who were affiliated to militant organizations such as Sipahe Sahaba Pakistan, Lashkare Jhangvi, Laskhare Taibah, and Jaishe Mohammad, and who resided in Sargodha and Jhang, cities of the Punjab. The study exuded three main findings: first, gender alone was insufficient to motivate a male youth to resort to violent extremism; second, gender segregation made a male youth more vulnerable to an extremist ideology; and third, male gender was more prone to the influence of an extremist misguided religious ideology that pandered to male chauvinistic (societal dogmas constructing a male identity) needs and offered a male youth an opportunity to reinforce male dominance in society. The conclusion drawn was that the confluence of societal dogmas and extremist (religious) ideologies offered the major resistance against preventing violent extremism and, without dealing with both of them simultaneously, the tendency in male youth to resorting to violent extremism could not be dissipated.

Keywords: violent extremism, countering violent extremism, preventing violent extremism, youth

Procedia PDF Downloads 110
627 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 133
626 The Folksongs of Jharkhand: An Intangible Cultural Heritage of Tribal India

Authors: Walter Beck

Abstract:

Jharkhand is newly constituted 28th State in the eastern part of India which is known for the oldest settlement of the indigenous people. In the State of Jharkhand in which broadly three language family are found namely, Austric, Dravidian, and Indo-European. Ex-Mundari, kharia, Ho Santali come from the Austric Language family. Kurukh, Malto under Dravidian language family and Nagpuri Khorta etc. under Indo-European language family. There are 32 Indigenous Communities identified as Scheduled Tribe in the State of Jharkhand. Santhal, Munda, Kahria, Ho and Oraons are some of the major Tribe of the Jharkhand state. Jharkhand has a Rich Cultural heritage which includes Folk art, folklore, Folk Dance, Folk Music, Folk Songs for which diversity can been seen from place to place, season to season and all traditional Culture and practices. The languages as well as the songs are vulnerable to dominant culture and hence needed to be protected. The collection and documentation of these songs in their natural setting adds significant contribution to the conservation and propagation of the cultural elements. This paper reflects to bring out the Originality of the Collected Songs from remote areas of the plateau of Sothern Jharkhand as a rich intangible Cultural heritage of the Country. The research was done through participatory observation. In this research project more than 100 songs which were never documented before.

Keywords: cultural heritage, India, indigenous people, songs, languages

Procedia PDF Downloads 183
625 Numerical Simulation for a Shallow Braced Excavation of Campus Building

Authors: Sao-Jeng Chao, Wen-Cheng Chen, Wei-Humg Lu

Abstract:

In order to prevent encountering unpredictable factors, geotechnical engineers always conduct numerical analysis for braced excavation design. Simulation work in advance can predict the response of subsequent excavation and thus will be designed to increase the security coefficient of construction. The parameters that are considered include geological conditions, soil properties, soil distributions, loading types, and the analysis and design methods. National Ilan University is located on the LanYang plain, mainly deposited by clayey soil and loose sand, and thus is vulnerable to external influence displacement. National Ilan University experienced a construction of braced excavation with a complete program of monitoring excavation. This study takes advantage of a one-dimensional finite element method RIDO to simulate the excavation process. The predicted results from numerical simulation analysis are compared with the monitored results of construction to explore the differences between them. Numerical simulation analysis of the excavation process can be used to analyze retaining structures for the purpose of understanding the relationship between the displacement and supporting system. The resulting deformation and stress distribution from the braced excavation cab then be understand in advance. The problems can be prevented prior to the construction process, and thus acquire all the affected important factors during design and construction.

Keywords: excavation, numerical simulation, RIDO, retaining structure

Procedia PDF Downloads 236
624 Tornado Disaster Impacts and Management: Learning from the 2016 Tornado Catastrophe in Jiangsu Province, China

Authors: Huicong Jia, Donghua Pan

Abstract:

As a key component of disaster reduction management, disaster emergency relief and reconstruction is an important process. Based on disaster system theory, this study analyzed the Jiangsu tornado from the formation mechanism of disasters, through to the economic losses, loss of life, and social infrastructure losses along the tornado disaster chain. The study then assessed the emergency relief and reconstruction efforts, based on an analytic hierarchy process method. The results were as follows: (1) An unstable weather system was the root cause of the tornado. The potentially hazardous local environment, acting in concert with the terrain and the river network, was able to gather energy from the unstable atmosphere. The wind belt passed through a densely populated district, with vulnerable infrastructure and other hazard-prone elements, which led to an accumulative disaster situation and the triggering of a catastrophe. (2) The tornado was accompanied by a hailstorm, which is an important triggering factor for a tornado catastrophe chain reaction. (3) The evaluation index (EI) of the emergency relief and reconstruction effect for the ‘‘6.23’’ tornado disaster in Yancheng was 91.5. Compared to other relief work in areas affected by disasters of the same magnitude, there was a more successful response than has previously been experienced. The results provide new insights for studies of disaster systems and the recovery measures in response to tornado catastrophe in China.

Keywords: China, disaster system, emergency relief, tornado catastrophe

Procedia PDF Downloads 242
623 The Balance between the Two Characters of the Night: A Study on the Nightscape of Pei Ho Street and Yen Chow Street West in Sham Shui Po

Authors: Lei Danyang, Lu Jialiang

Abstract:

As nightlife is getting richer in urban area, urban nightscape has become an increasingly important part of the urban landscape. Understanding urban nightscape from the perspec­tive of pedestrian perception is very important to improve the livability and walkability of a city. The purpose of this study is to analyze the nightscapes of two different urban forms. The research methods are literature investigation and field investigation. From analyzing the lighting, sensory ex­perience, and night activities, this research studies the two streets, Pei Ho Street and Yen Chow Street West in Sham Shui Po. Results revealed that the two streets are on the two extremes of the two characters of the night and a better balance needs to be found between them. Because of the different land usage and stakeholders, the two streets should play different roles in the nightscape, so their balance points are also different. On the one hand, Pei Ho Street, which has a strong commercial atmos­phere, should not only retain its vitality and diversity but also ensure its function of relaxation at night; on the other hand, in Yen Chow Street West, it is necessary to develop its potential of reconnecting people with the darkness of the night while ensur­ing its safety. These findings may not only provide policymak­ers with information to help them improve the nightscape and livability of the Sham Shui Po area but also help bridge the gap between research and design. In the future, more attention should be paid to pedestrian preference and nightscape perception of vulnerable groups.

Keywords: Hong Kong, pedestrian perception, Sham Shui Po, urban form, urban nightscape

Procedia PDF Downloads 122
622 Integrating Concepts in Positive Psychology with Suicide Prevention in Children and Adolescents

Authors: S. Wietrzychowski

Abstract:

This systematic review incorporates concepts used in the field of positive psychology in order to integrate important elements into suicide prevention programs for children and adolescents. The goal of this review is to help students and professionals gain insight to available prevention programs for suicide and to incorporate aspects of positive psychology into these programs. Evidence-based interventions such as Positive Youth Development will be discussed in detail in its relation to prevention and positive psychology. Concepts such as hope, optimism, coping, and resilience will be related to these interventions in order to improve these interventions. The review will also explain how these programs can help prevent suicidal thoughts and/or behaviors. Research on mentorship programs and early intervention programs will be included and related to the aforementioned positive psychology concepts. Since children and adolescents are such a vulnerable population, the review will highlight specific considerations for working with children in order to prevent risk factors for suicide and to build protective factors. This review will discuss the effectiveness of school-based programs that are integrated with positive psychology. Elements of these programs that have been shown to be most effective in preventing suicide in schools will also be identified. As a result of this presentation, participants will be able to 1) List at least 2 evidence-based suicide prevention programs, 2) Understand the connection between specific positive psychology concepts and suicide prevention, 3) Identify at least 3 factors which protect against suicide, 4) Describe at least 3 risk factors for suicide, and 5) Think critically about the positive elements of suicide prevention programs.

Keywords: children, adolescents, suicide, positive

Procedia PDF Downloads 353