Search results for: border surveillance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 808

Search results for: border surveillance

778 Guarding the Fortress: Intellectual Property Rights and the European Union’s Cross-Border Jurisdiction

Authors: Sara Vora (Hoxha)

Abstract:

The present article delves into the intricate matters concerning Intellectual Property Rights (IPR) and cross-border jurisdiction within the confines of the European Union (EU). The prevalence of cross-border intellectual property rights (IPR) disputes has increased in tandem with the globalization of commerce and the widespread adoption of technology. The European Union (EU) is not immune to this trend. The manuscript presents a comprehensive analysis of various forms of intellectual property rights (IPR), such as patents, trademarks, and copyrights, and the regulatory framework established by the European Union (EU) to oversee these rights. The present article examines the diverse approaches employed for ascertaining the appropriate jurisdiction within the European Union (EU), and their potential application in the sphere of cross-border intellectual property rights (IPR) conflicts. The article sheds light on jurisdictional issues and outcomes of significant cross-border intellectual property rights (IPR) disputes in the European Union (EU). Additionally, the document provides suggestions for effectively managing intellectual property rights conflicts across borders within the European Union, which encompasses the utilization of alternative methods for resolving disputes. The article highlights the significance of comprehending the relevant jurisdiction in the European Union for Intellectual Property Rights (IPR). It also offers optimal approaches for enterprises and individuals who aim to safeguard their intellectual property beyond national boundaries. The primary objective of this article is to furnish a thorough comprehension of Intellectual Property Rights (IPR) and the relevant jurisdiction in the European Union (EU). Additionally, it endeavors to provide pragmatic recommendations for managing cross-border IPR conflicts in this intricate and ever-changing legal milieu.

Keywords: intellectual property rights (IPR), cross-border jurisdiction, applicable laws and regulations, dispute resolution, best practices

Procedia PDF Downloads 58
777 Efficient Utilization of Unmanned Aerial Vehicle (UAV) for Fishing through Surveillance for Fishermen

Authors: T. Ahilan, V. Aswin Adityan, S. Kailash

Abstract:

UAV’s are small remote operated or automated aerial surveillance systems without a human pilot aboard. UAV’s generally finds its use in military and special operation application, a recent growing trend in UAV’s finds its application in several civil and non military works such as inspection of power or pipelines. The objective of this paper is the augmentation of a UAV in order to replace the existing expensive sonar (sound navigation and ranging) based equipment amongst small scale fisherman, for whom access to sonar equipment are restricted due to limited economic resources. The surveillance equipment’s present in the UAV will relay data and GPS location onto a receiver on the fishing boat using RF signals, using which the location of the schools of fishes can be found. In addition to this, an emergency beacon system is present for rescue operations and drone recovery.

Keywords: UAV, Surveillance, RF signals, fishing, sonar, GPS, video stream, school of fish

Procedia PDF Downloads 438
776 West Nile Virus in North-Eastern Italy: Overview of Integrated Surveillance Activities

Authors: Laura Amato, Paolo Mulatti, Fabrizio Montarsi, Matteo Mazzucato, Laura Gagliazzo, Michele Brichese, Manlio Palei, Gioia Capelli, Lebana Bonfanti

Abstract:

West Nile virus (WNV) re-emerged in north-eastern Italy in 2008, after ten years from its first appearance in Tuscany. In 2009, a national surveillance programme was implemented, and re-modulated in north-eastern Italy in 2011. Hereby, we present the results of surveillance activities in 2008-2016 in the north-eastern Italian regions, with inferences on WNV epidemiological trend in the area. The re-modulated surveillance programmes aimed at early detecting WNV seasonal reactivation by searching IgM antibodies in horses. In 2013, the surveillance plans were further modified including a risk-based approach. Spatial analysis techniques, including Bernoulli space-time scan-statistics, were applied to the results of 2010–2012 surveillance on mosquitoes, equines, and humans to identify areas where WNV reactivation was more likely to occur. From 2008 to 2016, residential horses tested positive for anti-WNV antibodies on a yearly basis (503 cases), also in areas where WNV circulation was not detected in mosquito populations. Surveillance activities detected 26 syndromic cases in horses, 102 infected mosquito pools and WNV in 18 dead wild birds. Human cases were also recurrently detected in the study area during the surveillance period (68 cases of West Nile neuroinvasive disease). The recurrent identification of WNV in animals, mosquitoes, and humans indicates the virus has likely become endemic in the area. In 2016, findings of WNV positives in horses or mosquitoes were included as triggers for enhancing screening activities in humans. The evolution of the epidemiological situation prompts for continuous and accurate surveillance measures. The results of the 2013-2016 surveillance indicate that the risk-based approach was effective in early detecting seasonal reactivation of WNV, key factor of the integrated surveillance strategy in endemic areas.

Keywords: arboviruses, horses, Italy, surveillance, west nile virus, zoonoses

Procedia PDF Downloads 334
775 Women's Vulnerability to Cross-Border Criminality in Saki/Iseyin Area of Oyo State in Nigeria: Insight and Experiences

Authors: Samuel Kehinde Okunade, Daniel Sunday Tolorunshagba

Abstract:

Globally women are classified to be part of the vulnerable group in any environment. In a conflict-ridden environment, women being vulnerable often suffer the consequences as it relates to security and access to basic social services such as medical care. This is the situation in border communities in Nigeria where cross-border crimes are on the rife, thus, putting women at a disadvantaged position and, eventually, victims of such inimical activities. Border communities in the Saki/Iseyin area of Oyo state are a case in point where the lives of inhabitants are daily threatened most, especially women. In light of the above, this article examined the security situation of the Saki/Iseyin area of Oyo State with a view to ascertaining its status in terms of safety of lives and property. This paper also explored the experiences of women in the border communities within the area as it relates to their safety, the safety of their children, access to good health facilities in their immediate environment, and above all, how they have been able to cope or manage the situation. The qualitative research model was adopted utilizing a phenomenological case study approach. A Focused Group Discussion was conducted with 10 pregnant women and 10 mothers in Okerete and Abugudu communities while a Key Informant Interview was conducted with the women leaders in both communities of the Saki/Iseyin border area of Oyo State. The findings of the study revealed the poor state of basic infrastructure. So bad to a point that inhabitants of these communities no longer see themselves as Nigerians because they have been neglected by the government for too long. The only solution is for the government to embark on developmental projects within these communities so that they can live a good life just as those in the cities do. More importantly, this will increase the loyalty of these communities to the Nigeria state by defending and resisting all forms of cross-border criminal activities that go on along the porous borders.

Keywords: security, women, Saki/Iseyin border area, cross-border criminalities, basic infrastructure

Procedia PDF Downloads 110
774 Bayesian Prospective Detection of Small Area Health Anomalies Using Kullback Leibler Divergence

Authors: Chawarat Rotejanaprasert, Andrew Lawson

Abstract:

Early detection of unusual health events depends on the ability to detect rapidly any substantial changes in disease, thus facilitating timely public health interventions. To assist public health practitioners to make decisions, statistical methods are adopted to assess unusual events in real time. We introduce a surveillance Kullback-Leibler (SKL) measure for timely detection of disease outbreaks for small area health data. The detection methods are compared with the surveillance conditional predictive ordinate (SCPO) within the framework of Bayesian hierarchical Poisson modeling and applied to a case study of a group of respiratory system diseases observed weekly in South Carolina counties. Properties of the proposed surveillance techniques including timeliness and detection precision are investigated using a simulation study.

Keywords: Bayesian, spatial, temporal, surveillance, prospective

Procedia PDF Downloads 291
773 Spatial Cluster Analysis of Human Cases of Crimean Congo Hemorrhagic Fever Reported in Pakistan

Authors: Tariq Abbas, Younus Muhammad, Sayyad Aun Muhammad

Abstract:

Background : Crimean Congo hemorrhagic fever (CCHF) is a tick born viral zoonotic disease that has been notified from almost all regions of Pakistan. The aim of this study was to investigate spatial distribution of CCHF cases reported to National Institue of Health , Islamabad during year 2013. Methods : Spatial statistics tools were applied to detect extent spatial auto-correlation and clusters of the disease based on adjusted cumulative incidence per million population for each district. Results : The data analyses revealed a large multi-district cluster of high values in the uplands of Balochistan province near Afghanistan border. Conclusion : The cluster included following districts: Pishin; Qilla Abdullah; Qilla Saifullah; Quetta, Sibi; Zhob; and Ziarat. These districts may be given priority in CCHF surveillance, control programs, and further epidemiological research . The location of the cluster close to border of Afghanistan and Iran highlight importance of the findings for organizations dealing with disease at national, regional and global levels.

Keywords: Crimean Congo hemorrhagic fever, Pakistan, spatial autocorrelation, clusters , adjusted cumulative incidence

Procedia PDF Downloads 390
772 Development and Implementation of E-Disease Surveillance Systems for Public Health Southern Africa: A Critical Review

Authors: Taurai T. Chikotie, Bruce W. Watson

Abstract:

The manifestation of ‘new’ infectious diseases and the re-emergence of ‘old’ infectious diseases now present global problems and Southern Africa has not been spared from such calamity. Although having an organized public health system, countries in this region have failed to leverage on the proliferation in use of Information and Communication Technologies to promote effective disease surveillance. Objective: The objective of this study was to critically review and analyse the crucial variables to consider in the development and implementation of electronic disease surveillance systems in public health within the context of Southern Africa. Methodology: A critical review of literature published in English using, Google Scholar, EBSCOHOST, Science Direct, databases from the Centre for Disease Control (CDC and articles from the World Health Organisation (WHO) was undertaken. Manual reference and grey literature searches were also conducted. Results: Little has been done towards harnessing the potential of information technologies towards disease surveillance and this has been due to several challenges that include, lack of funding, lack of health informatics experts, poor supporting infrastructure, an unstable socio-political and socio-economic ecosystem in the region and archaic policies towards integration of information technologies in public health governance. Conclusion: The Southern African region stands to achieve better health outcomes if they adopt the use of e-disease surveillance systems in public health. However, the dynamics and complexities of the socio-economic, socio-political and technical variables would need addressing to ensure the successful development and implementation of e-disease surveillance systems in the region.

Keywords: critical review, disease surveillance, public health informatics, Southern Africa

Procedia PDF Downloads 259
771 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria

Authors: Nuhu Bitrus Mailabari

Abstract:

Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.

Keywords: border, cross border, migration, Nigeria, northeast region, security

Procedia PDF Downloads 143
770 Video Foreground Detection Based on Adaptive Mixture Gaussian Model for Video Surveillance Systems

Authors: M. A. Alavianmehr, A. Tashk, A. Sodagaran

Abstract:

Modeling background and moving objects are significant techniques for video surveillance and other video processing applications. This paper presents a foreground detection algorithm that is robust against illumination changes and noise based on adaptive mixture Gaussian model (GMM), and provides a novel and practical choice for intelligent video surveillance systems using static cameras. In the previous methods, the image of still objects (background image) is not significant. On the contrary, this method is based on forming a meticulous background image and exploiting it for separating moving objects from their background. The background image is specified either manually, by taking an image without vehicles, or is detected in real-time by forming a mathematical or exponential average of successive images. The proposed scheme can offer low image degradation. The simulation results demonstrate high degree of performance for the proposed method.

Keywords: image processing, background models, video surveillance, foreground detection, Gaussian mixture model

Procedia PDF Downloads 499
769 Power Line Communication Integrated in a Wireless Power Transfer System: Feasibility of Surveillance Movement

Authors: M. Hemnath, S. Kannan, R. Kiran, K. Thanigaivelu

Abstract:

This paper is based on exploring the possible opportunities and applications using Power Line Communication (PLC) for security and surveillance operations. Various research works are done for introducing PLC into onboard vehicle communication and networking (CAN, LIN etc.) and various international standards have been developed. Wireless power transfer (WPT) is also an emerging technology which is studied and tested for recharging purposes. In this work we present a system which embeds the detection and the response into one which eliminates the need for dedicated network for data transmission. Also we check the feasibility for integrating wireless power transfer system into this proposed security system for transmission of power to detection unit wirelessly from the response unit.

Keywords: power line communication, wireless power transfer, surveillance

Procedia PDF Downloads 513
768 Root Cause Analysis of Surveillance Quality in Tanjung Priok Port to Prevent Epidemic Potential Disease as a Form of Bioterrorism Threat

Authors: Dina A. Amu, Fifi N. Afifah, Catur Rosidati, Tirton Nefianto

Abstract:

Indonesia was shaken up by the avian influenza cases that had caused the country suffered losses of millions of dollars. The avian influenza case had even been suspected as a bioterrorism attack since it was an uncommon case in epidemiology. Furthermore, this avian influenza virus is a high pathogenic one and Indonesia has the highest case of fatality rate in the world. Bioterrorism threats or epidemic potential disease outbreaks currently does not exist in Tanjung Priok port yet. However, the surveillance system enhancement on epidemic potential diseases should be taken as a prevention, especially because Indonesia is currently facing the ASEAN Economic Society (AES). Therefore, this research evaluates the health surveillance system which is organized by Control, Quarantine and Surveillance Department, Health Office of Tanjung Priok Port. This study uses qualitative-evaluative method which utilizes Urgency Seriousness Growth (USG) method to determine priority issues and Root Cause analysis to determine the cause of prior problem. The result of this research shows that the implementation of epidemic potential disease surveillance in Tanjung Priok port has not done in the best possible way. It is because the lack of time allocation and the succinctness of the check list of ship's environmental health inspection. Therefore, Health Ministry of Indonesia should recruit more employees at the health office of Tanjung Priok port, hold a simulation of ship's inspection and simplify the list for ship's environmental health inspection.

Keywords: surveillance, epidemic potential disease, port health, bioterrorism

Procedia PDF Downloads 345
767 The Effects of Cross-Border Use of Drones in Nigerian National Security

Authors: H. P. Kerry

Abstract:

Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.

Keywords: armed drones, drones, cross-border, national security

Procedia PDF Downloads 139
766 The Self-Care During Pregnancy of Muslim Adolescents in Southern Border Provinces, Thailand

Authors: Benyapa Thitimapong, Najwa Niyomdecha

Abstract:

This qualitative descriptive research aimed to explore the self-care experiences during pregnancy of Muslim adolescents. Twenty participants were first-time Muslim mothers who had pregnancy experienceห under 20 years of age in three Southern border provinces of Thailand. Participants were selected by purposive sampling with inclusion criteria. Data were collected from the in-depth interview and analyzed using content analysis. The findings revealed that Muslim pregnant adolescents take care of themselves in the context of combining self-care in an Islamic way and conventional medicine. There are 2 subthemes: 1) antenatal care with Tok Bidan and 2) health promotion during pregnancy. The finding will help to understand self-care during pregnancy of Muslim adolescents among three Southern border provinces and can apply to nurse educators as a guide to educate and manage an appropriate self-care program for Muslim pregnant adolescents based on cultural diversity.

Keywords: adolescents, muslim, pregnancy, selfcare

Procedia PDF Downloads 102
765 Sea Border Dispute between Greece and Turkey in the Mediterrenean: Implications for Turkey’s Maritime Security and Its Military Spending

Authors: Aslihan Caliskan

Abstract:

The term Mediterranean comes from the Latin “mediterraneus” (Medius, "middle" plus Terra, "land, earth"). For the ancient Romans, the Mediterranean was the center of the earth as they knew it. The desire to gain control of the Mediterranean has led to disputes between many nations throughout history, some of which continue to this day. The recent major natural gas discoveries in the Mediterranean have aggravated ongoing tensions in some neighboring countries. The sea border dispute between Turkey and Greece & Greek-Cypriot side is one of the most critical conflicts in the Mediterranean Sea region. This unresolved dispute has many implications for all countries involved, as well as for third parties that have direct or indirect interests in the region. The research question of this context is what are the implications of this controversial sea border problem on the maritime security of Turkey and its military spending. In this paper, the quantitative method is used. Records from the Turkish Defense Ministry, data from the Turkish naval forces have been obtained. In addition, literature research and the United Nations Convention on the Law of the Sea (UNCLOS) application cases were evaluated, and an incident analysis was carried out. This research shows that the sea border dispute issue has a significant impact on the Turkish military both in terms of the structures required to ensure maritime and border security, as well as rising military costs and its macroeconomic implications. The paper begins with a brief overview of relevant principles and methods applied for delimiting th esea borders. The paper continues with a brief description and a background of the sea border dispute between Turkey and Greece & Greek-Cypriot side in the light of the United Nations Convention on the Law of the Sea (UNCLOS). An analysis of the implications of the dispute on Turkey’s maritime security and its military spending is provided in the following chapters. The paper ends with concluding remarks of the author, including suggestions for the way forward.

Keywords: sea border security, mediterranean sea, greece-turkey dispute, limitation of sea, united nations convention on the law of the sea (UNCLOS)

Procedia PDF Downloads 161
764 Face Recognition Using Body-Worn Camera: Dataset and Baseline Algorithms

Authors: Ali Almadan, Anoop Krishnan, Ajita Rattani

Abstract:

Facial recognition is a widely adopted technology in surveillance, border control, healthcare, banking services, and lately, in mobile user authentication with Apple introducing “Face ID” moniker with iPhone X. A lot of research has been conducted in the area of face recognition on datasets captured by surveillance cameras, DSLR, and mobile devices. Recently, face recognition technology has also been deployed on body-worn cameras to keep officers safe, enabling situational awareness and providing evidence for trial. However, limited academic research has been conducted on this topic so far, without the availability of any publicly available datasets with a sufficient sample size. This paper aims to advance research in the area of face recognition using body-worn cameras. To this aim, the contribution of this work is two-fold: (1) collection of a dataset consisting of a total of 136,939 facial images of 102 subjects captured using body-worn cameras in in-door and daylight conditions and (2) evaluation of various deep-learning architectures for face identification on the collected dataset. Experimental results suggest a maximum True Positive Rate(TPR) of 99.86% at False Positive Rate(FPR) of 0.000 obtained by SphereFace based deep learning architecture in daylight condition. The collected dataset and the baseline algorithms will promote further research and development. A downloadable link of the dataset and the algorithms is available by contacting the authors.

Keywords: face recognition, body-worn cameras, deep learning, person identification

Procedia PDF Downloads 147
763 Automatic Motion Trajectory Analysis for Dual Human Interaction Using Video Sequences

Authors: Yuan-Hsiang Chang, Pin-Chi Lin, Li-Der Jeng

Abstract:

Advance in techniques of image and video processing has enabled the development of intelligent video surveillance systems. This study was aimed to automatically detect moving human objects and to analyze events of dual human interaction in a surveillance scene. Our system was developed in four major steps: image preprocessing, human object detection, human object tracking, and motion trajectory analysis. The adaptive background subtraction and image processing techniques were used to detect and track moving human objects. To solve the occlusion problem during the interaction, the Kalman filter was used to retain a complete trajectory for each human object. Finally, the motion trajectory analysis was developed to distinguish between the interaction and non-interaction events based on derivatives of trajectories related to the speed of the moving objects. Using a database of 60 video sequences, our system could achieve the classification accuracy of 80% in interaction events and 95% in non-interaction events, respectively. In summary, we have explored the idea to investigate a system for the automatic classification of events for interaction and non-interaction events using surveillance cameras. Ultimately, this system could be incorporated in an intelligent surveillance system for the detection and/or classification of abnormal or criminal events (e.g., theft, snatch, fighting, etc.).

Keywords: motion detection, motion tracking, trajectory analysis, video surveillance

Procedia PDF Downloads 519
762 Authenticity during Conflict Reporting: The China-India Border Clash in the Indian Press

Authors: Arjun Chatterjee

Abstract:

The India-China border clash in Galwan valley in June 2020, the first deadly skirmish between the two Asian giants in the Himalayan border area in over four decades, highlighted the need to examine the notion of ‘authenticity’ in journalistic practices. Information emanating from such remotely located, sparsely populated, and not well-demarcated international land borders have limited sources, restricted to official sources, which have their own narrative. Geopolitical goals and ambitions embolden narratives of nationalism in the media, and these often challenge the notion and understanding of authenticity in journalism. The Indian press, contrary to the Chinese press, which is state-owned, is diverse and also confrontational, where narratives of nationalism are differentially interpreted, embedded, and realised. This paper examines how authenticity has become a variable, rather than a constant, in conflict reporting of the Sino-Indian border clash and how authenticity is interpreted similarly or differently in conflict journalism. The paper reports qualitative textual analysis of two leading English language newspapers – The Times of India and The Hindu, and two mainstream regional language newspapers, Amar Ujala (Hindi) and Ananda Bazar Patrika (Bengali), to evaluate the ways in which representations of information function in conflict reporting and to recontextualize (and thus change or modify the meaning of) that which they represent, and with what political and cultural implications.

Keywords: India-China, framing, conflict, media narratives, border dispute

Procedia PDF Downloads 68
761 Human Rights in Cross-Border Surrogacy: An Exploratory Study Applied to Surrogacy Facilitators

Authors: Yingyi Luo

Abstract:

Cross-border commercial surrogacy, where Australians travel overseas to access reproduction through a surrogate mother, is an increasing phenomenon. This paper focuses on the role of Australian surrogacy facilitators, including lawyers, non-for-profit agents, fertility counselors, who act as intermediaries managing cross-border surrogacy arrangements in Australia. It explores the extent to which surrogacy facilitators are concerned with the human rights of children born through cross-border surrogacy, surrogate mothers in developing countries, and intended parents. Commercial surrogacy is a matter that is often cast in the language of human rights. This paper will contribute to an in-depth understanding of the dynamics between intended parents, surrogates, and surrogacy facilitators by adopting a human rights framework to inform data analysis regarding the role of facilitators. The purpose of this research is to inform debate and discussion on law reform related to surrogacy. This paper presented here centers on interviews with surrogacy facilitators in Australia and non-participant observations in Australia to generate thick, empirical data about the fertility industry. The data showed that the process of facilitating surrogacy arrangements had prompted facilitators to form a view on human rights as they applied to their works. Although facilitators claimed that the right of intended parents, surrogate mothers, and children were all taken into consideration, the researcher observed that the commercial surrogacy contracts described by these facilitators favored the interests of intended parents with the baby acting as their unique selling point. The interests and needs of surrogate mothers were not prioritized in the views or actions of facilitators. The result was a commercial transaction that entailed the purchase, through cross-border surrogacy, of a child, as a commodity, by relatively affluent intended parents from disadvantaged surrogate mothers through unfair contracts.

Keywords: cross-border surrogacy, facilitators, human rights, surrogacy

Procedia PDF Downloads 96
760 The Effect of a Computer-Assisted Glycemic Surveillance Protocol on Nursing Workload

Authors: Özlem Canbolat, Sevgisun Kapucu

Abstract:

The aim of this study was to determine the effect of a computer-assisted glycemic surveillance protocol on nursing workload in intensive care unit. The study is completed in an Education and Research Hospital in Ankara with the attendance of volunteered 19 nurse who had been worked in reanimation unit. Nurses used the written protocol and computer-assisted glycemic surveillance protocol for glycemic follow-up approach of the intensive care patients. Nurses used the written protocol first in the glycemic follow-up of the patient, then used the computer-assisted protocol. (Nurses used the written protocol first, then the computer-assisted protocol in the glycemic follow-up of the patient). Less time was spent in glycemic control with computerized protocol than written protocol and this difference is statistically significant (p < 0.001). It was determined that the computerized protocol application was completed in about 10 seconds (25% shorter) than the written protocol implementation. The computer-assisted glycemic surveillance protocol was found to be more easy and appropriate by nurses and the satisfaction level of the users was higher than with written protocol. While 79% of the nurses find it confusing to implement the written protocol, 79% were satisfied with the use of computerized protocol.

Keywords: computer-assisted protocol, glycemic control, insulin infusion protocol, intensive care, nursing workload

Procedia PDF Downloads 199
759 Different Approaches to the Study of Territorial Dispute between China and India

Authors: Albina Muratbekova

Abstract:

One of the main tensions and challenges in the development of Sino-Indian relation is the demarcation of its frontiers. The fact that throughout the history borders had never been demarcated on ground occur a dispute between China and India after receiving sovereignty. Boundaries of India and China are divided into three sectors: Eastern, Middle and Western. The middle sector runs from India’s Uttar Pradesh to the Punjab, 545 km length of the Line of Actual Control, the lines of which was confirmed at the 9th meeting of the Expert Group held in 2001, in New Delhi. Other two sectors are still not determined and cause disputes. A western sector of the frontier is the Aksai Chin plateau, covers areas of Ladakh, Tibet, and Sinkiang. Another disputed area lies in the Eastern sector in the Himalayan region, which after 1986 became the Indian state called Arunachal Pradesh. There are two different approaches in the ways of resolving the border dispute. Chinese side keeps an opinion that the border dispute must be resolved in a timely matter unless it is favorable for China, the resolution can be left to a later generation. While India’s government due to security reasons is eager to demarcate the border. In order to study this conflict was used as a descriptive-comparative-analytical method. Also, it was done a profound analyze of conflict nature.

Keywords: border dispute, China, India, territorial claim

Procedia PDF Downloads 285
758 Evaluation of the Surveillance System for Rift Valley Fever in Ruminants in Mauritania, 2019

Authors: Mohamed El Kory Yacoub, Ahmed Bezeid El Mamy Beyatt, Djibril Barry, Yanogo Pauline, Nicolas Meda

Abstract:

Introduction: Rift Valley Fever is a zoonotic arbovirosis that severely affects ruminants, as well as humans. It causes abortions in pregnant females and deaths in young animals. The disease occurs during heavy rains followed by large numbers of mosquito vectors. The objective of this work is to evaluate the surveillance system for Rift Valley Fever. Methods: We conducted an evaluation of the Rift Valley Fiver surveillance system. Data were collected from the analysis of the national database of the Mauritanian Network of Animal Disease Epidemiological Surveillance at the Ministry of Rural Development, of RVF cases notified from the whole national territory, of questionnaires and interviews with all persons involved in RVF surveillance at the central level. The quality of the system was assessed by analyzing the quantitative attributes defined by the Centers for Disease Control and Prevention. Results: In 2019, 443 cases of RVF were notified by the surveillance system, of which 36 were positive. Among the notified cases of Rift Valley Fever, the 0- to the 3-year-old age group of small ruminants was the most represented with 49.21% of cases, followed by 33.33%, which was recorded in large ruminants in the 0 to 7-year-old age group, 11.11% of cases were older than seven years. The completeness of the data varied between 14.2% (age) and 100% (species). Most positive cases were recorded between October and November 2019 in seven different regions. Attribute analysis showed that 87% of the respondents were able to use the case definition well, and 78.8% said they were familiar with the reporting and feedback loop of the Rift Valley Fever data. 90.3% of the respondents found it easy, while 95% of them responded that it was easy for them to transmit their data to the next level. Conclusions: The epidemiological surveillance system for Rift Valley Fever in Mauritania is simple and representative. However, data quality, stability, and responsiveness are average, as the diagnosis of the disease requires laboratory confirmation and the average delay for this confirmation is long (13 days). Consequently, the lack of completeness of the recorded data and of description of cases in terms of time-place-animal, associated with the delay between the stages of the surveillance system can make prevention, early detection of epidemics, and the initiation of measures for an adequate response difficult.

Keywords: evaluation, epidemiological surveillance system, rift valley fever, mauritania, ruminants

Procedia PDF Downloads 131
757 The Gaze; Objectification of the Surrogate Mother in Cross-Border Surrogacy: An Empirical Study Applied to Surrogacy Facilitators

Authors: Yingyi Luo

Abstract:

Cross-border surrogacy is seen by many as a market in which women are bought and sold commodities at risk of trafficking. A surrogate can be framed as either a fully acknowledged subject, with whom intended parents engage in cross-border surrogacy—or as a tool utilized by intended parents and surrogacy facilitators in the furtherance of their own objectives. In order to identify which frame prevails, this paper applies subjectivity theory to an empirical study of cross-border surrogacy facilitated by facilitators in Australia analysing interviews with surrogate agents, counsellors and lawyers, and observations at trade show. The aim of the paper is to advance understanding of the dynamics of the relationship between intended parents, surrogates, and surrogacy facilitators by collecting new data and applying unique framework. As dominant players, surrogacy facilitators have a significant impact on determining the nature of cross-border surrogacy. However, little is known concerning the manner in which facilitators influence the inter-subjectivity between surrogate mothers and intended parents. Thus, this paper intends to identify how facilitators depict surrogate mothers, the degree to which their perspectives bear upon both the subjectivity of the surrogate mother and the relationship of intended parents with surrogate mothers. For the purpose of introducing and developing this framework in the context of cross-border surrogacy, this paper borrows from the work of theorists not often mentioned in bioethics, including Jacques Lacan, Marco Cavallaro, Michel Foucault, and others. It also applies the concept of 'the gaze' along with the dynamic of 'self' and 'other' to the cross-border surrogacy arrangement. Applying the concept of the gaze can provide a new way to interpret the power dynamic that plays out among surrogacy facilitators, intended parents, and surrogates within the commercial surrogacy arrangement and how the subjectivity is produced through the power. Viewing the relationships between the players in cross-border surrogacy through the lens of gaze theory, this paper finds that, in cross-border surrogacy, due to the structural power imbalance, affluent intended parents and surrogacy facilitators are possessors of the gaze, while surrogate mothers are under the thrall of the gaze. Specifically, facilitators frame surrogate mothers' reproductive abilities as commodities that intended parents can purchase to fulfil their urgent need to have children and experience full subjectivity, and they take a cut of the money that paid by intended parents. Therefore, commodification of the body results in degrading a surrogate mother (the object), reifying her as no more than a walking womb (the other), a process which is highly detrimental to the self of surrogate mothers. This relationship, formalized through contractual means, allows intended parents and facilitators to take advantage of surrogate mothers in the furtherance of their own objectives. This argument is enriched by new data from interviews and observations that provide nuance to this understanding of inter-subjectivity.

Keywords: cross-border surrogacy, facilitators, self, surrogate mothers

Procedia PDF Downloads 116
756 Heilong-Amur River: From Disputed Border to Brigde of Cooperation

Authors: Wan Wang, Xing Li

Abstract:

With the international river playing an increasingly important role in international relations, the border river between China and Russia has attracted more attention. During the history of Sino-Russian relations, Heilong-Amur River used to be a disputed border. The Sino-Russian transboundary water cooperation regarding the Heilong-Amur River started in 1950s and has obtained rapid improvement. In the 21st century, this cooperation has made substantial progress, which is worthy of a further study. However, this cooperation is facing with obstacles in aspects of economy, policy, implementation and mutual understandings. Under this circumstance, from the perspective of China, it is of necessity to realize these problems and take appropriate measures to promote the cooperation. The current Sino-Russian relations is conducive to transboundary water resources cooperation regarding the Heilong-Amur River and some measures adopted by China are already ongoing.

Keywords: China, cooperation, Heilong-Amur River, Russia

Procedia PDF Downloads 357
755 Walls, Barriers, and Fences to Informal Political Economy of Land Resource Accesses: A Case of Banyabunagana Along with Uganda–Congo Border, South Western Uganda, Kisoro District

Authors: Niringiye Fred

Abstract:

Banyabunagana has always had access to land resources for grazing animals, sand mining, and farmland across the border in the Democratic Republic of Congo during the pre-colonial and colonial times, usually on an informal arrangement facilitated by kinship ties and rent transactions for these resources. However, in recent periods, the government of the Democratic Republic of the Congo (DRC) has been pursuing a policy of constructing barriers such as walls and fences so that Banyabunagana communities do not access the land on the DRC side of the border. This is happening in the background of increased and intensified demand for land use on the side of the Ugandan community. This paper will attempt to discuss the reasons behind the construction of walls, fences, and other barriers which deny access to land for Banyabunagana communities in Bunagana Parish, Muramba Sub-county- Kisoro district, Uganda. The research will attempt to answer the following main questions, among others, whether there are the factors that explain the construction of walls and fences which could limit or deny access to the informal use of land and other resources and whether policy options to ensure continued access to land and other resources for local communities.

Keywords: border, walls, fences, land resource access

Procedia PDF Downloads 89
754 Urban Citizenship in a Sensor Rich Society

Authors: Mike Dee

Abstract:

Urban public spaces are sutured with a range of surveillance and sensor technologies that claim to enable new forms of ‘data based citizen participation’, but also increase the tendency for ‘function-creep’, whereby vast amounts of data are gathered, stored and analysed in a broad application of urban surveillance. This kind of monitoring and capacity for surveillance connects with attempts by civic authorities to regulate, restrict, rebrand and reframe urban public spaces. A direct consequence of the increasingly security driven, policed, privatised and surveilled nature of public space is the exclusion or ‘unfavourable inclusion’ of those considered flawed and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, programs of securitisation, ‘gentrification’ and ‘creative’ and ‘smart’ city initiatives refashion public space as sites of selective inclusion and exclusion. In this context of monitoring and control procedures, in particular, children and young people’s use of space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to the social order, requiring various forms of remedial action. This paper suggests that cities, places and spaces and those who seek to use them, can be resilient in working to maintain and extend democratic freedoms and processes enshrined in Marshall’s concept of citizenship, calling sensor and surveillance systems to account. Such accountability could better inform the implementation of public policy around the design, build and governance of public space and also understandings of urban citizenship in the sensor saturated urban environment.

Keywords: citizenship, public space, surveillance, young people

Procedia PDF Downloads 429
753 Current Issues of Cross-Border Enforcement

Authors: Gábor Kocsmárik

Abstract:

The topic of this is coercive measures against assets in which the factor of the procedure contains a foreign element. We speak of cross-border enforcement if the debtor or the property requesting enforcement or subject to enforcement is not located in the bordering country. Given that the jurisdiction of a country cannot extend beyond its borders, the cooperation of nations and the mutual recognition of their decisions are necessary to eliminate this. In addition, it is essential to create framework rules that are binding and enforceable for each country participating in the convention. During the study, some conventions between countries that are still in force will be presented, which can serve as a starting point for dealing with existing problems.

Keywords: law, execution, civil procedure law, international

Procedia PDF Downloads 17
752 Violence Detection and Tracking on Moving Surveillance Video Using Machine Learning Approach

Authors: Abe Degale D., Cheng Jian

Abstract:

When creating automated video surveillance systems, violent action recognition is crucial. In recent years, hand-crafted feature detectors have been the primary method for achieving violence detection, such as the recognition of fighting activity. Researchers have also looked into learning-based representational models. On benchmark datasets created especially for the detection of violent sequences in sports and movies, these methods produced good accuracy results. The Hockey dataset's videos with surveillance camera motion present challenges for these algorithms for learning discriminating features. Image recognition and human activity detection challenges have shown success with deep representation-based methods. For the purpose of detecting violent images and identifying aggressive human behaviours, this research suggested a deep representation-based model using the transfer learning idea. The results show that the suggested approach outperforms state-of-the-art accuracy levels by learning the most discriminating features, attaining 99.34% and 99.98% accuracy levels on the Hockey and Movies datasets, respectively.

Keywords: violence detection, faster RCNN, transfer learning and, surveillance video

Procedia PDF Downloads 76
751 H.264 Video Privacy Protection Method Using Regions of Interest Encryption

Authors: Taekyun Doo, Cheongmin Ji, Manpyo Hong

Abstract:

Like a closed-circuit television (CCTV), video surveillance system is widely placed for gathering video from unspecified people to prevent crime, surveillance, or many other purposes. However, abuse of CCTV brings about concerns of personal privacy invasions. In this paper, we propose an encryption method to protect personal privacy system in H.264 compressed video bitstream with encrypting only regions of interest (ROI). There is no need to change the existing video surveillance system. In addition, encrypting ROI in compressed video bitstream is a challenging work due to spatial and temporal drift errors. For this reason, we propose a novel drift mitigation method when ROI is encrypted. The proposed method was implemented by using JM reference software based on the H.264 compressed videos, and experimental results show the verification of our proposed methods and its effectiveness.

Keywords: H.264/AVC, video encryption, privacy protection, post compression, region of interest

Procedia PDF Downloads 320
750 Valorization of Surveillance Data and Assessment of the Sensitivity of a Surveillance System for an Infectious Disease Using a Capture-Recapture Model

Authors: Jean-Philippe Amat, Timothée Vergne, Aymeric Hans, Bénédicte Ferry, Pascal Hendrikx, Jackie Tapprest, Barbara Dufour, Agnès Leblond

Abstract:

The surveillance of infectious diseases is necessary to describe their occurrence and help the planning, implementation and evaluation of risk mitigation activities. However, the exact number of detected cases may remain unknown whether surveillance is based on serological tests because identifying seroconversion may be difficult. Moreover, incomplete detection of cases or outbreaks is a recurrent issue in the field of disease surveillance. This study addresses these two issues. Using a viral animal disease as an example (equine viral arteritis), the goals were to establish suitable rules for identifying seroconversion in order to estimate the number of cases and outbreaks detected by a surveillance system in France between 2006 and 2013, and to assess the sensitivity of this system by estimating the total number of outbreaks that occurred during this period (including unreported outbreaks) using a capture-recapture model. Data from horses which exhibited at least one positive result in serology using viral neutralization test between 2006 and 2013 were used for analysis (n=1,645). Data consisted of the annual antibody titers and the location of the subjects (towns). A consensus among multidisciplinary experts (specialists in the disease and its laboratory diagnosis, epidemiologists) was reached to consider seroconversion as a change in antibody titer from negative to at least 32 or as a three-fold or greater increase. The number of seroconversions was counted for each town and modeled using a unilist zero-truncated binomial (ZTB) capture-recapture model with R software. The binomial denominator was the number of horses tested in each infected town. Using the defined rules, 239 cases located in 177 towns (outbreaks) were identified from 2006 to 2013. Subsequently, the sensitivity of the surveillance system was estimated as the ratio of the number of detected outbreaks to the total number of outbreaks that occurred (including unreported outbreaks) estimated using the ZTB model. The total number of outbreaks was estimated at 215 (95% credible interval CrI95%: 195-249) and the surveillance sensitivity at 82% (CrI95%: 71-91). The rules proposed for identifying seroconversion may serve future research. Such rules, adjusted to the local environment, could conceivably be applied in other countries with surveillance programs dedicated to this disease. More generally, defining ad hoc algorithms for interpreting the antibody titer could be useful regarding other human and animal diseases and zoonosis when there is a lack of accurate information in the literature about the serological response in naturally infected subjects. This study shows how capture-recapture methods may help to estimate the sensitivity of an imperfect surveillance system and to valorize surveillance data. The sensitivity of the surveillance system of equine viral arteritis is relatively high and supports its relevance to prevent the disease spreading.

Keywords: Bayesian inference, capture-recapture, epidemiology, equine viral arteritis, infectious disease, seroconversion, surveillance

Procedia PDF Downloads 278
749 A Fact-Finding Analysis on the Expulsions Made under Title 42 in Us

Authors: Avi Shrivastava

Abstract:

Title 42, an emergency health decree, has forced the federal authorities to turn away asylum seekers and all other border crossers since last year. When Title 42 was first deployed in immigration detention centers, where many migrants are held when they arrive at the U.S.-Mexico border, the Trump administration embraced it as a strategy. Expulsions Policy and New Border Challenges will be examined in regard to Title 42 concerns. Humanitarian measures for refugees arriving at the US-Mexico border are the focus of this article. To a large extent, this article addresses the implications of the United States' use of Title 42 in expelling refugees and the possible ramifications of doing away with it. A secondary data collecting strategy was used to gather the information for this study, allowing researchers to examine a large number of previously collected data sets. Information about Title 42 may be found in a variety of places, such as scholarly publications, newspapers, books, and the internet. The inquiry employed qualitative and explanatory research approaches. The claim that 1.7 million individuals were forced to leave the country as a result of it was withdrawn. Since CBP and ICE were limited in their ability to process deportees, it employed a very random patchwork technique in selecting the expelled individuals. As a consequence, repeat offenders, particularly those who were single, got a reduced punishment. The government will be compelled to focus on long-overdue but vital border enhancements if expulsions are halted. Title 42 provisions may help expedite the processing of asylum and other types of humanitarian relief. The government is prepared for an increase in arrivals, but ending the program would lead to a return to arrival levels seen during the Title 42 period.

Keywords: migrants, refugees, title 42, medical, trump administration

Procedia PDF Downloads 72