Search results for: privacy calculus perspective
3118 Comparison of Safety and Efficacy between Thulium Fibre Laser and Holmium YAG Laser for Retrograde Intrarenal Surgery
Authors: Sujeet Poudyal
Abstract:
Introduction: After Holmium:yttrium-aluminum-garnet (Ho: YAG) laser has revolutionized the management of urolithiasis, the introduction of Thulium fibre laser (TFL) has already challenged Ho:YAG laser due to its multiple commendable properties. Nevertheless, there are only few studies comparing TFL and holmium laser in Retrograde Intrarenal Surgery(RIRS). Therefore, this study was carried out to compare the efficacy and safety of thulium fiber laser (TFL) and holmium laser in RIRS. Methods: This prospective comparative study, which included all patients undergoing laser lithotripsy (RIRS) for proximal ureteric calculus and nephrolithiasis from March 2022 to March 2023, consisted of 63 patients in Ho:YAG laser group and 65 patients in TFL group. Stone free rate, operative time, laser utilization time, energy used, and complications were analysed between the two groups. Results: Mean stone size was comparable in TFL (14.23±4.1 mm) and Ho:YAG (13.88±3.28 mm) group, p-0.48. Similarly, mean stone density in TFL (1269±262 HU) was comparable to Ho:YAG (1189±212 HU), p-0.48. There was significant difference in lasing time between TFL (12.69±7.41 mins) and Ho:YAG (20.44±14 mins), p-0.012). TFL group had operative time of 43.47± 16.8 mins which was shorter than Ho:YAG group (58±26.3 mins),p-0.005. Both TFL and Ho:YAG groups had comparable total energy used(11.4±6.2 vs 12±8 respectively, p-0.758). Stone free rate was 87%for TFL, whereas it was 79.5% for Ho:YAG, p-0.25). Two cases of sepsis and one ureteric stricture were encountered in TFL, whereas three cases suffered from sepsis apart from one ureteric stricture in Ho:YAG group, p-0.62). Conclusion: Thulium Fibre Laser has similar efficacy as Holmium: YAG Laser in terms of safety and stone free rate. However, due to better stone ablation rate in TFL, it can become the game changer in management of urolithiasis in the coming days.Keywords: retrograde intrarenal surgery, thulium fibre laser, holmium:yttrium-aluminum-garnet (ho:yag) laser, nephrolithiasis
Procedia PDF Downloads 753117 Toward the Destigmatizing the Autism Label: Conceptualizing Celebratory Technologies
Authors: LouAnne Boyd
Abstract:
From the perspective of self-advocates, the biggest unaddressed problem is not the symptoms of an autism spectrum diagnosis but the social stigma that accompanies autism. This societal perspective is in contrast to the focus on the majority of interventions. Autism interventions, and consequently, most innovative technologies for autism, aim to improve deficits that occur within the person. For example, the most common Human-Computer Interaction research projects in assistive technology for autism target social skills from a normative perspective. The premise of the autism technologies is that difficulties occur inside the body, hence, the medical model focuses on ways to improve the ailment within the person. However, other technological approaches to support people with autism do exist. In the realm of Human Computer Interaction, there are other modes of research that provide critique of the medical model. For example, critical design, whose intended audience is industry or other HCI researchers, provides products that are the opposite of interventionist work to bring attention to the misalignment between the lived experience and the societal perception of autism. For example, parodies of interventionist work exist to provoke change, such as a recent project called Facesavr, a face covering that helps allistic adults be more independent in their emotional processing. Additionally, from a critical disability studies’ perspective, assistive technologies perpetuate harmful normalizing behaviors. However, these critical approaches can feel far from the frontline in terms of taking direct action to positively impact end users. From a critical yet more pragmatic perspective, projects such as Counterventions lists ways to reduce the likelihood of perpetuating ableism in interventionist’s work by reflectively analyzing a series of evolving assistive technology projects through a societal lens, thus leveraging the momentum of the evolving ecology of technologies for autism. Therefore, all current paradigms fall short of addressing the largest need—the negative impact of social stigma. The current work introduces a new paradigm for technologies for autism, borrowing from a paradigm introduced two decades ago around changing the narrative related to eating disorders. It is the shift from reprimanding poor habits to celebrating positive aspects of eating. This work repurposes Celebratory Technology for Neurodiversity and intended to reduce social stigma by targeting for the public at large. This presentation will review how requirements were derived from current research on autism social stigma as well as design sessions with autistic adults. Congruence between these two sources revealed three key design implications for technology: provide awareness of the autistic experience; generate acceptance of the neurodivergence; cultivate an appreciation for talents and accomplishments of neurodivergent people. The current pilot work in Celebratory Technology offers a new paradigm for supporting autism by shifting the burden of change from the person with autism to address changing society’s biases at large. Shifting the focus of research outside of the autistic body creates a new space for a design that extends beyond the bodies of a few and calls on all to embrace humanity as a whole.Keywords: neurodiversity, social stigma, accessibility, inclusion, celebratory technology
Procedia PDF Downloads 723116 Qualitative Analysis of Emotional Thoughts in the Perspective of Nurses Who Have Been Working Experience in Pediatric Hematology-Oncology Unit
Authors: Sevil Inal, Leman Yantiri, Meral Kelleci
Abstract:
Aim: In this study, it was aimed to qualitatively analyze the feelings, thoughts and meanings of the nurses who had experience in child hematology in the past. Method: In this qualitative study, in-depth interviews were conducted with 15 nurses between 29 and 53 years of age who had previously worked in child hematology-oncology unit. Interviews were conducted with a semi-structured interview form. Each interview lasted 20-30 minute. Some of the questions are: ‘What kind of experiences do you experience when you think about the periods you are working in hematology-oncology service?’ ‘Do you explain the reason for living these feelings?’ The data were analyzed with QSR NVivo 7 software. Results: From the perspective of the nurses who had experience working in the pediatric hematology-oncology service in the past, five main themes and sub-themes related to emotions and thoughts towards this experiment were identified in the study. 1) Positive and negative emotions: (a) fear and anxiety, (b) desperation, pity, guilt, (c) burnout, (d) longing; 2) Being coping 3) Professional implications 4) Meaning of life 5) Unmet needs and suggestions. Conclusions: Working in hematology should be viewed as a multidimensional situation that affects the way nurses view their profession and life, leading to a wide range of emotional lives. Data obtained from this study can be used to strengthen hematologic nurses.Keywords: cancer, child, care, hematology, nursing
Procedia PDF Downloads 2393115 Predicting Mass-School-Shootings: Relevance of the FBI’s ‘Threat Assessment Perspective’ Two Decades Later
Authors: Frazer G. Thompson
Abstract:
The 1990s in America ended with a mass-school-shooting (at least four killed by gunfire excluding the perpetrator(s)) at Columbine High School in Littleton, Colorado. Post-event, many demanded that government and civilian experts develop a ‘profile’ of the potential school shooter in order to identify and preempt likely future acts of violence. This grounded theory research study seeks to explore the validity of the original hypotheses proposed by the Federal Bureau of Investigation (FBI) in 2000, as it relates to the commonality of disclosure by perpetrators of mass-school-shootings, by evaluating fourteen mass-school-shooting events between 2000 and 2019 at locations around the United States. Methods: The strategy of inquiry seeks to investigate case files, public records, witness accounts, and available psychological profiles of the shooter. The research methodology is inclusive of one-on-one interviews with members of the FBI’s Critical Incident Response Group seeking perspective on commonalities between individuals; specifically, disclosure of intent pre-event. Results: The research determined that school shooters do not ‘unfailingly’ notify others of their plans. However, in nine of the fourteen mass-school-shooting events analyzed, the perpetrator did inform the third party of their intent pre-event in some form of written, oral, or electronic communication. In the remaining five instances, the so-called ‘red-flag’ indicators of the potential for an event to occur were profound, and unto themselves, might be interpreted as notification to others of an imminent deadly threat. Conclusion: Data indicates that conclusions drawn in the FBI’s threat assessment perspective published in 2000 are relevant and current. There is evidence that despite potential ‘red-flag’ indicators which may or may not include a variety of other characteristics, perpetrators of mass-school-shooting events are likely to share their intentions with others through some form of direct or indirect communication. More significantly, implications of this research might suggest that society is often informed of potential danger pre-event but lacks any equitable means by which to disseminate, prevent, intervene, or otherwise act in a meaningful way considering said revelation.Keywords: columbine, FBI profiling, guns, mass shooting, mental health, school violence
Procedia PDF Downloads 1183114 Narrative Point of View in Nature Documentary Films: A Study of The Cove (2009), Tale of a Forest (2012), and Before the Flood (2016)
Authors: Sakshi Yadav, Sushila Shekhawat
Abstract:
This study addresses different types of points of view as seen in nature documentary films with the help of three eco documentaries, and it would be significant in understanding the role of the narrative point of view as a tool for showing and telling in documentaries. Narrative analysis of a film forms an essential aspect of the discourse of scholarship in film studies. Narration is the chain of events occurring in time and space. The notion of narrative provides the idea of coherence and wholeness to the story. There are various components that the narration carries, one of which is the perspective or point of view. The narrator plays the role of a mediator between the film and the audience; thus, his perspective influences the way the audience interprets the film. Feature films have been analyzed through narrative points of view; however, this research intends to conduct it from the angle of a nature documentary film. The study will examine narrative viewpoints unique to nature documentary films using three ecological documentary films-The Cove (2009), Tale of a forest (2012), and Before the flood (2016). This research will apply the framework of narrative theory and will investigate the impact of the different types of narrative points of view, as each portrays the human-nature relationship from a different standpoint, and it will also study the effect that the narrative point of view has on the mode of these eco documentaries.Keywords: ecodocumentary, narrative, human-nature relationship, point of view
Procedia PDF Downloads 893113 The Synopsis of the AI-Powered Therapy Web Platform ‘Free AI Therapist'
Authors: Arwa Alnowaiser, Hala Shoukri
Abstract:
The ‘FreeAITherapist’ is an artificial intelligence application that uses the power of AI to offer advice and mental health counseling to its users through its chatbot services. The AI therapist is designed to understand users' issues, concerns, and problems and respond appropriately; it provides empathy and guidance and uses evidence-based therapeutic techniques. With its user-friendly platform, it ensures accessibility for individuals in need, regardless of their geographical location. This website was created in direct response to the growing demand for mental health support, aiming to provide a cost-effective and confidential solution. Through promising confidentiality, it considers user privacy and data security. The ‘FreeAITherapist’ strives to bridge the gap in mental health services, offering a reliable resource for individuals seeking guidance and counseling to improve their overall well-being.Keywords: artificial intelligence, mental health, AI therapist, website, counseling
Procedia PDF Downloads 443112 Investigating the Usability of a University Website from the Users’ Perspective: An Empirical Study of Benue State University Website
Authors: Abraham Undu, Stephen Akuma
Abstract:
Websites are becoming a major component of an organization’s success in our ever globalizing competitive world. The website symbolizes an organization, interacting or projecting an organization’s principles, culture, values, vision, and perspectives. It is an interface connecting organizations and their clients. The university, as an academic institution, makes use of a website to communicate and offer computing services to its stakeholders (students, staff, host community, university management etc). Unfortunately, website designers often give more consideration to the technology, organizational structure and business objectives of the university than to the usability of the site. Website designers end up designing university websites which do not meet the needs of the primary users. This empirical study investigated the Benue State University website from the point view of students. This research was realized by using a standardized website usability questionnaire based on the five factors of usability defined by WAMMI (Website Analysis and Measurement Inventory): attractiveness, controllability, efficiency, learnability and helpfulness. The result of the investigation showed that the university website (https://portal.bsum.edu.ng/) has neutral usability level because of the usability issues associated with the website. The research recommended feasible solutions to improve the usability of the website from the users’ perspective and also provided a modified usability model that will be used for better evaluation of the Benue State University website.Keywords: Benue State University, modified usability model, usability, usability factors
Procedia PDF Downloads 1513111 Probabilistic Analysis of Bearing Capacity of Isolated Footing using Monte Carlo Simulation
Authors: Sameer Jung Karki, Gokhan Saygili
Abstract:
The allowable bearing capacity of foundation systems is determined by applying a factor of safety to the ultimate bearing capacity. Conventional ultimate bearing capacity calculations routines are based on deterministic input parameters where the nonuniformity and inhomogeneity of soil and site properties are not accounted for. Hence, the laws of mathematics like probability calculus and statistical analysis cannot be directly applied to foundation engineering. It’s assumed that the Factor of Safety, typically as high as 3.0, incorporates the uncertainty of the input parameters. This factor of safety is estimated based on subjective judgement rather than objective facts. It is an ambiguous term. Hence, a probabilistic analysis of the bearing capacity of an isolated footing on a clayey soil is carried out by using the Monte Carlo Simulation method. This simulated model was compared with the traditional discrete model. It was found out that the bearing capacity of soil was found higher for the simulated model compared with the discrete model. This was verified by doing the sensitivity analysis. As the number of simulations was increased, there was a significant % increase of the bearing capacity compared with discrete bearing capacity. The bearing capacity values obtained by simulation was found to follow a normal distribution. While using the traditional value of Factor of safety 3, the allowable bearing capacity had lower probability (0.03717) of occurring in the field compared to a higher probability (0.15866), while using the simulation derived factor of safety of 1.5. This means the traditional factor of safety is giving us bearing capacity that is less likely occurring/available in the field. This shows the subjective nature of factor of safety, and hence probability method is suggested to address the variability of the input parameters in bearing capacity equations.Keywords: bearing capacity, factor of safety, isolated footing, montecarlo simulation
Procedia PDF Downloads 1873110 Limiting Factors to Gender Identity in the Irene Salami-Agunloye’s Emotan
Authors: Adebayo John Badeji
Abstract:
This study examines some limiting factors in the dramaturgy of Irene Salami- Agunloye's Emotan. These factors are cultural, socio-political, and religious beliefs that play significant roles in gender balance, such that it establishes inequality between the sexes, giving male attributes greater value than that female ones subconsciously. This work draws its findings from the textual analysis method, and Stiwanism was employed as our theoretical framework. The theory is further discussed in the body of the work. By analysis, we subject this work to critical content analysis. Our findings revealed that most African feminist ideologies employ the ideology of revolt, which may not work on African soil. The play projects women's and men's issues in politics. This study exposes us to the fact that gender inequality is created by the male’s dominance in society. Also, the African women’s imitation of the cultural dictates of their fellow counterparts abroad is also affecting their own perspective on African soil. The study concludes that the African woman is looking at her freedom from the view of her counterparts in Europe and America, which is not right. As argued by Irene salami, women were active in societal development in Africa. This study, therefore, recommends that she should look at African women from the African perspective. This is because Queen Amina of Zazzau, Queen Idia of Benin, and Queen Moremi of Ife ruled when there were men, and they excelled.Keywords: gender, identity, Emotan, factors
Procedia PDF Downloads 1253109 An Exploration of Science, Technology, Engineering, Arts, and Mathematics Competition from the Perspective of Arts
Authors: Qiao Mao
Abstract:
There is a growing number of studies concerning STEM (Science, Technology, Engineering, and Mathematics) and STEAM (Science, Technology, Engineering, Arts, and Mathematics). However, the research is little on STEAM competitions from Arts' perspective. This study takes the annual PowerTech STEAM competition in Taiwan as an example. In this activity, students are asked to make wooden bionic mechanical beasts on the spot and participate in a model and speed competition. This study aims to explore how Arts influences STEM after it involves in the making of mechanical beasts. A case study method is adopted. Through expert sampling, five prize winners in the PowerTech Youth Science and Technology Creation Competition and their supervisors are taken as the research subjects. Relevant data which are collected, sorted out, analyzed and interpreted afterwards, derive from observations, interview and document analyses, etc. The results of the study show that in the PowerTech Youth Science and Technology Creation Competition, when Arts involves in STEM, (1) it has an impact on the athletic performance, balance, stability and symmetry of mechanical beasts; (2) students become more interested and more creative in making STEAM mechanical beasts, which can promote students' learning of STEM; (3) students encounter more difficulties and problems when making STEAM mechanical beasts, and need to have more systematic thinking and design thinking to solve problems.Keywords: PowerTech, STEAM contest, mechanical beast, arts' role
Procedia PDF Downloads 853108 Industrial Applications of Additive Manufacturing and 3D Printing Technology: A Review from South Africa Perspective
Authors: Micheal O. Alabi
Abstract:
Additive manufacturing (AM) is the official industry standard term (ASTM F2792) for all applications of the technology which is also known as 3D printing technology. It is defined as the process of joining materials to make objects from 3D model data, and it is usually layer upon layer, as opposed to subtractive manufacturing methodologies. This technology has gained significant interest within the academic, research institute and industry because of its ability to create complex geometries with customizable material properties. Despite the late adoption of the technology, additive manufacturing has been active in South Africa for past 21 years and it is predicted that additive manufacturing technology will play a significant and game-changing role in the fourth industrial revolution and in particular it promises to play an ever-growing role in efforts to re-industrialize the economy of South Africa. At the end of 2006, there are approximately ninety 3D printers in South Africa and in 2015 it was estimated that there are 3500 additive manufacturing systems and 3D printers in circulation in South Africa. A reasonable number of these additive manufacturing machines are in the high end of the market, in science councils and higher education institutions and this shows that the future of additive manufacturing in South Africa is very brighter compared to other African countries. This paper reviews the past and current industrial applications of additive manufacturing in South Africa from the academic research and industry perspective and what are the benefits of this technology to manufacturing companies and industrial sectors in the country.Keywords: additive manufacturing, 3D printing technology, industrial applications, manufacturing
Procedia PDF Downloads 4723107 Obstetric Violence Consequences And Coping Strategies: Insights Through The Voices Of Arab And Jewish Women In Israel
Authors: Dganit Sharon, Raghda Alnabilsy
Abstract:
The goal of this qualitative research was to sound the voices of Jewish and Arab women in Israel who had experienced obstetric violence, to learn the consequences of the violence to them on different levels and over time, and to present their coping strategies from their perspective. Another goal was to expand the research knowledge on an issue that has not been studied among Arab and Jewish women in Israel. The premise of this study is the feminist approach that aims to promote human rights, and to eradicate phenomena related to cultural, structural, gender and patriarchal structures of women, their bodies, and their health. The research was based on the qualitative-constructivist methodology, by means of thematic analysis of 20 in-depth semi-structured interviews. Two main themes emerged from the analysis. First, the physical and emotional consequences of obstetric violence, consequences to spousal relationships, and mistrust of the health system and service providers. Second, women’s coping strategies with obstetric violence that included repression and avoidance as a way of coping with the pain and trauma of the abuse; garnering inner strengths, resilience, knowledge and awareness of the delivery process; recruiting and relying on external help; sharing on social media, and discussions with other women who had similar experiences; or reaching out to therapists / legal aid / public complaints.Keywords: obstetric violence, Jewish and arab women in israel, consequences, coping strategies, gender-related perspective
Procedia PDF Downloads 693106 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 3233105 Horizontal Dimension of Constitutional Social Rights
Authors: Monika Florczak-Wątor
Abstract:
The main purpose of this paper is to determine the applicability of the constitutional social rights in the so-called horizontal relations, i.e. the relations between private entities. Nowadays the constitutional rights are more and more often violated by private entities and not only by the state. The private entities interfere with the privacy of individuals, limit their freedom of expression or disturb their peaceful gatherings. International corporations subordinate individuals in a way which may limit their constitutional rights. These new realities determine the new role of the constitution in protecting human rights. The paper will aim at answering two important questions. Firstly, are the private entities obliged to respect the constitutional social rights of other private entities and can they be liable for violation of these rights? Secondly, how the constitutional social rights can receive horizontal effect? Answers to these questions will have a significant meaning for the popularization of the practice of applying the Constitution among the citizens as well as for the courts which settle disputes between them.Keywords: social rights, private relations, horizontality, constitutional rights
Procedia PDF Downloads 3243104 Out of Pocket Costs for Patients with Tuberculosis in Colombia: Evidence from Three Metropolitan Areas
Authors: Jose Hernandez, Lina Martínez, Gustavo Gonzalez, Carlos Lázaro, Diana Castrillon, Jonathan Cardona, Laura Mejía, Yina Sanchez, Luisa Ochoa, Evert Jimenez
Abstract:
Objectives: Economic analyses of tuberculosis control interventions are usually focused on the payer’s perspective. To assess the overall economic impact of the disease, out-of-pocket and indirect costs are also required. This research is aimed to estimate overall economic impact under DOTS-strategy (Directly Observed Therapy Short Course). Methods: A cross-sectional survey of 91 adult tuberculosis patients in treatment for at least two months was conducted from the society perspective. A standardized questionnaire was used in three different cities of Colombia: Medellin (poverty is 17.7%), Monteria (poverty is 36.9%) and Quibdó (poverty is 51.2%). Costs were converted to 2013 USD and categorized into two periods: diagnostics phase and treatment. Results: The median cost during diagnostics was 13$ (±SD 9.5). The median monthly patient out-of-pocket costs during treatment were 32$ (±SD 6.8), equivalent to 17% of patient’s median monthly income, estimated in 186$ (±SD 23). Costs recorded in Medellin were 47$ in Monteria was 18$ and in Quibdó was 13$. Conclusion: Patient costs under DOTS strategy are high even when services are provided free of charge. The creation or strengthening of community-based treatment supervisors could greatly impact costs of tuberculosis and lower drop-outs.Keywords: tuberculosis, costs and cost analysis, health promotion, Colombia
Procedia PDF Downloads 3673103 Social Communication Problems, Social Anxiety, and Mood Problems among Students with Autism Spectrum Disorder from Teachers' Perspective
Authors: Naila Tallas Mahajna, Jamal Al Khateeb
Abstract:
This study examined the level of social communication problems, social anxiety, and mood problems among children with ASD (age 6-13 years) enrolled in special classes (n=46) and regular classes (n=36) from teachers' perspective in the schools of a part of Palestine. Teachers responded to three questionnaires - social communication problems, social anxiety and mood problems- that were used to answer the research questions. Results: social communication problems, social anxiety and mood problems were of medium rates for students with ASD enrolled in reguler and special classes. No significant differences in the level of social communication problems could be attributed to class type (Regular, Special) or the grade level-(1st – 3rd, 4th - 6th). There were significant differences in social anxiety levels that could be attributed to grade level in favor of the 4th - 6th grades but there were no significant differences according to class type (Regular, Special). There were statistically significant differences in mood problems levels that could be attributed to the class type in favor of special classes, but no differences were found according to grade level. There was a direct significant relationship between communication problems, social anxiety, and mood problems. Conclusion: social communication problems may be an important risk factor for the development of social anxiety and mood problems among students with ASD.Keywords: social communication problems, social anxiety, mood problems, autism spectrum disorders
Procedia PDF Downloads 1753102 Analytics Model in a Telehealth Center Based on Cloud Computing and Local Storage
Authors: L. Ramirez, E. Guillén, J. Sánchez
Abstract:
Some of the main goals about telecare such as monitoring, treatment, telediagnostic are deployed with the integration of applications with specific appliances. In order to achieve a coherent model to integrate software, hardware, and healthcare systems, different telehealth models with Internet of Things (IoT), cloud computing, artificial intelligence, etc. have been implemented, and their advantages are still under analysis. In this paper, we propose an integrated model based on IoT architecture and cloud computing telehealth center. Analytics module is presented as a solution to control an ideal diagnostic about some diseases. Specific features are then compared with the recently deployed conventional models in telemedicine. The main advantage of this model is the availability of controlling the security and privacy about patient information and the optimization on processing and acquiring clinical parameters according to technical characteristics.Keywords: analytics, telemedicine, internet of things, cloud computing
Procedia PDF Downloads 3253101 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective
Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella
Abstract:
Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law
Procedia PDF Downloads 3833100 Gender Perspective in Peace Operations: An Analysis of 14 UN Peace Operations
Authors: Maressa Aires de Proenca
Abstract:
The inclusion of a gender perspective in peace operations is based on a series of conventions, treaties, and resolutions designed to protect and include women addressing gender mainstreaming. The UN Security Council recognizes that women's participation and gender equality within peace operations are indispensable for achieving sustainable development and peace. However, the participation of women in the field of peace and security is still embryonic. There are gaps when we think about female participation in conflict resolution and peace promotion spaces, and it does not seem clear how women are present in these spaces. This absence may correspond to silence about representation and the guarantee of the female perspective within the context of peace promotion. Thus, the present research aimed to describe the panorama of the participation of women who are currently active in the 14 active UN peace operations, which are: 1) MINUJUSTH, Haiti, 2) MINURSO, Western Sahara, 3) MINUSCA, Central African Republic, 4) MINUSMA, Mali, 5) MONUSCO, the Democratic Republic of the Congo, 6) UNAMID, Darfur, 7) UNDOF, Golan, 8) UNFICYP, Cyprus, 9) UNIFIL, Lebanon, 10) UNISFA, Abyei, 11) UNMIK, Kosovo, 12) UNMISS, South Sudan, 13) UNMOGIP, India, and Pakistan, and 14) UNTSO, Middle East. A database was constructed that reported: (1) position held by the woman in the peace operation, (2) her profession, (3) educational level, (4) marital status, (5) religion, (6) nationality, (8) number of years working with peace operations, (9) whether the operation in which it operates has provided training on gender issues. For the construction of this database, official reports and statistics accessed through the UN Peacekeeping Resource Hub were used; The United Nations Statistical Commission, Peacekeeping Master Open Datasets, The Armed Conflict Database (ACD), The International Institute for Strategic Studies (IISS) database; Armed Conflict Location & Event Data Project (ACLED) database; from the Evidence and Data for Gender Equality (EDGE) database. In addition to access to databases, peacekeeping operations will be contacted directly, and data requested individually. The database showed that the presence of women in these peace operations is still incipient, but growing. There are few women in command positions, and most of them occupy administrative or human-care positions.Keywords: women, peace and security, peacekeeping operations, peace studies
Procedia PDF Downloads 1363099 The Untreated Burden of Parkinson’s Disease: A Patient Perspective
Authors: John Acord, Ankita Batla, Kiran Khepar, Maude Schmidt, Charlotte Allen, Russ Bradford
Abstract:
Objectives: Despite the availability oftreatment options, Parkinson’s disease (PD) continues to impact heavily on a patient’s quality of life (QoL), as many symptoms that bother the patient remain unexplored and untreated in clinical settings. The aims of this research were to understand the burden of PDsymptoms from a patient perspective, particularly those which are the most persistent and debilitating, and to determine if current treatments and treatment algorithms adequately focus on their resolution. Methods: A13-question, online, patient-reported survey was created based on the MDS-Unified Parkinson’s Disease Rating Scale (MDS-UPDRS)and symptoms listed on Parkinson’s Disease Patient Advocacy Groups websites, and then validated by 10 Parkinson’s patients. In the survey, patients were asked to choose both their most common and their most bothersome symptoms, whether they had received treatment for those and, if so, had it been effective in resolving those symptoms. Results: The most bothersome symptoms reported by the 111 participants who completed the survey were sleep problems (61%), feeling tired (56%), slowness of movements (54%), and pain in some parts of the body (49%). However, while 86% of patients reported receiving dopamine or dopamine like drugs to treat their PD, far fewer reported receiving targeted therapies for additional symptoms. For example, of the patients who reported having sleep problems, only 33% received some form of treatment for this symptom. This was also true for feeling tired (30% received treatment for this symptom), slowness of movements (62% received treatment for this symptom), and pain in some parts of the body (61% received treatment for this symptom). Additionally, 65% of patients reported that the symptoms they experienced were not adequately controlled by the treatments they received, and 9% reported that their current treatments had no effect on their symptoms whatsoever. Conclusion: The survey outcomes highlight that the majority of patients involved in the study received treatment focused on their disease, however, symptom-based treatments were less well represented. Consequently, patient-reported symptoms such as sleep problems and feeling tired tended to receive more fragmented intervention than ‘classical’ PD symptoms, such as slowness of movement, even though they were reported as being amongst the most bothersome symptoms for patients. This research highlights the need to explore symptom burden from the patient’s perspective and offer Customised treatment/support for both motor and non-motor symptoms maximize patients’ quality of life.Keywords: survey, patient reported symptom burden, unmet needs, parkinson's disease
Procedia PDF Downloads 2953098 Magnetization Studies and Vortex Phase Diagram of Oxygenated YBa₂Cu₃₋ₓAlₓO₆₊δ Single Crystal
Authors: Ashna Babu, Deepshikha Jaiswal Nagar
Abstract:
Cuprate high-temperature superconductors (HTSCs) have been immensely studied during the past few decades because of their structure which is described as a superlattice of superconducting CuO₂ layers. In particular, YBa₂Cu₃O₆₊δ (YBCO), with its critical temperature of 93 K, has received the most attention due to its well-defined metal stoichiometry and variable oxygen content that determines the carrier doping level. Substitution of metal ions at the Cu site is known to increase the critical current density without destroying superconductivity in YBCO. The construction of vortex phase diagrams is very important for such doped YBCO materials both from a fundamental perspective as well as from a technological perspective. By measuring field-dependent magnetization on annealed single crystals of Al-doped YBCO, YBa₂Cu₃₋ₓAlₓO₆₊δ (Al-YBCO), we were able to observe a second magnetization peak anomaly (SMP) in a very large part of the phase diagram. We were also able to observe the SMP anomaly in temperature-dependent magnetization measurements, the first observation to our knowledge. Critical current densities were calculated using Bean’s critical state model, flux jumps associated with symmetry reorientation of vortex lattice were studied, the oxygen cluster distribution was also analysed, and by incorporating all observations, we made a vortex phase diagram for oxygenated Al-YBCO single crystal.Keywords: oxygen deficient clusters, second magnetization peak anomaly, flux jumps, vortex phase diagram
Procedia PDF Downloads 693097 Healthcare Data Mining Innovations
Authors: Eugenia Jilinguirian
Abstract:
In the healthcare industry, data mining is essential since it transforms the field by collecting useful data from large datasets. Data mining is the process of applying advanced analytical methods to large patient records and medical histories in order to identify patterns, correlations, and trends. Healthcare professionals can improve diagnosis accuracy, uncover hidden linkages, and predict disease outcomes by carefully examining these statistics. Additionally, data mining supports personalized medicine by personalizing treatment according to the unique attributes of each patient. This proactive strategy helps allocate resources more efficiently, enhances patient care, and streamlines operations. However, to effectively apply data mining, however, and ensure the use of private healthcare information, issues like data privacy and security must be carefully considered. Data mining continues to be vital for searching for more effective, efficient, and individualized healthcare solutions as technology evolves.Keywords: data mining, healthcare, big data, individualised healthcare, healthcare solutions, database
Procedia PDF Downloads 663096 Arabic Scholar’s Governance Advocacy and Nigeria’s National Security in Nigeria: Perspective of Al-Shaykh Usman Bin Fodio
Authors: Mohammad Jamiu Abdullahi, Shykh Ahmed Abdussalam
Abstract:
The emergence of Arabic on the shore of West Africa heralded the practise of Islam and advocation for a just and egalitarian society. Islam, it was argued, has been perverted and subverted by the Hausa leadership. This necessitated the call for reforming Islam. Al-Shaykh Usman Bin Fodio grabbed the opportunity and fought the perverts to restore the glory of Islam and establish shari'ah way of life. This was the practice, especially in the northern part of Nigeria until the incursion of colonialism. The conquest of the colonial master halted the rule of jihadi leaderships and subjected them to colonialism under which only some aspects of Islamic system considered potentially beneficial to the British interest were retained. The current socio-political and economic crises in Nigeria has necessitated the need to look inwardly to the bulk of works, in Arabic, left behind by the Muslim scholars to help to salvage the country from its present political crisis, economic paralysis and legal decadence. This paper, therefore, examines the relevance of Arabic literary works that housed political/legal theories to salvaging the country from its present political crises, economic paralysis and legal decadence.Keywords: Arabic Fodio Nigeria security, advocacy governance scholar Usman, British colonial perspective shaykh, leadership Islam jihad politics
Procedia PDF Downloads 3353095 The Impact of Work-Related Crime on the Work Environment
Authors: Monica Kaltenbrunner
Abstract:
Work-related crime has severe consequences for individual employees and society, and the problem has received widespread attention. For those who work where this type of criminality occurs, it can deteriorate the work environment. The purpose of the systematic literature review is to collate and enhance knowledge about work-related crime and its consequences for the work environment, primarily from an employee perspective. A comprehensive literature search was conducted in three databases, with the final search in May 2024. Grey literature was searched for on relevant websites. Only literature conducted in the EU, Norway, and Canada between 2013 and 2024 was included. Industries represented are land-based industry, hotel and restaurant, health and welfare/domestic work, construction, vehicles and transport, and cleaning. The literature review includes 39 publications, of which 33 are scientific studies. The results show that both men and women work in a work-related crime setting, most from Central and Eastern Europe, Asia, Africa, and South America. The results demonstrate that, regardless of workers’ gender or industry, workers are being exploited. Their work environment is characterized by high demand, low influence and low support. It is also common for the work environment to involve different risks, such as safety problems and risks of harassment and discrimination. This systematic literature review is one of few that focuses on the employee perspective on the work environment in workplaces where work-related crime occurs and collates existing research within the field.Keywords: occupational safety and health, undeclared work, migrant, exploitation
Procedia PDF Downloads 63094 LuMee: A Centralized Smart Protector for School Children who are Using Online Education
Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.
Abstract:
This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data
Procedia PDF Downloads 883093 Foreseen the Future: Human Factors Integration in European Horizon Projects
Authors: José Manuel Palma, Paula Pereira, Margarida Tomás
Abstract:
Foreseen the future: Human factors integration in European Horizon Projects The development of new technology as artificial intelligence, smart sensing, robotics, cobotics or intelligent machinery must integrate human factors to address the need to optimize systems and processes, thereby contributing to the creation of a safe and accident-free work environment. Human Factors Integration (HFI) consistently pose a challenge for organizations when applied to daily operations. AGILEHAND and FORTIS projects are grounded in the development of cutting-edge technology - industry 4.0 and 5.0. AGILEHAND aims to create advanced technologies for autonomously sort, handle, and package soft and deformable products, whereas FORTIS focuses on developing a comprehensive Human-Robot Interaction (HRI) solution. Both projects employ different approaches to explore HFI. AGILEHAND is mainly empirical, involving a comparison between the current and future work conditions reality, coupled with an understanding of best practices and the enhancement of safety aspects, primarily through management. FORTIS applies HFI throughout the project, developing a human-centric approach that includes understanding human behavior, perceiving activities, and facilitating contextual human-robot information exchange. it intervention is holistic, merging technology with the physical and social contexts, based on a total safety culture model. In AGILEHAND we will identify safety emergent risks, challenges, their causes and how to overcome them by resorting to interviews, questionnaires, literature review and case studies. Findings and results will be presented in “Strategies for Workers’ Skills Development, Health and Safety, Communication and Engagement” Handbook. The FORTIS project will implement continuous monitoring and guidance of activities, with a critical focus on early detection and elimination (or mitigation) of risks associated with the new technology, as well as guidance to adhere correctly with European Union safety and privacy regulations, ensuring HFI, thereby contributing to an optimized safe work environment. To achieve this, we will embed safety by design, and apply questionnaires, perform site visits, provide risk assessments, and closely track progress while suggesting and recommending best practices. The outcomes of these measures will be compiled in the project deliverable titled “Human Safety and Privacy Measures”. These projects received funding from European Union’s Horizon 2020/Horizon Europe research and innovation program under grant agreement No101092043 (AGILEHAND) and No 101135707 (FORTIS).Keywords: human factors integration, automation, digitalization, human robot interaction, industry 4.0 and 5.0
Procedia PDF Downloads 643092 The Digital Divide: Examining the Use and Access to E-Health Based Technologies by Millennials and Older Adults
Authors: Delana Theiventhiran, Wally J. Bartfay
Abstract:
Background and Significance: As the Internet is becoming the epitome of modern communications, there are many pragmatic reasons why the digital divide matters in terms of accessing and using E-health based technologies. With the rise of technology usage globally, those in the older adult generation may not be as familiar and comfortable with technology usage and are thus put at a disadvantage compared to other generations such as millennials when examining and using E-health based platforms and technology. Currently, little is known about how older adults and millennials access and use e-health based technologies. Methods: A systemic review of the literature was undertaken employing the following three databases: (i) PubMed, (ii) ERIC, and (iii) CINAHL; employing the search term 'digital divide and generations' to identify potential articles. To extract required data from the studies, a data abstraction tool was created to obtain the following information: (a) author, (b) year of publication, (c) sample size, (d) country of origin, (e) design/methods, (f) major findings/outcomes obtained. Inclusion criteria included publication dates between the years of Jan 2009 to Aug 2018, written in the English language, target populations of older adults aged 65 and above and millennials, and peer reviewed quantitative studies only. Major Findings: PubMed provided 505 potential articles, where 23 of those articles met the inclusion criteria. Specifically, ERIC provided 53 potential articles, where no articles met criteria following data extraction. CINAHL provided 14 potential articles, where eight articles met criteria following data extraction. Conclusion: Practically speaking, identifying how newer E-health based technologies can be integrated into society and identifying why there is a gap with digital technology will help reduce the impact on generations and individuals who are not as familiar with technology and Internet usage. The largest concern of all is how to prepare older adults for new and emerging E-health technologies. Currently, there is a dearth of literature in this area because it is a newer area of research and little is known about it. The benefits and consequences of technology being integrated into daily living are being investigated as a newer area of research. Several of the articles (N=11) indicated that age is one of the larger factors contributing to the digital divide. Similarly, many of the examined articles (N=5) identify that privacy concerns were one of the main deterrents of technology usage for elderly individuals aged 65 and above. The older adult generation feels that privacy is one of the major concerns, especially in regards to how data is collected, used and possibly sold to third party groups by various websites. Additionally, access to technology, the Internet, and infrastructure also plays a large part in the way that individuals are able to receive and use information. Lastly, a change in the way that healthcare is currently used, received and distributed would also help attribute to the change to ensure that no generation is left behind in a technologically advanced society.Keywords: digital divide, e-health, millennials, older adults
Procedia PDF Downloads 1723091 The History of the Residential Care Environments for the Elderly in Iran
Authors: Saeed Haghnia
Abstract:
This paper traces the back history of environments in which the elderly who could not stay in private dwellings were accommodated and taken care of in Iran in the 19th century. It investigates the factors impacting on the establishment of the first nursing homes in Iran in 1973. Today in 2020, the nursing home is the only available model of residential care environment for the elderly who cannot stay in private dwellings in Iran. Understanding the evolution of these environments from a socio-political perspective is crucial before studying nursing homes’ response to the elderly and society in Iran and seeking any alternative model specific to the context. However, no study on the evolution of these environments in Iran was found. Thus, this paper, by going through primary and secondary resources and from a socio-political perspective, investigates how the elderly who could not stay in private dwellings were accommodated and taken care of in Iran in the 19th century. Maristan, in the early 19th century in Egypt as a part of Islamic territory, is an example of such spaces in which homeless elderly were kept and taken care of. This study suggests that in the 19th century in Iran in lack of significant governmental influence over people’s social affairs, any potential environments accommodating and taking care of the elderly who could not stay in private dwellings (mainly homeless) in Iran were probably regulated or supported by local figures, specifically clergies, as a response to the need for taking care of the vulnerable members of society.Keywords: nursing home, ageing, Iran, middle east, Qajar, Pahlavi
Procedia PDF Downloads 923090 Classification Framework of Production Planning and Scheduling Solutions from Supply Chain Management Perspective
Authors: Kwan Hee Han
Abstract:
In today’s business environments, frequent change of customer requirements is a tough challenge to manufacturing company. To cope with these challenges, a production planning and scheduling (PP&S) function might be established to provide accountability for both customer service and operational efficiency. Nowadays, many manufacturing firms have utilized PP&S software solutions to generate a realistic production plan and schedule to adapt to external changes efficiently. However, companies which consider the introduction of PP&S software solution, still have difficulties for selecting adequate solution to meet their specific needs. Since the task of PP&S is the one of major building blocks of SCM (Supply Chain Management) architecture, which deals with short term decision making in the production process of SCM, it is needed that the functionalities of PP&S should be analysed within the whole SCM process. The aim of this paper is to analyse the PP&S functionalities and its system architecture from the SCM perspective by using the criteria of level of planning hierarchy, major 4 SCM processes and problem-solving approaches, and finally propose a classification framework of PP&S solutions to facilitate the comparison among various commercial software solutions. By using proposed framework, several major PP&S solutions are classified and positioned according to their functional characteristics in this paper. By using this framework, practitioners who consider the introduction of computerized PP&S solutions in manufacturing firms can prepare evaluation and benchmarking sheets for selecting the most suitable solution with ease and in less time.Keywords: production planning, production scheduling, supply chain management, the advanced planning system
Procedia PDF Downloads 1983089 Teaching Ethical Behaviour: Conversational Analysis in Perspective
Authors: Nikhil Kewalkrishna Mehta
Abstract:
In the past researchers have questioned the effectiveness of ethics training in higher education. Also, there are observations that support the view that ethical behaviour (range of actions)/ethical decision making models used in the past make use of vignettes to explain ethical behaviour. The understanding remains in the perspective that these vignettes play a limited role in determining individual intentions and not actions. Some authors have also agreed that there are possibilities of differences in one’s intentions and actions. This paper makes an attempt to fill those gaps by evaluating real actions rather than intentions. In a way this study suggests the use of an experiential methodology to explore Berlo’s model of communication as an action along with orchestration of various principles. To this endeavor, an attempt was made to use conversational analysis in the pursuance of evaluating ethical decision making behaviour among students and middle level managers. The process was repeated six times with the set of an average of 15 participants. Similarities have been observed in the behaviour of students and middle level managers that calls for understanding that both the groups of individuals have no cognizance of their actual actions. The deliberations derived out of conversation were taken a step forward for meta-ethical evaluations to portray a clear picture of ethical behaviour among participants. This study provides insights for understanding demonstrated unconscious human behaviour which may fortuitously be termed both ethical and unethical.Keywords: ethical behaviour, unethical behavior, ethical decision making, intentions and actions, conversational analysis, human actions, sensitivity
Procedia PDF Downloads 249