Search results for: central venous access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6091

Search results for: central venous access

5431 Challenges to Reaching Higher Education in Developing Countries

Authors: Suhail Shersad

Abstract:

Introduction In developing countries, the access to higher education for the lower socioeconomic strata is very poor at less than 0.05%. The challenges faced by prospective students in these circumstances to pursue higher education have been explored through direct interaction with them and their families in urban slums of New Delhi. This study included evaluation of the demographics, social indices, expectations and perceptions of selected communities. Results The results show that the poor life expectancy, low exposure to technology, lack of social infrastructure and poor sanitary conditions have reduced their drive for academic achievements. This is despite a good level of intelligence and critical thinking skills among these students. The perception of the community including parents shows that despite their desire to excel, there are too may roadblocks to achieving a fruitful professional life for the next generation. Discussion The prerequisites of higher education may have to be revisited to be more inclusive of socially handicapped students. The knowledge, skills and attributes required for higher education system should form the baseline for creating a roadmap for higher secondary education suited for local needs. Conventional parameters like marks and grading have to be re-looked so that life skills and vocational training form part of the core curriculum. Essential skills should be incorporated at an earlier age, providing an alternative pathway for such students to join higher education. Conclusion: There is a need to bridge the disconnect that exists between higher education planning, the needs of the concerned cohorts and the existing higher secondary education. The variables that contribute to making such a decision have to be examined further. Keywords: prerequisites of higher education, social mobility, society expectations, access to higher education

Keywords: access to higher education, prerequisites of higher education, society expectations, social mobility

Procedia PDF Downloads 379
5430 Case Report on Anaesthesia for Ruptured Ectopic with Severe Pulmonary Hypertension in a Mute Patient

Authors: Pamela Chia, Tay Yoong Chuan

Abstract:

Introduction: Severe pulmonary hypertension (PH) patients requiring non-cardiac surgery risk have increased mortality rates ranging. These patients are plagued with cardiorespiratory failure, dysrhythmias and anticoagulation potentially with concurrent sepsis and renal insufficiency, perioperative morbidity. We present a deaf-mute patient with severe idiopathic PH emergently prepared for ruptured ectopic laparotomy. Case Report: A 20 year-old female, 62kg (BMI 25 kg/m2) with severe idiopathic PH (2DE Ejection Fraction was 41%, Pulmonary Artery Systolic Pressure (PASP) 105 mmHg, Right ventricle strain and hypertrophy) and selective mutism was rushed in for emergency laparotomy after presenting to the emergency department for abdominal pain. The patient had an NYHA Class II with room air SpO2 93-95%. While awaiting lung transplant, the patient takes warfarin, Sildanefil, Macitentan and even Selexipag for rising PASP. At presentation, vital signs: BP 95/63, HR 119 SpO2 88% (room air). Despite decreasing haemoglobin 14 to 10g/dL, INR 2.59 was reversed with prothrombin concentrate, and Vitamin K. ECG revealed Right Bundle Branch Block with right ventricular strain and x-ray showed cardiomegaly, dilated Right Ventricle, Pulmonary Arteries, basal atelectasis. Arterial blood gas showed compensated metabolic acidosis pH 7.4 pCO2 32 pO2 53 HCO3 20 BE -4 SaO2 88%. The cardiothoracic surgeon concluded no role for Extracorporeal Membrane Oxygenation (ECMO). We inserted invasive arterial and central venous lines with blood transfusion via an 18G cannula before the patient underwent a midline laparotomy, haemostasis of ruptured ovarian cyst with 2.4L of clots under general anesthesia and FloTrac cardiac output monitoring. Rapid sequence induction was done with Midazolam/Propofol, remifentanil infusion, and rocuronium. The patient was maintained on Desflurane. Blood products and colloids were transfused for further 1.5L blood loss. Postoperatively, the patient was transferred to the intensive care unit and was extubated uneventfully 7hours later. The patient went home a week later. Discussion: Emergency hemostasis laparotomy in anticoagulated WHO Class I PH patient awaiting lung transplant with no ECMO backup poses tremendous stress on the deaf-mute patient and the anesthesiologist. Balancing hemodynamics avoiding hypotension while awaiting hemostasis in the presence of pulmonary arterial dilators and anticoagulation requires close titration of volatiles, which decreases RV contractility. We review the contraindicated anesthetic agents (ketamine, N2O), choice of vasopressors in hypotension to maintain Aortic-right ventricular pressure gradients and nitric oxide use perioperatively. Conclusion: Interdisciplinary communication with a deaf-mute moribund patient and anesthesia considerations pose many rare challenges worth sharing.

Keywords: pulmonary hypertension, case report, warfarin reversal, emergency surgery

Procedia PDF Downloads 215
5429 Bridging between Shariah Law and Legal Framework: A Study of Problems and Solutions of Islamic Banking System in Bangladesh

Authors: Md. Abdul Kader, Md. Akiz Uddin

Abstract:

The Islamic banking system is based on the Islamic shariah principles. Islamic banking is set up to avoid riba (interest)--which is prohibited in Islam-- and to prevent unscrupulous practices and participate actively in achieving the welfare-oriented Islamic economy. In the process of offering Islamic banking services, practitioners have been facing several challenges. Out of many challenges, this paper particularly highlights the need for a centralized legal framework for Islamic banks that should be compliant with the shariah law. The researchers employed a qualitative method to collect case studies from high-profile Islamic Bankers and analyzed respective legal documents and policy papers to conduct the study. This study investigates the Shariah Governance Framework (SGF), amended Banking Companies Act, 1991 (Act No. 14 of 1991), and the Shariah Supervisory Board (SSB) of Islamic banks in Bangladesh to evaluate how legal framework supervise and/or monitor Islamic banking system under the jurisdiction of shariah law. The study reveals that the Shariah governance system in Bangladesh is mainly voluntary rather than regulatory, and there is an absence of full-fledged SGF. Though there is no complete Islamic Banking Act for controlling, guiding, and supervising the Islamic banks in Bangladesh, some Islamic banking provisions have already been incorporated in the amended Banking Companies Act, 1991 (Act No. 14 of 1991). Bangladesh Bank did not set up any separate Department at its Head Office to control, guide and supervise the operation of the Islamic banks. So, ensuring the implementation of Shariah principles concurrent with the legal framework of banking policies is recommended in this study. This study also prescribes that the government should enact a law or policy for the operations of Islamic banks in order to improve the Islamic Banking system of Bangladesh. In addition, the central bank can set up a Central Shariah Supervisory Board (CSSB) or authorize the existing Central Shariah Board for Islamic Banks of Bangladesh (CSBIB) to supervise and monitor overall activities of Islamic banks and resolve the disputes among the stakeholders concerning the Shariah issues of Islamic banks.

Keywords: islamic banking, shariah law, banking policies, shariah governance framework (SGF)

Procedia PDF Downloads 69
5428 A Board of Comparative Study of Central Secondary Education (CBSE) and Board of Secondry Education Madhya Pradesh BHOPAL (BSEMPB) Hindi Text Books of Class-VI

Authors: Shri Krishna Mishra, Badri Yadav

Abstract:

Proficient persons should be involved in formulation of the structure of the textbooks so that the topics selected in the Hindi textbooks for Class VII should contribute towards linguistic and literary development of the child and the language of the textbook matches the comprehension level of the student.The topics of tile textbooks should provide good illustrations and suitable exercises. Topics of variety of taste can be included in the textbook to satisfy the inquisitive children. There could be abstracts/hints at the beginning of each lesson. Meanings for difficult words must be given at the end of each topic for convenience of the parents and children as most of them find it difficult and time consuming to use Hindi dictionary. Exercises should be relevant covering the whole topic and the difficulty level should match the maturity level of the students in respect of CBSE Board. The stitching and binding of CBSE prescribed books may be improved to increase durability.

Keywords: comparative study of CBSE and BSEMPB, Central Secondary Education, Board of Secondry Education, BHOPAL

Procedia PDF Downloads 395
5427 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State

Authors: Rebecca Rumbul

Abstract:

The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.

Keywords: digital, ICT, transparency, civic technology

Procedia PDF Downloads 657
5426 Food Sharing App and the Ubuntu Ssharing Economy: Accessing the Impact of Technology of Food Waste Reduction

Authors: Gabriel Sunday Ayayia

Abstract:

Food waste remains a critical global challenge with significant environmental, economic, and ethical implications. In an era where food waste and food insecurity coexist, innovative technology-driven solutions have emerged, aiming to bridge the gap between surplus food and those in need. Simultaneously, disparities in food access persist, exacerbating issues of hunger and malnutrition. Emerging food-sharing apps offer a promising avenue to mitigate these problems but require further examination within the context of the Ubuntu sharing economy. This study seeks to understand the impact of food-sharing apps, guided by the principles of Ubuntu, on reducing food waste and enhancing food access. The study examines how specific food-sharing apps within the Ubuntu sharing economy could contribute to fostering community resilience and reducing food waste. Ubuntu underscores the idea that we are all responsible for the well-being of our community members. In the context of food waste, this means that individuals and businesses have a collective responsibility to ensure that surplus food is shared rather than wasted. Food-sharing apps align with this principle by facilitating the sharing of excess food with those in need, transforming waste into a communal resource. This research employs a mixed-methods approach of both quantitative analysis and qualitative inquiry. Large-scale surveys will be conducted to assess user behavior, attitudes, and experiences with food-sharing apps, focusing on the frequency of use, motivations, and perceived impacts. Qualitative interviews with app users, community organizers, and stakeholders will explore the Ubuntu-inspired aspects of food-sharing apps and their influence on reducing food waste and improving food access. Quantitative data will be analyzed using statistical techniques, while qualitative data will undergo thematic analysis to identify key patterns and insights. This research addresses a critical gap in the literature by examining the role of food-sharing apps in reducing food waste and enhancing food access, particularly within the Ubuntu sharing economy framework. Findings will offer valuable insights for policymakers, technology developers, and communities seeking to leverage technology to create a more just and sustainable food system.

Keywords: sharing economy, food waste reduction, technology, community- based approach

Procedia PDF Downloads 64
5425 Open Source Cloud Managed Enterprise WiFi

Authors: James Skon, Irina Beshentseva, Michelle Polak

Abstract:

Wifi solutions come in two major classes. Small Office/Home Office (SOHO) WiFi, characterized by inexpensive WiFi routers, with one or two service set identifiers (SSIDs), and a single shared passphrase. These access points provide no significant user management or monitoring, and no aggregation of monitoring and control for multiple routers. The other solution class is managed enterprise WiFi solutions, which involve expensive Access Points (APs), along with (also costly) local or cloud based management components. These solutions typically provide portal based login, per user virtual local area networks (VLANs), and sophisticated monitoring and control across a large group of APs. The cost for deploying and managing such managed enterprise solutions is typically about 10 fold that of inexpensive consumer APs. Low revenue organizations, such as schools, non-profits, non-government organizations (NGO's), small businesses, and even homes cannot easily afford quality enterprise WiFi solutions, though they may need to provide quality WiFi access to their population. Using available lower cost Wifi solutions can significantly reduce their ability to provide reliable, secure network access. This project explored and created a new approach for providing secured managed enterprise WiFi based on low cost hardware combined with both new and existing (but modified) open source software. The solution provides a cloud based management interface which allows organizations to aggregate the configuration and management of small, medium and large WiFi solutions. It utilizes a novel approach for user management, giving each user a unique passphrase. It provides unlimited SSID's across an unlimited number of WiFI zones, and the ability to place each user (and all their devices) on their own VLAN. With proper configuration it can even provide user local services. It also allows for users' usage and quality of service to be monitored, and for users to be added, enabled, and disabled at will. As inferred above, the ultimate goal is to free organizations with limited resources from the expense of a commercial enterprise WiFi, while providing them with most of the qualities of such a more expensive managed solution at a fraction of the cost.

Keywords: wifi, enterprise, cloud, managed

Procedia PDF Downloads 93
5424 The Multiple Sclerosis condition and the Role of Varicella-zoster virus in its Progression

Authors: Sina Mahdavi, Mahdi Asghari Ozma

Abstract:

Multiple sclerosis (MS) is the most common inflammatory autoimmune disease of the CNS that affects the myelination process in the central nervous system (CNS). Complex interactions of various "environmental or infectious" factors may act as triggers in autoimmunity and disease progression. The association between viral infections, especially human Varicella-zoster virus (VZV) and MS is one potential cause that is not well understood. This study aims to summarize the available data on VZV retrovirus infection in MS disease progression. For this study, the keywords "Multiple sclerosis", " Human Varicella-zoster virus ", and "central nervous system" in the databases PubMed, Google Scholar, Sid, and MagIran between 2016 and 2022 were searched and 14 articles were chosen, studied, and analyzed. Analysis of the amino acid sequences of HNRNPA1 with VZV proteins has shown a 62% amino acid sequence similarity between VZV gE and the PrLD/M9 epitope region (TNPO1 binding domain) of mutant HNRNPA1. A heterogeneous nuclear ribonucleoprotein (hnRNP), which is produced by HNRNPA1, is involved in the processing and transfer of mRNA and pre-mRNA. Mutant HNRNPA1 mimics gE of VZV as an antigen that leads to autoantibody production. Mutant HnRNPA1 translocates to the cytoplasm, after aggregation is presented by MHC class I, followed by CD8 + cells. Of these, antibodies and immune cells against the gE epitopes of VZV remain due to the memory immune response, causing neurodegeneration and the development of MS in genetically predisposed individuals. VZV expression during the course of MS is present in genetically predisposed individuals with HNRNPA1 mutation, suggesting a link between VZV and MS, and that this virus may play a role in the development of MS by inducing an inflammatory state. Therefore, measures to modulate VZV expression may be effective in reducing inflammatory processes in demyelinated areas of MS patients in genetically predisposed individuals.

Keywords: multiple sclerosis, varicella-zoster virus, central nervous system, autoimmunity

Procedia PDF Downloads 71
5423 Assessment of Sustainability in the Wulo Abiye Watershed, Central Highlands of Ethiopia

Authors: Getabalew Derib, Arragaw Alemayehu

Abstract:

Assessing the sustainability of watersheds holds significant importance for regional natural resource management and to achieve sustainable development. This study investigated the sustainability of the Wulo Abiye watershed, central highlands of Ethiopia. The sustainability status of the watershed was evaluated by using 17 indicators representing the economic, social, and environmental dimensions of sustainable development goals (SDGs) based on the local and existing conditions of the watershed. The results indicated that environmental sustainability was at a ’ high’ level, while social and economic sustainability and the aggregate index were at ‘moderate’ levels. The overall level of community participation in the planning and evaluation phases of watershed management was at ’low’ levels. The implementation phase was at ’high’ level. Overall , the sustainability status of watershed management and level of community participation were at ‘moderate’ levels. The study concluded that integrated support is needed to overcome the identified challenges to achieve sustainable development in watersheds.

Keywords: Wulo Abiye watershed, community participation, watershed management, sustainable development

Procedia PDF Downloads 41
5422 Development of a One-Window Services Model for Accessing Cancer Immunotherapies

Authors: Rizwan Arshad, Alessio Panza, Nimra Inayat, Syeda Mariam Batool Kazmi, Shawana Azmat

Abstract:

The rapidly expanding use of immunotherapy for a wide range of cancers from late to early stages has, predictably, been accompanied by evidence of inequities in access to these highly effective but costly treatments. In this survey-based case study, we aimed to develop a One-window services model (OWSM) based on Anderson’s behavioral model to enhance competence in accessing cancer medications, particularly immunotherapies, through the analysis of 20 patient surveys conducted in the Armed forces bone marrow transplant center of the district, Rawalpindi from November to December 2022. The purposive sampling technique was used. Cronbach’s alpha coefficient was found to be 0.71. It was analyzed using SPSS version 26 with descriptive analysis, and results showed that the majority of the cancer patients were non-competent to access their prescribed cancer immunotherapy because of individual-level, socioeconomic, and organizational barriers.

Keywords: cancer immunotherapy, one-window services model, accessibility, competence

Procedia PDF Downloads 68
5421 Inadequacy of Macronutrient and Micronutrient Intake in Children Aged 12-23 Months Old: An Urban Study in Central Jakarta, Indonesia

Authors: Dewi Fatmaningrum, Ade Wiradnyani

Abstract:

Background: Optimal feeding, include optimal micronutrient intake, becomes one of the ways to overcome the long-term consequences of undernutrition. Macronutrient and micronutrient intake were important for rapid growth and development of the children. Objectives: To assess macro and micronutrient intake of children aged 12-23 months old and nutrients inadequacy from intake of children aged 12-23 months old. Methods: This survey was a cross-sectional study, simple random sampling was performed to select respondents. Total sample of this study was 83 children aged 12-23 months old in Paseban Village, Senen Sub-district, Central Jakarta. The data was collected via interview and hemoglobin measurement of children. Results: The highest prevalence of inadequacy was iron intake (52.4%) compared to other micronutrients, 11.98% children had inadequate energy intake. There were 62.6% anemic children in the study area in which divided into anemic (37.3%) and severe anemic (25.3%). Conclusion: Micronutrient inadequacy occurred more frequently than macronutrient inadequacy in the study area. The higher the percentage of iron inadequacy gets, the higher the percentage of anemia among children is observed.

Keywords: micronutrient, macronutrient, children under five, urban setting

Procedia PDF Downloads 334
5420 Rehabilitation Robot in Primary Walking Pattern Training for SCI Patient at Home

Authors: Taisuke Sakaki, Toshihiko Shimokawa, Nobuhiro Ushimi, Koji Murakami, Yong-Kwun Lee, Kazuhiro Tsuruta, Kanta Aoki, Kaoru Fujiie, Ryuji Katamoto, Atsushi Sugyo

Abstract:

Recently attention has been focused on incomplete spinal cord injuries (SCI) to the central spine caused by pressure on parts of the white matter conduction pathway, such as the pyramidal tract. In this paper, we focus on a training robot designed to assist with primary walking-pattern training. The target patient for this training robot is relearning the basic functions of the usual walking pattern; it is meant especially for those with incomplete-type SCI to the central spine, who are capable of standing by themselves but not of performing walking motions. From the perspective of human engineering, we monitored the operator’s actions to the robot and investigated the movement of joints of the lower extremities, the circumference of the lower extremities, and exercise intensity with the machine. The concept of the device was to provide mild training without any sudden changes in heart rate or blood pressure, which will be particularly useful for the elderly and disabled. The mechanism of the robot is modified to be simple and lightweight with the expectation that it will be used at home.

Keywords: training, rehabilitation, SCI patient, welfare, robot

Procedia PDF Downloads 421
5419 Access to Education and Adopted Identity of the Rohingya Amid Government Restrictions in Bangladesh

Authors: Ishrat Zakia Sultana

Abstract:

The consistent persecution, ethnic cleansing, and genocide against the Rohingya in Burma resulted four major influxes of the Rohingya people to the neighboring country Bangladesh. After the latest influx of October 2016 and August 2017, the total number of Rohingya in Bangladesh stands somewhere between 900,000 to over one million, placing Bangladesh much ahead with the number of refugees compared to Dadaab and Kakuma in Kenya, Bidibidi in Uganda and Zaatari in Jordan. While Bangladesh received recognition and appreciation for receiving a huge number of the Rohingya, one of the fundamental human rights of the Rohingya – education – has never been fulfilled in Bangladesh. The Ministry of Disaster Management and Relief of the government of Bangladesh has been looking after the Rohingya and managing various programs for the Rohingya. On its website, the Ministry claims that it provides the basic supports/services to the Rohingya, including providing education. In practice, however, education for the Rohingya include only the provisions for registered Rohingya refugees – who are a very small number of populations among the entire Rohingya hosted in Bangladesh – and that is only up to grade 7 within the registered camps at Teknaf and Ukhia of Cox’s Bazar district of the country. There is no answer of the question, ‘What’s next’? Although refugees in Canada, Sudan, Turkey and other countries have been allowed to go to mainstream schools, Rohingya refugees in Bangladesh are not allowed to do so legally. Due to the lack of proof of nationality of the Rohingya, the government of Bangladesh imposes restrictions on their access to Bangladeshi schools. However, despite their vulnerability and statelessness, many Rohingyas are desperate to pursue education outside the camps and find their own way not only within Cox’s Bazar but also even in the capital city of the country. But they must hide their refugee identity to accomplish this. My research aims to explore how they manage to get admission amid government restrictions on their access to education in the mainstream institutions in Bangladesh. It will reveal how Rohingya people use adopted identity to get access to education in Bangladesh, and how they apply their own techniques to achieve their goals without having government approved identity. This research examined the strategies the Rohingya applied to manage documents related to their identity to ensure their admission to Bangladeshi education institutions – in schools, colleges, and universities. The research employed a qualitative approach. It used semi structured individual interviews and Focused Group Discussions (FGDs) with 20 male and female Rohingya refugees who are 18 years old and above, and have enrolled in Bangladeshi education institutions with adopted identity. Also I interviewed 5 local community members and policy makers to understand their perceptions and roles in this process. The findings of this research will allow the policy makers to rethink the outcomes of the restrictions on Rohingya’s education in Bangladesh, the ramifications of the denial of Rohingya’s access to education, and initiate policy dialogues on how to allow Rohingya refugees to pursue education in Bangladesh in legal way.

Keywords: Rohingya, Refugee, Bangladesh, Education

Procedia PDF Downloads 56
5418 Controlled Digital Lending, Equitable Access to Knowledge and Future Library Services

Authors: Xuan Pang, Alvin L. Lee, Peggy Glatthaar

Abstract:

Libraries across the world have been an innovation engine of creativity and opportunityin many decades. The on-going global epidemiology outbreak and health crisis experience illuminates potential reforms, rethinking beyond traditional library operations and services. Controlled Digital Lending (CDL) is one of the emerging technologies libraries used to deliver information digitally in support of online learning and teachingand make educational materials more affordable and more accessible. CDL became a popular term in the United States of America (USA) as a result of a white paper authored by Kyle K. Courtney (Harvard University) and David Hansen (Duke University). The paper gave the legal groundwork to explore CDL: Fair Use, First Sale Doctrine, and Supreme Court rulings. Library professionals implemented this new technology to fulfill their users’ needs. Three libraries in the state of Florida (University of Florida, Florida Gulf Coast University, and Florida A&M University) started a conversation about how to develop strategies to make CDL work possible at each institution. This paper shares the stories of piloting and initiating a CDL program to ensure students have reliable, affordable access to course materials they need to be successful. Additionally, this paper offers an overview of the emerging trends of Controlled Digital Lending in the USA and demonstrates the development of the CDL platforms, policies, and implementation plans. The paper further discusses challenges and lessons learned and how each institution plans to sustain the program into future library services. The fundamental mission of the library is providing users unrestricted access to library resources regardless of their physical location, disability, health status, or other circumstances. The professional due diligence of librarians, as information professionals, is to makeeducational resources more affordable and accessible.CDL opens a new frontier of library services as a mechanism for library practice to enhance user’s experience of using libraries’ services. Libraries should consider exploring this tool to distribute library resources in an effective and equitable way. This new methodology has potential benefits to libraries and end users.

Keywords: controlled digital lending, emerging technologies, equitable access, collaborations

Procedia PDF Downloads 131
5417 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 198
5416 Associated Factors the Safety of the Patient in Hemodialysis Clinics of a Brazilian Municipality: Cross-Sectional Study

Authors: Magda Milleyde de Sousa Lima, Letícia Lima Aguiar, Marina Guerra Martins, Erika Veríssimo Dias Sousa, Lizandra Sampaio de Oliveira, Lívia Moreira Barros, Joselany Áfio Caetano

Abstract:

Patients with chronic kidney disease are vulnerable to episodes which make the safety of their health vulnerable, mainly due to the treatment process that exposes them to high rates of interventions during hemodialysis sessions. Some factors associated with health care contribute to the risk of death and complications. However, there are a small number of scientific studies evaluating the level of safety of hemodialysis clinics, and the sociodemographic characteristics of patients and professionals associated with this safety. Therefore, the present study aims to examine the level of patient safety in hemodialysis clinics in the Brazilian capital, to identify the sociodemographic and clinical factors of patients and nursing staff associated with the level of safety. This is an observational, descriptive and quantitative research conducted in three hemodialysis clinics placed in the city of Fortaleza-CE, Brazil, from September to November 2019. The sample was formed after a sample calculation for finite inhabitants of correlation with 200 chronic renal patients, 30 nursing technicians and seven nurses. Conventional sampling was used based on the inclusion criteria: being present at the hemodialysis session on the day the researcher performed the data collection and being 18 years of age or older. Participants who presented communication difficulties to listen to and/or answer the sociodemographic and clinical questionnaire were excluded. Two instruments were applied: sociodemographic and clinical characterization form and Chronic Renal Patient Safety Assessment Scale on Hemodialysis (EASPRCH). The data were analyzed using the Kruskal Walls Test for categorical variables and Spearman correlation coefficient for non-categorical variables, using the Statistical Package SPSS version 20.0. The present study respected the ethical and legal principles determined by resolution 466/2012 of the National Health Council, under the approval of the Ethics and Research Committee with an opinion number: 3,255,635. The results showed that a hemodialysis clinic presented unsafe care practices of 32 points in the EASPRCH (p=0.001). A statistical association was identified between the level of safety and the variables of the patients: level of education (p=0.018), family income (p=0.049), type of employment (p=0.012), venous access site (p=0.009), use of medication during the session (p=0.008) and time of hemodialysis (p=0.002). When evaluating the profile of nurses, a statistical association was evidenced between the level of safety with the variables: marital status (p=0.000), race (p=0.017), schooling (p= 0.000), income (p=0.013), age (p=0.000), clinic workload (p=0.000), time working with hemodialysis (p=0.000), time working in the clinic (p= 0.007) and clinic sizing (p=0.000). In order, the sociodemographic factors of nursing technicians associated with the level of patient safety were: race (p= 0.001) and weekly workload at (p=0.010). Therefore, it is concluded that there is a non-conformity in the level of patient safety in one of the clinics studied and, that sociodemographic and clinical factors of patients and health professionals corroborate the level of safety of the health unit.

Keywords: hemodialysis, nursing, patient safety, quality improvement

Procedia PDF Downloads 192
5415 A Worldwide Assessment of Geothermal Energy Policy: Systematic, Qualitative and Critical Literature Review

Authors: Diego Moya, Juan Paredes, Clay Aldas, Ramiro Tite, Prasad Kaparaju

Abstract:

Globally, energy policy for geothermal development is addressed in different forms, depending on the economy, resources, country-development, environment aspects and technology access. Although some countries have established strong regulations and standards for geothermal exploration, exploitation and sustainable use at the policy level (government departments and institutions), others have discussed geothermal laws at legal levels (congress – a national legislative body of a country). Appropriate regulations are needed not only to meet local and international funding requirements but also to avoid speculation in the use of the geothermal resource. In this regards, this paper presents the results of a systematic, qualitative and critical literature review of geothermal energy policy worldwide addressing two scenarios: policy and legal levels. At first, literature is collected and classified from scientific and government sources regarding geothermal energy policy of the most advanced geothermal producing countries, including Iceland, New Zealand, Mexico, the USA, Central America, Italy, Japan, Philippines, Indonesia, Kenia, and Australia. This is followed by a systematic review of the literature aiming to know the best geothermal practices and what remains uncertain regarding geothermal policy implementation. This analysis is made considering the stages of geothermal production. Furthermore, a qualitative analysis is conducted comparing the findings across geothermal policies in the countries mentioned above. Then, a critical review aims to identify significant items in the field to be applied in countries with geothermal potential but with no or weak geothermal policies. Finally, patterns and relationships are detected, and conclusions are drawn.

Keywords: assessment, geothermal, energy policy, worldwide

Procedia PDF Downloads 381
5414 Efficacy of Celecoxib Adjunct Treatment on Bipolar Disorder: Systematic Review and Meta-Analysis

Authors: Daniela V. Bavaresco, Tamy Colonetti, Antonio Jose Grande, Francesc Colom, Joao Quevedo, Samira S. Valvassori, Maria Ines da Rosa

Abstract:

Objective: Performed a systematic review and meta-analysis to evaluated the potential effect of the cyclo-oxygenases (Cox)-2 inhibitor Celecoxib adjunct treatment in Bipolar Disorder (BD), through of randomized controlled trials. Method: A search of the electronic databases was proceeded, on MEDLINE, EMBASE, Scopus, Cochrane Central Register of Controlled Trials (CENTRAL), Biomed Central, Web of Science, IBECS, LILACS, PsycINFO (American Psychological Association), Congress Abstracts, and Grey literature (Google Scholar and the British Library) for studies published from January 1990 to February 2018. A search strategy was developed using the terms: 'Bipolar disorder' or 'Bipolar mania' or 'Bipolar depression' or 'Bipolar mixed' or 'Bipolar euthymic' and 'Celecoxib' or 'Cyclooxygenase-2 inhibitors' or 'Cox-2 inhibitors' as text words and Medical Subject Headings (i.e., MeSH and EMTREE) and searched. The therapeutic effects of adjunctive treatment with Celecoxib were analyzed, it was possible to carry out a meta-analysis of three studies included in the systematic review. The meta-analysis was performed including the final results of the Young Mania Rating Scale (YMRS) at the end of randomized controlled trials (RCT). Results: Three primary studies were included in the systematic review, with a total of 121 patients. The meta-analysis had significant effect in the YMRS scores from patients with BD who used Celecoxib adjuvant treatment in comparison to placebo. The weighted mean difference was 5.54 (95%CI=3.26-7.82); p < 0.001; I2 =0%). Conclusion: The systematic review suggests that adjuvant treatment with Celecoxib improves the response of major treatments in patients with BD when compared with adjuvant placebo treatment.

Keywords: bipolar disorder, Cox-2 inhibitors, Celecoxib, systematic review, meta-analysis

Procedia PDF Downloads 486
5413 From the Sharing Economy to Social Manufacturing: Analyzing Collaborative Service Networks in the Manufacturing Domain

Authors: Babak Mohajeri

Abstract:

In recent years, the conventional business model of ownership has been changed towards accessibility in a variety of markets. Two trends can be observed in the evolution of this rental-like business model. Firstly, the technological development that enables the emergence of new business models. These new business models increasingly become agile and flexible. For example Spotify, an online music stream company provides consumers access to over millions of music tracks, conveniently through the smartphone, tablet or computer. Similarly, Car2Go, the car sharing company accesses its members with flexible and nearby sharing cars. The second trend is the increasing communication and connections via social networks. This trend enables a shift to peer-to-peer accessibility based business models. Conventionally, companies provide access for their customers to own companies products or services. In peer-to-peer model, nonetheless, companies facilitate access and connection across their customers to use other customers owned property or skills, competencies or services .The is so-called the sharing economy business model. The aim of this study is to investigate into a new and emerging type of the sharing economy model in which role of customers and service providers may dramatically change. This new model is called Collaborative Service Networks. We propose a mechanism for Collaborative Service Networks business model. Uber and Airbnb, two successful growing companies, have been selected for our case studies and their business models are analyzed. Finally, we study the emergence of the collaborative service networks in the manufacturing domain. Our finding results to a new manufacturing paradigm called social manufacturing.

Keywords: sharing economy, collaborative service networks, social manufacturing, manufacturing development

Procedia PDF Downloads 313
5412 Simulation of a Cost Model Response Requests for Replication in Data Grid Environment

Authors: Kaddi Mohammed, A. Benatiallah, D. Benatiallah

Abstract:

Data grid is a technology that has full emergence of new challenges, such as the heterogeneity and availability of various resources and geographically distributed, fast data access, minimizing latency and fault tolerance. Researchers interested in this technology address the problems of the various systems related to the industry such as task scheduling, load balancing and replication. The latter is an effective solution to achieve good performance in terms of data access and grid resources and better availability of data cost. In a system with duplication, a coherence protocol is used to impose some degree of synchronization between the various copies and impose some order on updates. In this project, we present an approach for placing replicas to minimize the cost of response of requests to read or write, and we implement our model in a simulation environment. The placement techniques are based on a cost model which depends on several factors, such as bandwidth, data size and storage nodes.

Keywords: response time, query, consistency, bandwidth, storage capacity, CERN

Procedia PDF Downloads 266
5411 Rethinking the Use of Online Dispute Resolution in Resolving Cross-Border Small E-Disputes in EU

Authors: Sajedeh Salehi, Marco Giacalone

Abstract:

This paper examines the role of existing online dispute resolution (ODR) mechanisms and their effects on ameliorating access to justice – as a protected right by Art. 47 of the EU Charter of Fundamental Rights – for consumers in EU. The major focus of this study will be on evaluating ODR as the means of dispute resolution for Business-to-Consumer (B2C) cross-border small claims raised in e-commerce transactions. The authors will elaborate the consequences of implementing ODR methods in the context of recent developments in EU regulatory safeguards on promoting consumer protection. In this analysis, both non-judiciary and judiciary ODR redress mechanisms are considered, however, the significant consideration is given to – obligatory and non-obligatory – judiciary ODR methods. For that purpose, this paper will particularly investigate the impact of the EU ODR platform as well as the European Small Claims Procedure (ESCP) Regulation 861/2007 and their role on accelerating the access to justice for consumers in B2C e-disputes. Although, considerable volume of research has been carried out on ODR for consumer claims, rather less (or no-) attention has been paid to provide a combined doctrinal and empirical evaluation of ODR’s potential in resolving cross-border small e-disputes, in EU. Hence, the methodological approach taken in this study is a mixed methodology based on qualitative (interviews) and quantitative (surveys) research methods which will be mainly based on the data acquired through the findings of the Small Claims Analysis Net (SCAN) project. This project contributes towards examining the ESCP Regulation implementation and efficiency in providing consumers with a legal watershed through using the ODR for their transnational small claims. The outcomes of this research may benefit both academia and policymakers at national and international level.

Keywords: access to justice, consumers, e-commerce, small e-Disputes

Procedia PDF Downloads 126
5410 Central Composite Design for the Optimization of Fenton Process Parameters in Treatment of Hydrocarbon Contaminated Soil using Nanoscale Zero-Valent Iron

Authors: Ali Gharaee, Mohammad Reza Khosravi Nikou, Bagher Anvaripour, Ali Asghar Mahjoobi

Abstract:

Soil contamination by petroleum hydrocarbon (PHC) is a major concern facing the oil and gas industry. Particularly, condensate liquids have been found to contaminate soil at gas production sites. The remediation of PHCs is a difficult challenge due to the complex interaction between contaminant and soil. A study has been conducted to enhance degradation of PHCs by Fenton oxidation and using Nanoscale Zero-Valent Iron as catalyst. The various operating conditions such as initial H2O2 concentration, nZVI dosage, reaction time, and initial contamination dose were investigated. Central composite design was employed to optimize and analyze the effect of operational parameters on the PHC removal efficiency. It was found that optimal molar ratio of H2O2/Fe0 was 58 with maximum TPH removal of 84% and 3hr reaction time and initial contaminant concentration was 15g oil /kg soil. Based on the results, combination of Nanoscale ZVI and Fenton has proved to be a promising remedy for contaminated soil.

Keywords: oil contaminated Soil, fenton oxidation, zero valent iron nano-particles

Procedia PDF Downloads 287
5409 Youth Friendly Health Services for Rural Thai Teenagers

Authors: C. Sridawruang

Abstract:

Young people today has sexual activities differing from those of earlier generations, in that teenagers are likely to have multiple partners, and are frequently in short-term relationships or with partners that are not well known to them. The proportion of teenage mothers in Thailand has increased. Young people were not specifically addressed during the overall very successful HIV-prevention campaigns. Because of this missed opportunity, they are still unaware of the risk of unsafe sexual behavior. Aims: To describe the reproductive health care services in perspectives of rural Thai teenagers Methods: This survey was one part of a mixed method approach taken using survey and focus groups with 439 teenagers aged 12-18 years in 5 villages, Udon Thani, Thailand. The standard questionnaire survey had been used for collecting data. The numeric data was checked and analyzed by using descriptive statistics. Results: Most teenager respondents stated that they do not know where sexual reproductive health services provided for them. Most teenagers felt difficult to access and talk with health staff about sexual related issues. They stated that discussing, or consulting with health providers might not be safe. Teenagers might lose opportunities to access and get advice from health care services. The mean knowledge score of contraception and condom reproductive was 6.34 from a total score 11. Most teenagers especially girls expressed a need for counseling services and reported a need for telephone services. Conclusions: The need of appropriate information focusing on sexual relationships and contraception should be designed to help young people make wise decisions and there should be set health care services for Thai teenagers to make sure that teenagers could access easily. Health care providers need to be trained to improve their knowledge, attitudes and skills in reproductive health care practices for Thai teenagers.

Keywords: youth friendly health services, rural, Thai, teenagers

Procedia PDF Downloads 339
5408 Mineralogy and Classification of Altered Host Rocks in the Zaghia Iron Oxide Deposit, East of Bafq, Central Iran

Authors: Azat Eslamizadeh, Neda Akbarian

Abstract:

The Zaghia Iron ore, in 15 km east of a town named Bafq, is located in Precambrian formation of Central Iran in form of a small local deposit. The Volcano-sedimentary rocks of Precambrian-Cambrian age, belonging to Rizu series have spread through the region. Substantial portion of the deposit is covered by alluvial deposits. The rocks hosting the Zaghia iron ore have a main combination of rhyolitic tuffs along with clastic sediments, carbonate include sandstone, limestone, dolomite, conglomerate and is somewhat metamorphed causing them to have appeared as slate and phyllite. Moreover, carbonate rocks are in existence as skarn compound of marble bearing tremolite with mineralization of magnetite-hematite. The basic igneous rocks have dramatically altered into green rocks consist of actinolite-tremolite and chlorite along with amount of iron (magnetite + Martite). The youngest units of ore-bearing rocks in the area are found as dolerite - diabase dikes. The dikes are cutting the rhyolitic tuffs and carbonate rocks.

Keywords: Zaghia, iron ore deposite, mineralogy, petrography Bafq, Iran

Procedia PDF Downloads 520
5407 Application of Pedicled Perforator Flaps in Large Cavities of the Breast

Authors: Neerja Gupta

Abstract:

Objective-Reconstruction of large cavities of the breast without contralateral symmetrisation Background- Reconstruction of breast includes a wide spectrum of procedures from displacement to regional and distant flaps. The pedicled Perforator flaps cover a wide spectrum of reconstruction surgery for all quadrants of the breast, especially in patients with comorbidities. These axial flaps singly or adjunct are based on a near constant perforator vessel, a ratio of 2:1 at its entry in a flap is good to maintain vascularity. The perforators of lateral chest wall viz LICAP, LTAP have overlapping perfurosomes without clear demarcation. LTAP is localized in the narrow zone between the lateral breast fold and anterior axillary line,2.5-3.8cm from the fold. MICAP are localized at 1-2 cm from sternum. Being 1-2mm in diameter, a Single perforator is good to maintain the flap. LICAP has a dominant perforator in 6th-11th spaces, while LTAP has higher placed dominant perforators in 4th and 5th spaces. Methodology-Six consecutive patients who underwent reconstruction of the breast with pedicled perforator flaps were retrospectively analysed. Selections of the flap was done based on the size and locations of the tumour, anticipated volume loss, willingness to undergo contralateral symmetrisation, cosmetic expectations, and finances available.3 patients underwent vertical LTAP, the distal limit of the flap being the inframammary crease. 3 patients underwent MICAP, oriented along the axis of rib, the distal limit being the anterior axillary line. Preoperative identification was done using a unidirectional hand held doppler. The flap was raised caudal to cranial, the pivot point of rotation being the vessel entry into the skin. The donor area is determined by the skin pinch. Flap harvest time was 20-25 minutes. Intra operative vascularity was assessed with dermal bleed. The patient immediate pre, post-operative and follow up pics were compared independently by two breast surgeons. Patients were given a breast Q questionnaire (licensed) for scoring. Results-The median age of six patients was 46. Each patient had a hospital stay of 24 hours. None of the patients was willing for contralateral symmetrisation. The specimen dimensions were from 8x6.8x4 cm to 19x16x9 cm. The breast volume reconstructed range was 30 percent to 45 percent. All wide excision had free margins on frozen. The mean flap dimensions were 12x5x4.5 cm. One LTAP underwent marginal necrosis and delayed wound healing due to seroma. Three patients were phyllodes, of which one was borderline, and 2 were benign on final histopathology. All other 3 patients were invasive ductal cancer and have completed their radiation. The median follow up is 7 months the satisfaction scores at median follow of 7 months are 90 for physical wellbeing and 85 for surgical results. Surgeons scored fair to good in Harvard score. Conclusion- Pedicled perforator flaps are a valuable option for 3/8th volume of breast defects. LTAP is preferred for tumours at the Central, upper, and outer quadrants of the breast and MICAP for the inner and lower quadrant. The vascularity of the flap is dependent on the angiosomalterritories; adequate venous and cavity drainage.

Keywords: breast, oncoplasty, pedicled, perforator

Procedia PDF Downloads 185
5406 Investigating the Relationship and Interaction between Auditory Processing Disorder and Auditory Attention

Authors: Amirreza Razzaghipour Sorkhab

Abstract:

The exploration of the connection between cognition and Auditory Processing Disorder (APD) holds significant value. Individuals with APD experience challenges in processing auditory information through the central auditory nervous system's varied pathways. Understanding the importance of auditory attention in individuals with APD, as well as the primary diagnostic tools such as language and auditory attention tests, highlights the critical need for assessing their auditory attention abilities. While not all children with Auditory Processing Disorder (APD) show deficits in auditory attention, there are often deficiencies in cognitive and attentional performance. The link between various types of attention deficits and APD suggests impairments in sustained and divided auditory attention. Research into the origins of APD should also encompass higher-level processes, such as auditory attention. It is evident that investigating the interaction between APD and auditory and cognitive functions holds significant value. Furthermore, it was demonstrated that APD tests may be influenced by cognitive factors, but despite signs of auditory attention interaction with auditory processing skills and the influence of cognitive factors on tests for this disorder, auditory attention measures are not typically included in APD diagnostic protocols. Therefore, incorporating attention assessment tests into the battery of tests for individuals with auditory processing disorder will be beneficial for obtaining useful insights into their attentional abilities.

Keywords: auditory processing disorder, auditory attention, central auditory processing disorder, top-down pathway

Procedia PDF Downloads 58
5405 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security

Authors: Carmen J. Savelli, Romy Conzade

Abstract:

Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.

Keywords: food safety, food security, nutrition, policy

Procedia PDF Downloads 418
5404 Determination of Poisson’s Ratio and Elastic Modulus of Compression Textile Materials

Authors: Chongyang Ye, Rong Liu

Abstract:

Compression textiles such as compression stockings (CSs) have been extensively applied for the prevention and treatment of chronic venous insufficiency of lower extremities. The involvement of multiple mechanical factors such as interface pressure, frictional force, and elastic materials make the interactions between lower limb and CSs to be complex. Determination of Poisson’s ratio and elastic moduli of CS materials are critical for constructing finite element (FE) modeling to numerically simulate a complex interactive system of CS and lower limb. In this study, a mixed approach, including an analytic model based on the orthotropic Hooke’s Law and experimental study (uniaxial tension testing and pure shear testing), has been proposed to determine Young’s modulus, Poisson’s ratio, and shear modulus of CS fabrics. The results indicated a linear relationship existing between the stress and strain properties of the studied CS samples under controlled stretch ratios (< 100%). The newly proposed method and the determined key mechanical properties of elastic orthotropic CS fabrics facilitate FE modeling for analyzing in-depth the effects of compression material design on their resultant biomechanical function in compression therapy.

Keywords: elastic compression stockings, Young’s modulus, Poisson’s ratio, shear modulus, mechanical analysis

Procedia PDF Downloads 112
5403 Revitalization of Sign Language through Deaf Theatre: A Linguistic Analysis of an Art Form Which Combines Physical Theatre, Poetry, and Sign Language

Authors: Gal Belsitzman, Rose Stamp, Atay Citron, Wendy Sandler

Abstract:

Sign languages are considered endangered. The vitality of sign languages is compromised by its unique sociolinguistic situation, in which hearing parents that give birth to deaf children usually decide to cochlear implant their child. Therefore, these children don’t acquire their natural language – Sign Language. Despite this, many sign languages, such as Israeli Sign Language (ISL) are thriving. The continued survival of similar languages under threat has been associated with the remarkable resilience of the language community. In particular, deaf literary traditions are central in reminding the community of the importance of the language. One example of a deaf literary tradition which has received increased popularity in recent years is deaf theatre. The Ebisu Sign Language Theatre Laboratory, developed as part of the multidisciplinary Grammar of the Body Research Project, is the first deaf theatre company in Israel. Ebisu Theatre combines physical theatre and sign language research, to allow for a natural laboratory to analyze the creative use of the body. In this presentation, we focus on the recent theatre production called ‘Their language’ which tells of the struggle faced by the deaf community to use their own natural language in the education system. A thorough analysis unravels how linguistic properties are integrated with the use of poetic devices and physical theatre techniques in this performance, enabling wider access by both deaf and hearing audiences, without interpretation. Interviews with the audience illustrate the significance of this art form which serves a dual purpose, both as empowering for the deaf community and educational for the hearing and deaf audiences, by raising awareness of community-related issues.

Keywords: deaf theatre, empowerment, language revitalization, sign language

Procedia PDF Downloads 166
5402 Artificial Intelligence as a User of Copyrighted Work: Descriptive Study

Authors: Dominika Collett

Abstract:

AI applications, such as machine learning, require access to a vast amount of data in the training phase, which can often be the subject of copyright protection. During later usage, the various content with which the application works can be recorded or made available on the basis of which it produces the resulting output. The EU has recently adopted new legislation to secure machine access to protected works under the DSM Directive; but, the issue of machine use of copyright works is not clearly addressed. However, such clarity is needed regarding the increasing importance of AI and its development. Therefore, this paper provides a basic background of the technology used in the development of applications in the field of computer creativity. The second part of the paper then will focus on a legal analysis of machine use of the authors' works from the perspective of existing European and Czech legislation. The main results of the paper discuss the potential collision of existing legislation in regards to machine use of works with special focus on exceptions and limitations. The legal regulation of machine use of copyright work will impact the development of AI technology.

Keywords: copyright, artificial intelligence, legal use, infringement, Czech law, EU law, text and data mining

Procedia PDF Downloads 120