Search results for: senior secondary school students
2581 Induction of Labor Using Misoprostol with or without Mifepristone in Intrauterine Death: A Randomized Controlled Study
Authors: Ajay Agrawal, Pritha Basnet, Achala Thakur, Pappu Rizal, Rubina Rai
Abstract:
Context: Rapid expulsion of fetus in intrauterine fetal death (IUFD) is usually requested without any medical grounds for it. So; an efficient, safe method for induction of labor (IOL) is required. Objective: To determine if pre-treatment with mifepristone followed by IOL with misoprostol in late IUFD is more efficacious. Methods: We conducted a randomized controlled trial in 100 patients. Group-A women received single oral dose of 200 mg mifepristone, followed by induction with vaginal misoprostol after 24-hour. Group-B women were induced only with vaginal misoprostol. In each group 5 dose of misoprostol was used 4 hourly. If first cycle was unsuccessful, after break of 12 hour, second course of misoprostol was started. The primary outcome was a measure of induction to delivery time and vaginal delivery within 24 hours. Secondary outcome was to measure need of oxytocin and complications. Results: Maternal age, parity and period of gestation were comparable between groups. Number of misoprostol dose needed in group A was significantly less than group B. Mann Whitney U test showed, women in group A had significantly earlier onset of labor, however total induction to delivery interval was not significant. In group-A, 85.7% delivered within 24 hours of first dose of misoprostol while in group-B 70% delivered within 24 hour (p=0.07). More women in Group B required oxytocin. Conclusion: Pretreatment with mifepristone before IOL following late IUFD is an effective and safe regimen. It appears to shorten the duration of induction to onset of labor.Keywords: induction of labor, intrauterine fetal death, mifepristone, misoprostol
Procedia PDF Downloads 3782580 Revisiting the Historical Narratives of the Old Churches in Albay, Bikol Region, Philippines
Authors: Ruby Ann L. Ayo
Abstract:
As cultural heritage reflects the historical origin of a certain group of people, it reveals their customs, traits, beliefs, practices and even values they hold on for years. One of the tangible examples of cultural heritage is the physical structures including the old churches. The study looked-into the existing historical narratives of the century Old Catholic churches in the Province of Albay, Bikol Region, Philippines: NuestraSeñora de Salvacion in Joroan, Tiwi, Albay; the Our Lady of the Gate in Daraga, Albay; the San Juan de Bautista in Tabaco City and the St. John the Baptist in Camalig, Albay. The historical narratives were analysed in terms of validity and reliability of the secondary documents with reference to the elements of history revealing consistency and adequacy of historical facts. The contents were examined using a modified Checklist of Historical Documents. The historical narratives were likewise submitted to the content expert for validation as regards historical authenticity and accuracy. The contents of the narratives were scrutinized according to the following codes: (1.1) the Patron Saints;(1.2) factors that paved to their constructions; (1.3) the people responsible for their constructions; (1.4) the misconceptions about their constructions; and (1.5) their contributions to Bikol heritage. Based on the codes, themes were identified as: (2.1) Marian Devotees and Christ-centered Patron Saints; (2.2) geographical, socio-political and cultural factors; (2.3) church and government officials; (2.4) misconceptions on the dates of constructions and original sites; and (2.5) popular pilgrim sites and well-admired architectural designs.Keywords: historical narratives, old churches, cultural heritage, historical validity and reliability, elements of history
Procedia PDF Downloads 3002579 High Catalytic Activity and Stability of Ginger Peroxidase Immobilized on Amino Functionalized Silica Coated Titanium Dioxide Nanocomposite: A Promising Tool for Bioremediation
Authors: Misha Ali, Qayyum Husain, Nida Alam, Masood Ahmad
Abstract:
Improving the activity and stability of the enzyme is an important aspect in bioremediation processes. Immobilization of enzyme is an efficient approach to amend the properties of biocatalyst required during wastewater treatment. The present study was done to immobilize partially purified ginger peroxidase on amino functionalized silica coated titanium dioxide nanocomposite. Interestingly there was an enhancement in enzyme activity after immobilization on nanosupport which was evident from effectiveness factor (η) value of 1.76. Immobilized enzyme was characterized by transmission electron microscopy, scanning electron microscopy and Fourier transform infrared spectroscopy. Immobilized peroxidase exhibited higher activity in a broad range of pH and temperature as compared to free enzyme. Also, the thermostability of peroxidase was strikingly improved upon immobilization. After six repeated uses, the immobilized peroxidase retained around 62% of its dye decolorization activity. There was a 4 fold increase in Vmax of immobilized peroxidase as compared to free enzyme. Circular dichroism spectroscopy demonstrated conformational changes in the secondary structure of enzyme, a possible reason for the enhanced enzyme activity after immobilization. Immobilized peroxidase was highly efficient in the removal of acid yellow 42 dye in a stirred batch process. Our study shows that this bio-remediating system has remarkable potential for treatment of aromatic pollutants present in wastewater.Keywords: acid yellow 42, decolorization, ginger peroxidase, immobilization
Procedia PDF Downloads 2522578 Issues and Challenges in Social Work Field Education: The Field Coordinator's Perspective
Authors: Tracy B.E. Omorogiuwa
Abstract:
Understanding the role of social work in improving societal well-being cannot be separated from the place of field education, which is an integral aspect of social work education. Field learning provides students with knowledge and opportunities to experience solving issues in the field and giving them a clue of the practice situation. Despite being a crucial component in social work curriculum, field education occupies a large space in learning outcome, given the issues and challenges pertaining to its purpose and significance in the society. The drive of this paper is to provide insight on the specific ways in which field education has been conceived, realized and valued in the society. Emphasis is on the significance of field instruction; the link with classroom learning; and the structure of field experience in social work education. Given documented analysis and experience, this study intends to contribute to the development of social work curriculum, by analyzing the pattern, issues and challenges fronting the social work field education in the University of Benin, Nigeria.Keywords: challenges, curriculum, field education, social work education
Procedia PDF Downloads 3042577 Death Anxiety, Quality of Life, and Self-Esteem of the Elderly in Surat Thani Province, Thailand
Authors: W. Phokhwang-Just, A. Saraketrin, P. Thongpet, J. Udomkitpipat, J. Kaewsakulthong
Abstract:
The more people get older and live longer, the more health problems they may have. This cross-sectional study aims to study a correlation between death anxiety, quality of life, and self-esteem as well as factors affecting these variables in the elderly living in Surat Thani Province, Thailand. Of 382 elderly people, who were proportionally sampled from 19 districts in Surat Thani Province, 256 (67%) already returned the questionnaires. The Thai version of Templer’s Death Anxiety, Quality of Life (WHO-BREF), and of Rosenberg’s Self-Esteem Questionnaires were employed. The result showed that the samples had a mean age of 72 years old, 53% were female, 62% were married, 61% graduated with primary-school, and 61% had at least one chronic disease Approximately, 19% of them had 3 diseases. The quality of life (QOL), self-esteem (SE), and death anxiety (DA) of samples were in moderate (n= 91, mean = 86.89, SD = 15.47), high (n = 138, mean = 29.33, SD=4.77), and low level (n= 85, mean = 6.23, SD= 3.65), respectively. The QOL was not significantly different between male and female as well as among different marital status. The female elderly had more DA and less SE than male (t= 2.095, df = 83; t =-3.258, df =135, respectively, p < 0.05). The female elderly, who were separated or widow, had a higher level of DA than did the married elderly (LSD: p < 0.05). The married elderly had a higher level of SE than did the separated, widowed (Tukey HSD, LSD: p < 0.05), or single elderly (LSD: p < 0.05). The more diseases the elderly got, the lower level of QOL they had (r = -0.335, p < 0.05). The QOL was significantly correlated with SE (r =0.434, p < 0.05), but not significantly related to DA (r = -0.200, p = 0.069). The lower level of SE the elderly had, the higher level of DA they become (r = -2.71, p < 0.05). In order to promote the QOL, the SE of the elderly should be enhanced. Consequently, the DA can be minimized. Healthcare providers should provide care that promotes QOL, SE, and reduces DA of the elderly, especially those, who are female, single, and separated or widowed as well as those, who have more diseases than the othersKeywords: death anxiety, quality of life, self-esteem, elderly
Procedia PDF Downloads 3182576 Computer Network Applications, Practical Implementations and Structural Control System Representations
Authors: El Miloudi Djelloul
Abstract:
The computer network play an important position for practical implementations of the differently system. To implement a system into network above all is needed to know all the configurations, which is responsible to be a part of the system, and to give adequate information and solution in realtime. So if want to implement this system for example in the school or relevant institutions, the first step is to analyze the types of model which is needed to be configured and another important step is to organize the works in the context of devices, as a part of the general system. Often before configuration, as important point is descriptions and documentations from all the works into the respective process, and then to organize in the aspect of problem-solving. The computer network as critic infrastructure is very specific so the paper present the effectiveness solutions in the structured aspect viewed from one side, and another side is, than the paper reflect the positive aspect in the context of modeling and block schema presentations as an better alternative to solve the specific problem because of continually distortions of the system from the line of devices, programs and signals or packed collisions, which are in movement from one computer node to another nodes.Keywords: local area networks, LANs, block schema presentations, computer network system, computer node, critical infrastructure packed collisions, structural control system representations, computer network, implementations, modeling structural representations, companies, computers, context, control systems, internet, software
Procedia PDF Downloads 3672575 Security Analysis of Mod. S Transponder Technology and Attack Examples
Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski
Abstract:
All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.Keywords: flight safety, hijack, mod S transponder, security analysis
Procedia PDF Downloads 3002574 The Clustering of Multiple Sclerosis Subgroups through L2 Norm Multifractal Denoising Technique
Authors: Yeliz Karaca, Rana Karabudak
Abstract:
Multifractal Denoising techniques are used in the identification of significant attributes by removing the noise of the dataset. Magnetic resonance (MR) image technique is the most sensitive method so as to identify chronic disorders of the nervous system such as Multiple Sclerosis. MRI and Expanded Disability Status Scale (EDSS) data belonging to 120 individuals who have one of the subgroups of MS (Relapsing Remitting MS (RRMS), Secondary Progressive MS (SPMS), Primary Progressive MS (PPMS)) as well as 19 healthy individuals in the control group have been used in this study. The study is comprised of the following stages: (i) L2 Norm Multifractal Denoising technique, one of the multifractal technique, has been used with the application on the MS data (MRI and EDSS). In this way, the new dataset has been obtained. (ii) The new MS dataset obtained from the MS dataset and L2 Multifractal Denoising technique has been applied to the K-Means and Fuzzy C Means clustering algorithms which are among the unsupervised methods. Thus, the clustering performances have been compared. (iii) In the identification of significant attributes in the MS dataset through the Multifractal denoising (L2 Norm) technique using K-Means and FCM algorithms on the MS subgroups and control group of healthy individuals, excellent performance outcome has been yielded. According to the clustering results based on the MS subgroups obtained in the study, successful clustering results have been obtained in the K-Means and FCM algorithms by applying the L2 norm of multifractal denoising technique for the MS dataset. Clustering performance has been more successful with the MS Dataset (L2_Norm MS Data Set) K-Means and FCM in which significant attributes are obtained by applying L2 Norm Denoising technique.Keywords: clinical decision support, clustering algorithms, multiple sclerosis, multifractal techniques
Procedia PDF Downloads 1752573 Using Computerized Analogical Reasoning Tasks as a Way to Improve Literacy Skills in Children with Mild Intellectual Disability
Authors: Caroline Denaes
Abstract:
The ability to read is crucial for a successful path in school and in a social and professional context. Children with mild intellectual disability are confronted to serious difficulties in literacy. A lot of them do not read or are illiterate. Only one child out of five is able to acquire basic reading skills, which increases the likelihood to misfit in society, especially when these children grow up and cannot manage themselves in situations requiring higher reading levels. One way to help these children acquiring basic reading skills is to use analogical reasoning, as some researchers demonstrated that this mechanism is fundamental for any reading process. For this purpose, we developed computerized analogies displayed on a touch screen tablet. Analogies are comparisons that give children a framework they can use to understand new information. They work by comparing one thing to another in order to emphasize some mutual quality. If one of the items is unfamiliar, that mutual quality can help make it understandable, or it can cause the children to consider something familiar in some new way, such as transferring what they know about familiar words to help them identify unfamiliar words. In addition, using touch screen tablets represents several advantages: the ease of use, the relevance to this specific population and the appeal of a self-directed activity gives individuals and practitioners a modern tool that differs from the traditional paper-and-pencil material. In addition, the touch screen dimension is especially appropriate for children as assistive technology has been found to be more motivating that any other types of devices and improves the children’ attention span.Keywords: literacy, intellectual disabilities, touch screen techonology, literacy skill
Procedia PDF Downloads 2742572 A Corpus-Based Analysis of "MeToo" Discourse in South Korea: Coverage Representation in Korean Newspapers
Authors: Sun-Hee Lee, Amanda Kraley
Abstract:
The “MeToo” movement is a social movement against sexual abuse and harassment. Though the hashtag went viral in 2017 following different cultural flashpoints in different countries, the initial response was quiet in South Korea. This radically changed in January 2018, when a high-ranking senior prosecutor, Seo Ji-hyun, gave a televised interview discussing being sexually assaulted by a colleague. Acknowledging public anger, particularly among women, on the long-existing problems of sexual harassment and abuse, the South Korean media have focused on several high-profile cases. Analyzing the media representation of these cases is a window into the evolving South Korean discourse around “MeToo.” This study presents a linguistic analysis of “MeToo” discourse in South Korea by utilizing a corpus-based approach. The term corpus (pl. corpora) is used to refer to electronic language data, that is, any collection of recorded instances of spoken or written language. A “MeToo” corpus has been collected by extracting newspaper articles containing the keyword “MeToo” from BIGKinds, big data analysis, and service and Nexis Uni, an online academic database search engine, to conduct this language analysis. The corpus analysis explores how Korean media represent accusers and the accused, victims and perpetrators. The extracted data includes 5,885 articles from four broadsheet newspapers (Chosun, JoongAng, Hangyore, and Kyunghyang) and 88 articles from two Korea-based English newspapers (Korea Times and Korea Herald) between January 2017 and November 2020. The information includes basic data analysis with respect to keyword frequency and network analysis and adds refined examinations of select corpus samples through naming strategies, semantic relations, and pragmatic properties. Along with the exponential increase of the number of articles containing the keyword “MeToo” from 104 articles in 2017 to 3,546 articles in 2018, the network and keyword analysis highlights ‘US,’ ‘Harvey Weinstein’, and ‘Hollywood,’ as keywords for 2017, with articles in 2018 highlighting ‘Seo Ji-Hyun, ‘politics,’ ‘President Moon,’ ‘An Ui-Jeong, ‘Lee Yoon-taek’ (the names of perpetrators), and ‘(Korean) society.’ This outcome demonstrates the shift of media focus from international affairs to domestic cases. Another crucial finding is that word ‘defamation’ is widely distributed in the “MeToo” corpus. This relates to the South Korean legal system, in which a person who defames another by publicly alleging information detrimental to their reputation—factual or fabricated—is punishable by law (Article 307 of the Criminal Act of Korea). If the defamation occurs on the internet, it is subject to aggravated punishment under the Act on Promotion of Information and Communications Network Utilization and Information Protection. These laws, in particular, have been used against accusers who have publicly come forward in the wake of “MeToo” in South Korea, adding an extra dimension of risk. This corpus analysis of “MeToo” newspaper articles contributes to the analysis of the media representation of the “MeToo” movement and sheds light on the shifting landscape of gender relations in the public sphere in South Korea.Keywords: corpus linguistics, MeToo, newspapers, South Korea
Procedia PDF Downloads 2302571 Pontine and Lobar Hemorrhage from Venous Infarction secondary to Cerebral Venous Thrombosis in a 70-year old Filipina with Protein S Deficiency: A Case Report
Authors: Michelangelo Liban, Debbie Liquete
Abstract:
A 70-year-old right-handed Filipina was seen by the Neurology service due to a new onset headache, bi-occipital in location, dull squeezing in character with a pain score of 8/10 with associated nausea and one episode of non-projectile, which provided no relief. Due to the alarming features of the headache despite the absence of risk factors and an essentially normal neurologic examination, a cranial CTA+CTV was done, which revealed a small left frontal and small right pontine hyper density with minimal perilesional edema. Findings also revealed filling defects in the straight and right transverse sinus and a consideration of hypoplastic left transverse sinus with no definite evidence of aneurysm nor A-V malformation. She had normal levels of D-Dimer, Protein C, ANA and Anti-DS DNA but had a low Protein S of 56% (N.V is 70-120%). Antithrombin, homocysteine and Factor V Leiden were not done due to unavailability of the tests. She was then treated as a case of Cerebral Venous Thrombosis with multiple hemorrhage from venous infraction and was given anticoagulants which provided relief of the headache. She did not manifest with any further cortical, bulbar or sensorimotor deficits hence was discharged improved after 15 hospital days. To our knowledge, there are no case reports of patients with CVT from Protein S deficiency and venous anomaly that presented with multiple hemorrhage from venous infarction, more so affecting the brainstem. In this paper, a rare location of CVT in a newly diagnosed Protein S deficient patient is presented together with an uneventful course and favorable outcome.Keywords: protein S deficiency, cerebral venous thrombosis, pontine hemorrhage from venous infarction, elderly
Procedia PDF Downloads 802570 Optimization of Economic Order Quantity of Multi-Item Inventory Control Problem through Nonlinear Programming Technique
Authors: Prabha Rohatgi
Abstract:
To obtain an efficient control over a huge amount of inventory of drugs in pharmacy department of any hospital, generally, the medicines are categorized on the basis of their cost ‘ABC’ (Always Better Control), first and then categorize on the basis of their criticality ‘VED’ (Vital, Essential, desirable) for prioritization. About one-third of the annual expenditure of a hospital is spent on medicines. To minimize the inventory investment, the hospital management may like to keep the medicines inventory low, as medicines are perishable items. The main aim of each and every hospital is to provide better services to the patients under certain limited resources. To achieve the satisfactory level of health care services to outdoor patients, a hospital has to keep eye on the wastage of medicines because expiry date of medicines causes a great loss of money though it was limited and allocated for a particular period of time. The objectives of this study are to identify the categories of medicines requiring incentive managerial control. In this paper, to minimize the total inventory cost and the cost associated with the wastage of money due to expiry of medicines, an inventory control model is used as an estimation tool and then nonlinear programming technique is used under limited budget and fixed number of orders to be placed in a limited time period. Numerical computations have been given and shown that by using scientific methods in hospital services, we can give more effective way of inventory management under limited resources and can provide better health care services. The secondary data has been collected from a hospital to give empirical evidence.Keywords: ABC-VED inventory classification, multi item inventory problem, nonlinear programming technique, optimization of EOQ
Procedia PDF Downloads 2592569 Pathological Observations of Intestinal Coccidiosis in Camel (Camelus dromedarius)
Authors: Abhilasha Dadhich, Manisha Mathur, Sanjay Kumar, Hemant Dadhich
Abstract:
The camel (Camelus dromedarius) is an important animal component of the fragile desert eco-system of India. Apart from others, impaired milk and meat production decrease in performance and even death are some of the major consequences of parasitic disease like coccidiosis in camel. Coccidiosis which is an acute invasion and destruction of intestinal mucosa by protozoa of the genera Eimeria or isospora spp. Post-Mortem examinations of 5 carcasses of dromedary of different age groups aged from 2 to 5 years were conducted. The history indicated that the camels were suffering from diarrhoea, dysentery, pyrexia, inappetence, weight loss, and emaciation. Post mortem examinations showed macroscopic and microscopic alterations in the small intestine, particularly in jejunum and ileum regions. The mucosae were congested, and haemorrhagic on which there were numerous whitish-grey nodular foci were observed. The affected intestinal tissue specimens were preserved in 10% formal saline and processed mechanically for paraffin embedding by acetone and benzene technique. The sections were stained with haematoxylin and eosin method of staining for histopathological examinations. Histologically, typical lesions such as congestion and haemorrhages were present. The intestinal villi were oedematous; mucosa degenerated and desquamated, along with infiltration of eosinophils and macrophages. Crypts of lieberkuhn were obliterated due to presence of schizonts in lamina propria. Older camels served as the source of spread of coccidial infection and were also predisposed to secondary infections.Keywords: camel, coccidiosis, Eimeria, histopathology
Procedia PDF Downloads 1932568 Pellegrini-Stieda Syndrome: A Physical Medicine and Rehabilitation Approach
Authors: Pedro Ferraz-Gameiro
Abstract:
Introduction: The Pellegrini-Stieda lesion is the result of post-traumatic calcification and/or ossification on the medial collateral ligament (MCL) of the knee. When this calcification is accompanied by gonalgia and limitation of knee flexion, it is called Pellegrini-Stieda syndrome. The pathogenesis is probably the calcification of a post-traumatic hematoma at least three weeks after the initial trauma or secondary to repetitive microtrauma. On anteroposterior radiographs, a Pellegrini-Stieda lesion is a linear vertical ossification or calcification of the proximal portion of the MCL and usually near the medial femoral condyle. Patients with Pellegrini-Stieda syndrome present knee pain associated with loss of range of motion. The treatment is usually conservative with analgesic and anti-inflammatory drugs, either systemic or intra-articular. Physical medicine and rehabilitation techniques associated with shock wave therapy can be a way of reduction of pain/inflammation. Patients who maintain instability with significant limitation of knee mobility may require surgical excision. Methods: Research was done using PubMed central using the terms Pellegrini-Stieda syndrome. Discussion/conclusion: Medical treatment is the rule, with initial rest, anti-inflammatory, and physiotherapy. If left untreated, this ossification can potentially form a significant bone mass, which can compromise the range of motion of the knee. Physical medicine and rehabilitation techniques associated with shock wave therapy are a way of reduction of pain/inflammation.Keywords: knee, Pellegrini-Stieda syndrome, rehabilitation, shock waves therapy
Procedia PDF Downloads 1452567 Child Labour Issue: Practice of Enforecement of Right of the Child in Nigeria
Authors: Gift Salawa, Perkins Erhijakpor, Henry Ukwu
Abstract:
This study will explore child labour issues in Nigeria because it is capable of affecting the physical and general well-being of children who perform hazardous work. This feat will be achieved through qualitative research methodology. Data collection shall be elicited by oral interviews and documental content analysis to delve on the application of the Convention on the Rights of the Child (CRC), International Labour Organization ILO and Geneva Convention relating to child labour practices in Nigeria. This will include the relevance of present domestic laws relating to child labour as implemented in Nigeria, together with factors that contribute to the practice of child labour in the country. The oral interview data analysis will be performed by breaking the interview data into significant statements and themes. This shall be done by comparing and determining the commonalities that are prevalent in the participants’ views regarding child labour menace in Nigeria. Presumably, findings from this study shall unveil that a poor educational policy, a widespread poverty level which is mostly prevalent amongst families in the rural areas of the country, a lack of employment for adults, have led to the ineffectiveness of the local child labour laws in Nigeria. These has in turn culminated into a somewhat non-implementation of the international laws of the CRC, ILO and Geneva Declaration on child labour to which the Nigerian government is a signatory. Based on the finding, this study will calls on the government of Nigeria to extend its free educational policy from the elementary, secondary to tertiary educations. The government also has to ensure that offenders of children’s rights should face a severe punishment.Keywords: child labour, educational policy, human right, protection right
Procedia PDF Downloads 3012566 Nature of Traffic Robbery Victimisation Experience 2015-2023
Authors: Idenyi Goshen Peter, Oludayo Tade
Abstract:
Traffic robbery is a prevalent issue in Lagos State, impacting commuters and transport workers, necessitating an examination of victimization experiences and offender-victim dynamics. The research aim is to investigate the nature of traffic robbery victimization experiences, strategies employed by offenders, and the extent of the crime as reported in newspapers. Utilizing content analysis, the study examines 167 traffic robbery cases from 2015 to 2023 reported in five newspapers using the routine activity theory to understand the dynamics between offenders and victims. The research discusses the victimization experience and convergence of the offenders and victims, it documents the extent of the crime as captured by various newspapers (Vanguard, Punch. Tribune, Sun and Guardian ), and it also interrogates the strategies, methods deployed by traffic robbers. The study addresses the nature, strategies, and extent of traffic robbery victimization experiences, shedding light on the dynamics of the crime over an eight-year period. The paper implored secondary research from newspaper publications, and also content analysis for the research. Routine activity theory was used to explain the phenomenon that exists between the offender and the victim. Consequently, the common method used by offenders is dispossessing victims of their valuables, leading to fear-driven victim experiences, with spikes in incidents observed in June and December, particularly in Vanguard and Punch publications.Keywords: traffic robbery, victimisation experience, offender, routine activity
Procedia PDF Downloads 322565 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 1562564 Girls’ Education Policy and Practices in Three Selected Countries of Africa: Feminism, Educational Reform and Cultural Inflections in View
Authors: Endalew Fufa Kufi
Abstract:
One of the major concerns in educational provision and success determination is access to available opportunities. In that, girls’ access to education has been a point of concern, and more emphasis has come to be at the forefront regarding success. Researches have mostly been held on extremes such as equal access and success, but only a few works deal with process issues related to home and school interplay, issues of progress from lower to higher levels, and spatial conditions related to girls’ education. Hence, this survey assessed experiences in three countries of Africa: Ethiopia, Ghana, and Botswana regarding girls’ education in policy and practice as related to contextual matters in girls’ education. Contextual discourse analysis of qualitative design was used to materialize the study. From each country, five research works held 2010 onwards were purposively selected through criterion-sampling. On the policy aspect, workable documents were looked into. The findings denoted that educational access was of more stretch and generic nature, and the narration was dominated by institutional expectations, not identifying which group should benefit what. The researches largely dealt with either subject-specific dealings or access alone at large. Success studies, by far, dealt with a comparison of girls with boys rather than determinant-related projections. Moreover, the cultural representation of girls’ education had a very minimal part in both policy and researches. From that, it could be found that in-depth scrutiny on the individual, institutional, and leadership determinants of girls’ education would be necessary.Keywords: determinants, girls, education, feminism
Procedia PDF Downloads 3002563 The 5S Responses of Obese Teenagers in Verbal Bullying
Authors: Alpha Bolinao, Francine Rose De Castro, Jessie Kate Lumba, Raztine Mae Paeste, Hannah Grace Tosio
Abstract:
The present study aimed to know the role of verbal bullying in the lives of obese teenagers exposed to it. The study employed a qualitative design specifically the phenomenological approach that focuses on the obese teenagers’ verbal bullying experiences. The study also used the social constructivism approach wherein it described the obese teenagers’ verbal bullying experiences as they interact with the social world. Through purposive and referral sampling technique, the researchers were able to choose twelve (12) respondents from different schools around the City of Manila, enrolled in the School Year 2015-2016, ages 16-21 years old, has experienced verbal bullying for the last ten (10) years and with the Body Mass Index (BMI) of equal to or greater than 30. Upon the consent of the respondents, ethical considerations were ensured. In-depth one (1) hour interviews were guided by the researchers’ aide memoir. The recorded interviews were transcribed into a field text and the responses were thoroughly analyzed through Thematic Analysis and Kelly’s Repertory Grid. It was found that the role of verbal bullying in the lives of obese teenagers exposed to it is a process and is best described through a syringe, or the 5S Responses of Obese Teenagers in Bullying, with five conceptual themes which also signify the experiences and the process that obese teenagers have gone through after experiencing verbal bullying. The themes conceptualized were: Suffering, self-doubt, suppression, self-acceptance and sanguineness. This paper may serve as a basis for a counseling program to help the obese teenagers cope with their bullying experiences.Keywords: obesity, obese teenagers, bullying, experiences
Procedia PDF Downloads 3622562 Aligning Informatics Study Programs with Occupational and Qualifications Standards
Authors: Patrizia Poscic, Sanja Candrlic, Danijela Jaksic
Abstract:
The University of Rijeka, Department of Informatics participated in the Stand4Info project, co-financed by the European Union, with the main idea of an alignment of study programs with occupational and qualifications standards in the field of Informatics. A brief overview of our research methodology, goals and deliverables is shown. Our main research and project objectives were: a) development of occupational standards, qualification standards and study programs based on the Croatian Qualifications Framework (CROQF), b) higher education quality improvement in the field of information and communication sciences, c) increasing the employability of students of information and communication technology (ICT) and science, and d) continuously improving competencies of teachers in accordance with the principles of CROQF. CROQF is a reform instrument in the Republic of Croatia for regulating the system of qualifications at all levels through qualifications standards based on learning outcomes and following the needs of the labor market, individuals and society. The central elements of CROQF are learning outcomes - competences acquired by the individual through the learning process and proved afterward. The place of each acquired qualification is set by the level of the learning outcomes belonging to that qualification. The placement of qualifications at respective levels allows the comparison and linking of different qualifications, as well as linking of Croatian qualifications' levels to the levels of the European Qualifications Framework and the levels of the Qualifications framework of the European Higher Education Area. This research has made 3 proposals of occupational standards for undergraduate study level (System Analyst, Developer, ICT Operations Manager), and 2 for graduate (master) level (System Architect, Business Architect). For each occupational standard employers have provided a list of key tasks and associated competencies necessary to perform them. A set of competencies required for each particular job in the workplace was defined and each set of competencies as described in more details by its individual competencies. Based on sets of competencies from occupational standards, sets of learning outcomes were defined and competencies from the occupational standard were linked with learning outcomes. For each learning outcome, as well as for the set of learning outcomes, it was necessary to specify verification method, material, and human resources. The task of the project was to suggest revision and improvement of the existing study programs. It was necessary to analyze existing programs and determine how they meet and fulfill defined learning outcomes. This way, one could see: a) which learning outcomes from the qualifications standards are covered by existing courses, b) which learning outcomes have yet to be covered, c) are they covered by mandatory or elective courses, and d) are some courses unnecessary or redundant. Overall, the main research results are: a) completed proposals of qualification and occupational standards in the field of ICT, b) revised curricula of undergraduate and master study programs in ICT, c) sustainable partnership and association stakeholders network, d) knowledge network - informing the public and stakeholders (teachers, students, and employers) about the importance of CROQF establishment, and e) teachers educated in innovative methods of teaching.Keywords: study program, qualification standard, occupational standard, higher education, informatics and computer science
Procedia PDF Downloads 1442561 Human Capital Mobility of a Skilled Workforce: A Need for a Future of Europe
Authors: Tiron-Tudor Adriana, Farcas Teodora Viorica, Ciolomic Ioana Andreea
Abstract:
The issue of human capital mobility inside Europe is still an open one. Even though there were created some tools in order to better move from one country to another to work and study the number of the people doing this is very low because of various factors presented in this paper. The "rethinking educational" agenda of the European Commission has open the floor for new projects which can create steps towards a European language for skills and competences, qualifications. One of these projects is the Partnership for Exchange of experience in Student on-the-job Training. As part of this project, we are interested to see the situation of the human capital inside EU and the elements that were created until now to support this mobility. Also, the main objective of the project is to make a comparison between the four countries involved in PEST project (Romania, Hungary, Finland, and Estonia), at the education and internship level. The results are helpful for the follow of the project, for identifying where changes can be done and need to be done.Keywords: ECVET, human capital mobility, partnership exchange, students on the job mobility, vocational education and training
Procedia PDF Downloads 4282560 Exploring the Travel Preferences of Generation Z: A Look into the Next Generation of Tourists
Authors: M. Panidou, F. Kilipiris, E. Christou, K. Alexandris
Abstract:
This study focuses on Generation Z, the next generation of tourists born between 1996 and 2012. Given their significant population size, Generation Z is expected to have a substantial impact on the travel and tourism sector. Therefore, understanding their travel preferences is crucial for businesses in the hospitality and tourism industry. By examining their travel preferences, this research aims to identify the unique characteristics and motivations of this generation when it comes to travel. This study used a quantitative method, and primary data was collected through a survey (online questionnaire), while secondary data was gathered from academic literature, industry reports, and online sources to provide a comprehensive analysis of the topic. The sample of the study was 100 Greek individuals aged between 18-26 years old. The data was analyzed with the support of SPSS software. The findings of the research indicated that technology, sustainability, and budget-friendly options are essential components for attracting and retaining Generation Z tourists. These preferences highlight the importance of incorporating innovative technologies, promoting sustainable practices, and offering affordable travel options to effectively engage this market niche. This research contributes to the field of hospitality and tourism businesses by providing valuable insights into the travel preferences of Generation Z. By understanding their distinct features and preferences; businesses can tailor their strategies and marketing efforts to effectively engage and retain this market segment. Considering the limitations of the sample size, future studies could aim for a larger and more diverse sample to enhance the generalizability of the findings.Keywords: gen Z, technology, travel preferences, sustainability
Procedia PDF Downloads 902559 Efficient Management through Predicting of Use E-Management within Higher Educational Institutions
Authors: S. Maddi Muhammed, Paul Davis, John Geraghty, Mabruk Derbesh
Abstract:
This study discusses the probability of using electronic management in higher education institutions in Libya. This could be as sampled by creating an electronic gate at the faculties of Engineering and Computing "Information Technology" at Zaytuna University or any other university in Libya. As we all know, the competitive advantage amongst universities is based on their ability to use information technology efficiently and broadly. Universities today value information technology as part of the quality control and assurance and a ranking criterion for a range of services including e-learning and e-Registration. This could be done by developing email systems, electronic or virtual libraries, electronic cards, and other services provided to all students, faculty or staff. This paper discusses a range of important topics that explain how to apply the gate "E" with the faculties at Zaytuna University, Bani Walid colleges in Libya.Keywords: e-management, educational institutions (EI), Libya, Zaytuna, information technology
Procedia PDF Downloads 4612558 Design, Construction And Validation Of A Simple, Low-cost Phi Meter
Authors: Gabrielle Peck, Ryan Hayes
Abstract:
The use of a phi meter allows for definition of equivalence ratio during a fire test. Previous phi meter designs have used expensive catalysts and had restricted portability due to the large furnace and requirement for pure oxygen. The new design of the phi meter did not require the use of a catalyst. The furnace design was based on the existing micro-scale combustion calorimetry (MCC) furnace and operating conditions based on the secondary oxidizer furnace used in the steady state tube furnace (SSTF). Preliminary tests were conducted to study the effects of varying furnace temperatures on combustion efficiency. The SSTF was chosen to validate the phi meter measurements as it can both pre-set and independently quantify the equivalence ratio during a test. The data were in agreement with the data obtained on the SSTF. It was also validated by a comparison of CO2 yields obtained from the SSTF oxidizer and those obtained by the phi meter. The phi meter designed and constructed in this work was proven to work effectively on a bench-scale. The phi meter was then used to measure the equivalence ratio on a series of large-scale ISO 9705 tests for numerous fire conditions. The materials used were a range of non-homogenous materials such as polyurethane. The measurements corresponded accurately to the data collected, showing the novel design can be used from bench to large-scale tests to measure equivalence ratio. This cheaper, more portable, safer and easier to use phi meter design will enable more widespread use and the ability to quantify fire conditions of tests, allowing for better understanding of flammability and smoke toxicity.Keywords: phi meter, smoke toxicity, fire condition, ISO9705, novel equipment
Procedia PDF Downloads 1062557 Simulation of a Three-Link, Six-Muscle Musculoskeletal Arm Activated by Hill Muscle Model
Authors: Nafiseh Ebrahimi, Amir Jafari
Abstract:
The study of humanoid character is of great interest to researchers in the field of robotics and biomechanics. One might want to know the forces and torques required to move a limb from an initial position to the desired destination position. Inverse dynamics is a helpful method to compute the force and torques for an articulated body limb. It enables us to know the joint torques required to rotate a link between two positions. Our goal in this study was to control a human-like articulated manipulator for a specific task of path tracking. For this purpose, the human arm was modeled with a three-link planar manipulator activated by Hill muscle model. Applying a proportional controller, values of force and torques applied to the joints were calculated by inverse dynamics, and then joints and muscle forces trajectories were computed and presented. To be more accurate to say, the kinematics of the muscle-joint space was formulated by which we defined the relationship between the muscle lengths and the geometry of the links and joints. Secondary, the kinematic of the links was introduced to calculate the position of the end-effector in terms of geometry. Then, we considered the modeling of Hill muscle dynamics, and after calculation of joint torques, finally, we applied them to the dynamics of the three-link manipulator obtained from the inverse dynamics to calculate the joint states, find and control the location of manipulator’s end-effector. The results show that the human arm model was successfully controlled to take the designated path of an ellipse precisely.Keywords: arm manipulator, hill muscle model, six-muscle model, three-link lodel
Procedia PDF Downloads 1462556 Foreign Policy and National Security Dilemma: Examining Nigerian Experience
Authors: Shuaibu Umar Abdul
Abstract:
The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.Keywords: foreign policy, nation, national security, Nigeria, security
Procedia PDF Downloads 5202555 Correlation between Consumer Knowledge of the Circular Economy and Consumer Behavior towards Its Application: A Canadian Exploratory Study
Authors: Christopher E. A. Ramsey, Halia Valladares Montemayor
Abstract:
This study examined whether the dissemination of information about the circular economy (CE) has any bearing on the likelihood of the implementation of its concepts on an individual basis. Specifically, the goal of this research study was to investigate the impact of consumer knowledge about the circular economy on their behavior in applying such concepts. Given that our current linear supply chains are unsustainable, it is of great importance that we understand what mechanisms are most effective in encouraging consumers to embrace CE. The theoretical framework employed was the theory of planned behavior (TPB). TPB, with its analysis of how attitude, subjective norms, and perceived behavioral control affect intention, provided an adequate model for testing the effects of increased information about the CE on the implementation of its recommendations. The empirical research consisted of a survey distributed among university students, faculty, and staff at a Canadian University in British Columbia.Keywords: circular economy, consumer behavior, sustainability, theory of planned behavior
Procedia PDF Downloads 1352554 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities
Authors: Eugenio Ferrer Santiago
Abstract:
The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.Keywords: data privacy, data protection, urban planning, research ethics
Procedia PDF Downloads 652553 Terrorism: Impact on Nigeria’s Foreign Policy, 1999-2015
Authors: Omolaja Akolade Oluwaseunfunmi
Abstract:
This study seeks to ascertain the origin and history of terrorism in Nigeria, determine the causes of terrorism in Nigeria, examine Nigeria’s foreign policies from 1999 to 2015, evaluate how terrorist groups like Boko Haram and the Indigenous People of Biafra (IPOB) have affected Nigeria’s foreign policies in the international arena; ascertain the measures taken by the government in tackling terrorist acts in Nigeria and give recommendations on how to tackle this menace. The methodology used in this research is the analytical method. The study derives its data from both primary and secondary sources. Findings from fieldwork showed that terrorism has also become one of the most important fundamentals of Nigeria’s foreign policies and relations; respondents from the people interviewed showed that terrorism is a menace and that terrorism must be adequately tackled in other to achieve Nigeria’s foreign policy. Furthermore, results revealed that the fight against the scourge has increasingly gained legitimacy and justification among the international community particularly as many countries consider it to be their international obligation to support the global movement to ameliorate or eliminate the menace. In conclusion, this research made, among other recommendations, that the Nigerian government should ensure the provision of a good life for its citizens, the inter-connectivity of terrorist organizations must be defeated, the government should undergo a foreign policy drive designed at rebuilding its image in the international environment, and also the promotion of peace education among various government, religious institutions, private sector, and civil society groups should be encouraged.Keywords: foreign policy, Boko Haram, movement for the emancipation of Niger delta (MEND), terrorism
Procedia PDF Downloads 352552 Circular Economy and Remedial Frameworks in Contract Law
Authors: Reza Beheshti
Abstract:
This paper examines remedies for defective manufactured goods in commercial circular economic transactions. The linear ‘take-make-dispose’ model fits well with the conventional remedial framework in which damages are considered the primary remedy. Damages under English Sales Law encourages buyers to look for a substitute seller with broadly similar goods to the ones agreed on in the original contract, enter into contract with this new seller and hence terminate the original contract. By doing so, the buyer ends the contractual relationship. This seems contrary to the core principles of the circular economy: keeping products, components, and materials in longer use, which can partly be achieved by product refurbishment. This process involves returning a product to good working condition by replacing or repairing major components that are faulty or close to failure and making ‘cosmetic’ changes to update the appearance of a product. This remedy has not been widely accepted or applied in commercial cases, which in turn flags up the secondary nature of performance-related remedies. This paper critically analyses the laws concerning the seller’s duty to cure in English law and the extent to which they correspond with core principles of the circular economy. In addition, this paper takes into account the potential of circular economic transactions being characterised as something other than sales. In such situations, the likely outcome will be a license to use products, which may limit the choice of remedy further. Consequently, this paper suggests an outline remedial framework specifically for commercial circular economic transactions in manufactured goods.Keywords: circular economy, contract law, remedies, English Sales Law
Procedia PDF Downloads 161