Search results for: emergency (999) call
735 Identification of Indices to Quantify Gentrification
Authors: Sophy Ann Xavier, Lakshmi A
Abstract:
Gentrification is the process of altering a neighborhood's character through the influx of wealthier people and establishments. This idea has subsequently been expanded to encompass brand-new, high-status construction projects that involve regenerating brownfield sites or demolishing and rebuilding residential neighborhoods. Inequality is made worse by Gentrification in ways that go beyond socioeconomic position. The elderly, members of racial and ethnic minorities, individuals with disabilities, and mental health all suffer disproportionately when they are displaced. Cities must cultivate openness, diversity, and inclusion in their collaborations, as well as cooperation on objectives and results. The papers compiled in this issue concentrate on the new gentrification discussions, the rising residential allure of central cities, and the indices to measure this process according to its various varieties. The study makes an effort to fill the research gap in the area of gentrification studies, which is the absence of a set of indices for measuring Gentrification in a specific area. Studies on Gentrification that contain maps of historical change highlight trends that will aid in the production of displacement risk maps, which will guide future interventions by allowing residents and policymakers to extrapolate into the future. Additionally, these maps give locals a glimpse into the future of their communities and serve as a political call to action in areas where residents are expected to be displaced. This study intends to pinpoint metrics and approaches for measuring Gentrification that can then be applied to create a spatiotemporal map of a region and tactics for its inclusive planning. An understanding of various approaches will enable planners and policymakers to select the best approach and create the appropriate plans.Keywords: gentrification, indices, methods, quantification
Procedia PDF Downloads 76734 Abdominal Pregnancy with a Live Newborn in a Low Resource Setting: A Case Report
Authors: Olivier Mulisya, Guelord Barasima, Henry Mark Lugobe, Philémon Matumo, Bienfait Mumbere Vahwere, Hilaire Mutuka, Zawadi Léocadie, Wesley Lumika
Abstract:
Abdominal pregnancy is defined as pregnancy anywhere within the peritoneal cavity, exclusive of tubal, ovarian, or broad ligament locations. It is a rare form of ectopic pregnancy with high morbidity and mortality for both the mother and the fetus. Diagnosis can be frequently missed in most poor-resource settings because of poor antenatal coverage, low socioeconomic status in most of the patients as well as lack of adequate medical resources. Clinical diagnosis can be very difficult and an ultrasound scan is very helpful during the early stages of gestation but can also be disappointing in the later stages. We report a case of a 25-year-old woman with severe abdominal pain not amended with any medication. A clinical picture of shock lead to an emergency laparotomy which confirmed the diagnosis of abdominal pregnancy. The ministry of health in developing countries should make an effort to make routine early ultrasounds accessible to pregnant women, and obstetricians should keep in mind the possibility of ectopic pregnancy, irrespective of the gestational age.Keywords: abdominal pregnancy, live new bron, ultrasound imaging, abdominal pain
Procedia PDF Downloads 99733 Experiences during the First Year of Practice among New Nurses
Authors: Chanya Thanomlikhit, Pataraporn Kheawwan
Abstract:
Transition from student to staff nurse can be difficult for nurses beginning their nursing profession. Objective: The purpose of this study was to explore the transition experiences during the first year of practice among new nurses in Thailand. Methods: A descriptive design using a survey questionnaire was used. One hundred seventy-eight new graduate nurses from one tertiary hospital in Thailand participated in this study. Data were collected using paper-and-pencil format of the Revised Casey-Fink Graduate Nurse Experience Survey. Results: Participants reported three types of difficulties they were experiencing during the first year of practice including role expectation, lack of confidence, and workload. New nurses reported uncomfortable to perform high risk skills such as code/emergency, ventilator care, EKG, and chest tube care. Organizing, prioritizing and communication were rated as difficult tasks during 12-month transition period. New nurses satisfied the benefit package they received from the institution, however, salary was lowest satisfied. Conclusion: Results inform transition program development for new nurses. Initiative of systems that support for the graduate nurse during the first year of practice is suggested.Keywords: new graduate nurse, transition, nurse residency program, clinical education
Procedia PDF Downloads 238732 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms
Authors: Saint C. Nguedjip
Abstract:
This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women
Procedia PDF Downloads 104731 Implementation of the Outputs of Computer Simulation to Support Decision-Making Processes
Authors: Jiri Barta
Abstract:
At the present time, awareness, education, computer simulation and information systems protection are very serious and relevant topics. The article deals with perspectives and possibilities of implementation of emergence or natural hazard threats into the system which is developed for communication among members of crisis management staffs. The Czech Hydro-Meteorological Institute with its System of Integrated Warning Service resents the largest usable base of information. National information systems are connected to foreign systems, especially to flooding emergency systems of neighboring countries, systems of European Union and international organizations where the Czech Republic is a member. Use of outputs of particular information systems and computer simulations on a single communication interface of information system for communication among members of crisis management staff and setting the site interoperability in the net will lead to time savings in decision-making processes in solving extraordinary events and crisis situations. Faster managing of an extraordinary event or a crisis situation will bring positive effects and minimize the impact of negative effects on the environment.Keywords: computer simulation, communication, continuity, critical infrastructure, information systems, safety
Procedia PDF Downloads 333730 Vulnerability Analysis for Risk Zones Boundary Definition to Support a Decision Making Process at CBRNE Operations
Authors: Aliaksei Patsekha, Michael Hohenberger, Harald Raupenstrauch
Abstract:
An effective emergency response to accidents with chemical, biological, radiological, nuclear, or explosive materials (CBRNE) that represent highly dynamic situations needs immediate actions within limited time, information and resources. The aim of the study is to provide the foundation for division of unsafe area into risk zones according to the impact of hazardous parameters (heat radiation, thermal dose, overpressure, chemical concentrations). A decision on the boundary values for three risk zones is based on the vulnerability analysis that covered a variety of accident scenarios containing the release of a toxic or flammable substance which either evaporates, ignites and/or explodes. Critical values are selected for the boundary definition of the Red, Orange and Yellow risk zones upon the examination of harmful effects that are likely to cause injuries of varying severity to people and different levels of damage to structures. The obtained results provide the basis for creating a comprehensive real-time risk map for a decision support at CBRNE operations.Keywords: boundary values, CBRNE threats, decision making process, hazardous effects, vulnerability analysis, risk zones
Procedia PDF Downloads 209729 Learning Dynamic Representations of Nodes in Temporally Variant Graphs
Authors: Sandra Mitrovic, Gaurav Singh
Abstract:
In many industries, including telecommunications, churn prediction has been a topic of active research. A lot of attention has been drawn on devising the most informative features, and this area of research has gained even more focus with spread of (social) network analytics. The call detail records (CDRs) have been used to construct customer networks and extract potentially useful features. However, to the best of our knowledge, no studies including network features have yet proposed a generic way of representing network information. Instead, ad-hoc and dataset dependent solutions have been suggested. In this work, we build upon a recently presented method (node2vec) to obtain representations for nodes in observed network. The proposed approach is generic and applicable to any network and domain. Unlike node2vec, which assumes a static network, we consider a dynamic and time-evolving network. To account for this, we propose an approach that constructs the feature representation of each node by generating its node2vec representations at different timestamps, concatenating them and finally compressing using an auto-encoder-like method in order to retain reasonably long and informative feature vectors. We test the proposed method on churn prediction task in telco domain. To predict churners at timestamp ts+1, we construct training and testing datasets consisting of feature vectors from time intervals [t1, ts-1] and [t2, ts] respectively, and use traditional supervised classification models like SVM and Logistic Regression. Observed results show the effectiveness of proposed approach as compared to ad-hoc feature selection based approaches and static node2vec.Keywords: churn prediction, dynamic networks, node2vec, auto-encoders
Procedia PDF Downloads 314728 Neurosciences in Entrepreneurship: The Multitasking Case in Favor of Social Entrepreneurship Innovation
Authors: Berger Aida
Abstract:
Social entrepreneurship has emerged as an active area of practice and research within the last three decades and has called for a focus on Social Entrepreneurship innovation. Areas such as academics, practitioners , institutions or governments have placed Social Entrepreneurship on the priority list of reflexion and action. It has been accepted that Social entrepreneurship (SE) shares large similarities with its parent, Traditional Entrepreneurship (TE). SE has grown over the past ten years exploring entrepreneurial cognition and the analysis of the ways of thinking of entrepreneurs. The research community believes that value exists in grounding entrepreneurship in neuroscience and notes that SE, like Traditional Entrepreneurship, needs to undergo efforts in clarification, definition and differentiation. Moreover, gaps in SE research call for integrative multistage and multilevel framework for further research. The cognitive processes underpinning entrepreneurial action are similar for SE and TE even if Social Entrepreneurship orientation shows an increased empathy value. Theoretically, there is a need to develop sound models of how to process functions and how to work more effectively as entrepreneurs and research on efficiency improvement calls for the analysis of the most common practices in entrepreneurship. Multitasking has been recognized as a daily and unavoidable habit of entrepreneurs. Hence, we believe in the need of analyzing the multiple task phenomena as a methodology for skill acquisition. We will conduct our paper including Social Entrepreneurship within the wider spectrum of Traditional Entrepreneurship, for the purpose of simplifying the neuroscientific lecture of the entrepreneurial cognition. A question to be inquired is to know if there is a way of developing multitasking habits in order to improve entrepreneurial skills such as speed of information processing , creativity and adaptability . Nevertheless, the direct link between the neuroscientific approach to multitasking and entrepreneurship effectiveness is yet to be uncovered. That is why an extensive Literature Review on Multitasking is a propos.Keywords: cognitive, entrepreneurial, empathy, multitasking
Procedia PDF Downloads 172727 Education as a Global Business: An Overview of the Growth in International Students
Authors: Chinonso Jude Ugwu
Abstract:
This study examines education as a global business, primarily focusing on the boom of college students worldwide. It adopts a mixed-technique approach, using primary and secondary data sources. Primary data was obtained using questionnaires and interviews focusing on international college students, academic staff, and recruitment corporations from pre-determined universities in the United States, the United Kingdom, and Australia. The secondary information was collected from relevant literature, professional reports, and databases. The study ascertained that the boom in worldwide college students is a huge trend within the training enterprise, arising primarily from the growing call for better education worldwide. The studies additionally found that different factors are responsible for the decision of international students to consider studying abroad, such as high schooling satisfaction, cultural exposure, professional opportunities, and the popularity of universities. Furthermore, the study highlights the challenges college students face worldwide, including economic difficulties, social and cultural adjustments, and visa regulations. Based on the findings, the study concludes that Education as a Global Business is a profitable enterprise with substantial potential. However, universities and governments should handle global college students’ demanding situations by creating welcoming surroundings promoting diversity and inclusivity. The study recommends that universities put money into programs and offerings that assist worldwide college students’ welfare. Governments should ease visa regulations to inspire more extraordinary worldwide college students to observe abroad.Keywords: education, business, profitability, global students
Procedia PDF Downloads 74726 Rising STI Prevalence among MSM Clients in Calabar, Nigeria: A Call to Action
Authors: Ugoh Kelechi Melford, Anene O.
Abstract:
Introduction: Evidence has shown that there are increasing rates of new HIV and other STI infections occurring among Men who have Sex with Men (MSM) in Nigeria, with the prevalence 3 times higher than the general population as reported by the 2011 National Integrated Bio Behavioral Surveillance Survey. The poor state of health care and support services hinders our effort to control the high rates of these new infections among MSM. Methods: The Initiative for Improved Male Health (IMH-Initiative) works to provide a safe space for young MSM living with HIV to access comprehensive palliative care and support, as well as referrals for other services through drama and dance competitions. An STI assessment was conducted in IMH-Initiative’s Community Center in Calabar, for gay men and other MSM. An STI history was conducted for all clients who visited the community clinic specifically for HCT and STI counseling and referrals within a 5 month period, and their data were collated. Results: 61 MSM were diagnosed, and reported the following in the last 6 months. 49 where living with HIV. 46 had previous histories of untreated anal warts. 20 had previous histories of treated Gonorrhea by self-medication and herbs. 21 had untreated boils and rashes around the genitals. 10 clients where living with HIV, and reported untreated penile and rectal gonorrhea. All clients indicated that there were not comfortable discussing STI infections with staff of public hospitals. Conclusion: It is evident that a reasonable number of STI infections among MSM are not completely treated or ignored. This thereby increases the individual’s risk of HIV infection, and cripples HIV prevention programming in Nigeria. HIV programs targeting MSM must incorporate STI syndromic management, so as to increase access to non-stigmatized diagnosis and treatment of STIs. Also, access to STI drugs for clients cannot be overemphasized.Keywords: MSM, IBBSS, STI, IMH
Procedia PDF Downloads 333725 Medical Radiation Exposure in a Cohort of Children Diagnosed with Solid Tumors: Single Institution Study 1985-2015
Authors: Robin L. Rohrer
Abstract:
Introduction: Pre-natal or early childhood exposure to the medical radiation used in diagnosis or treatment is an identified risk for childhood cancers but can be difficult to document. The author developed a family questionnaire/interview form to identify possible exposures. Aims: This retrospective study examines pre-natal and early childhood medical radiation exposure in a cohort of children diagnosed with a solid tumor including brain tumors from 1985-2015 at the Children’s Hospital of Pittsburgh (CHP). The hospital is a tri-state regional referral center which treats about 150-180 new cases of cancer in children per year. About 70% are diagnosed with a solid tumor. Methods: Each consented family so far (approximately 50% of the cohort) has been interviewed in person or by the phone call. Medical staff and psycho- social staff referred patient families for the interview with the author. Results: Among the families interviewed to date at least one medical radiation exposure has been identified (pre-conception, pre-natal or early childhood) in over 70% of diagnosed children. These exposures have included pre-conception sinus or chest CT or X-ray in either parent, sinus CT or X-ray in the mother or diagnostic radiation of chest or abdomen in children. Conclusions: Exposures to medical radiation for a child later diagnosed with cancer may occur at several critical junctures. These exposures may well contribute to a ‘perfect storm’ in the still elusive causes of childhood cancer. The author plans to expand the study from 1975 to present to hopefully further document these junctures.Keywords: pediatric, solid tumors, medical radiation, cancer
Procedia PDF Downloads 264724 Induced Pulsation Attack Against Kalman Filter Driven Brushless DC Motor Control System
Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap
Abstract:
We use modeling and simulation tools, to introduce a novel bias injection attack, named the ’Induced Pulsation Attack’, which targets Cyber Physical Systems with closed-loop controlled Brushless DC (BLDC) motor and Kalman filter driver in the feedback loop. This attack involves engaging a linear function with a constant gradient to distort the coefficient of the injected bias, which falsifies the Kalman filter estimates of the rotor’s angular speed. As a result, this manipulation interaction inside the control system causes periodic pulsations in a form of asymmetric sine wave of both current and voltage in the circuit windings, with a high magnitude. It is shown that by varying the gradient of linear function, one can control both the frequency and structure of the induced pulsations. It is also demonstrated that terminating the attack at any point leads to additional compensating effort from the controller to restore the speed to its equilibrium value. This compensation effort produces an exponentially decaying wave, which we call the ’attack withdrawal syndrome’ wave. The conditions for maximizing or minimizing the impact of the attack withdrawal syndrome are determined. Linking the termination of the attack to the end of the full period of the induced pulsation wave has been shown to nullify the attack withdrawal syndrome wave, thereby improving the attack’s covertness.Keywords: cyber-attack, induced pulsation, bias injection, Kalman filter, BLDC motor, control system, closed loop, P- controller, PID-controller, saw-function, cyber-physical system
Procedia PDF Downloads 71723 “It Just Feels Risky”: Intuition vs Evidence in Child Sexual Abuse Cases. Proposing an Empirically Derived Risk and Protection Protocol
Authors: Christian Perrin, Nicholas Blagden, Louise Allen, Sarah Impey
Abstract:
Social workers in the UK and professionals globally are faced with a particular challenge when dealing with allegations of child sexual abuse (CSA) in the community. In the absence of a conviction or incontestable evidence, staff can often find themselves unable to take decisive action to remove a child from harm, even though there may be a credible threat to their welfare. Conversely, practitioners may over-calculate risk through fear of being accountable for harm. This is, in part, due to the absence of a structured and evidence-based risk assessment tool which can predict the likelihood of a person committing child sexual abuse. Such assessments are often conducted by forensic professionals who utilise offence-specific data and personal history information to calculate risk. In situations where only allegations underpin a case, this mode of assessment is not viable. There are further ethical issues surrounding the assessment of risk in this area which require expert consideration and sensitive planning. This paper explores this entangled problem extant in the wider call to prevent sexual and child sexual abuse in the community. To this end, 32 qualitative interviews were undertaken with social workers dealing with CSA cases. Results were analysed using thematic analysis and operationalised to formulate a risk and protection protocol for use in case management. This paper reports on the early findings associated with the initial indications of protocol reliability. Implications for further research and practice are discussed.Keywords: sexual offending, child sexual offence, offender rehabilitation, risk assessment, offence prevention
Procedia PDF Downloads 109722 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 455721 Query Task Modulator: A Computerized Experimentation System to Study Media-Multitasking Behavior
Authors: Premjit K. Sanjram, Gagan Jakhotiya, Apoorv Goyal, Shanu Shukla
Abstract:
In psychological research, laboratory experiments often face the trade-off issue between experimental control and mundane realism. With the advent of Immersive Virtual Environment Technology (IVET), this issue seems to be at bay. However there is a growing challenge within the IVET itself to design and develop system or software that captures the psychological phenomenon of everyday lives. One such phenomena that is of growing interest is ‘media-multitasking’ To aid laboratory researches in media-multitasking this paper introduces Query Task Modulator (QTM), a computerized experimentation system to study media-multitasking behavior in a controlled laboratory environment. The system provides a computerized platform in conducting an experiment for experimenters to study media-multitasking in which participants will be involved in a query task. The system has Instant Messaging, E-mail, and Voice Call features. The answers to queries are provided on the left hand side information panel where participants have to search for it and feed the information in the respective communication media blocks as fast as possible. On the whole the system will collect multitasking behavioral data. To analyze performance there is a separate output table that records the reaction times and responses of the participants individually. Information panel and all the media blocks will appear on a single window in order to ensure multi-modality feature in media-multitasking and equal emphasis on all the tasks (thus avoiding prioritization to a particular task). The paper discusses the development of QTM in the light of current techniques of studying media-multitasking.Keywords: experimentation system, human performance, media-multitasking, query-task
Procedia PDF Downloads 557720 Policy Brief/Note of Philippine Health Issues: Human Rights Violations Committed on Healthcare Workers
Authors: Trina Isabel Santiago, Daniel Chua, Jumee Tayaban, Joseph Daniel Timbol, Joshua Yanes
Abstract:
Numerous instances of human rights violations on healthcare workers have been reported during the COVID-19 pandemic in the Philippines. This brief aims to explore these civil and political rights violations and propose recommendations to address these. Our review shows that a wide range of civic and political human rights violations have been committed by individual citizens and government agencies on individual healthcare workers and health worker groups. These violations include discrimination, red-tagging, evictions, illegal arrests, and acts of violence ranging from chemical attacks to homicide. If left unchecked, these issues, compounded by the pandemic, may lead to the exacerbations of the pre-existing problems of the Philippine healthcare system. Despite all pre-existing reports by human rights groups and public media articles, there still seems to be a lack of government action to condemn and prevent these violations. The existence of government agencies which directly contribute to these violations with the lack of condemnation from other agencies further propagate the problem. Given these issues, this policy brief recommends the establishment of an interagency task force for the protection of human rights of healthcare workers as well as the expedited passing of current legislative bills towards the same goal. For more immediate action, we call for the establishment of a dedicated hotline for these incidents with adequate appointment and training of point persons, construction of clear guidelines, and closer collaboration between government agencies in being united against these issues.Keywords: human rights violations, healthcare workers, COVID-19 pandemic, Philippines
Procedia PDF Downloads 629719 A Study from Language and Culture Perspective of Human Needs in Chinese and Vietnamese Euphemism Languages
Authors: Quoc Hung Le Pham
Abstract:
Human beings are motivated to satisfy the physiological needs and psychological needs. In the fundamental needs, bodily excretion is the most basic one, while physiological excretion refers to the final products produced in the process of discharging the body. This physiological process is a common human phenomenon. For instance, bodily secretion is totally natural, but people of various nationalities through the times avoid saying it directly. Terms like ‘shit’ are often negatively regarded as dirty, smelly and vulgar; it will lead people to negative thinking. In fact, it is in the psychology of human beings to avoid such unsightly terms. Especially in social situations where you have to take care of your image, and you have to release. The best way to solve this is to approach the use of euphemism. People prefer to say it as ‘answering nature's call’ or ‘to pass a motion’ instead. Chinese and Vietnamese nations are referring to use euphemisms to replace bodily secretions, so this research will take this phenomenon as the object aims to explore the similarities and dissimilarities between two languages euphemism. The basic of the niche of this paper is human physiological phenomenon excretion. As the preliminary results show, in expressing bodily secretions the deeply impacting factor is language and cultural factors. On language factor terms, two languages are using assonance to replace human nature discharge, whilst the dissimilarities are metonymy, loan word and personification. On culture factor terms, the convergences are metonymy and application of the semantically-contrary-word-euphemism, whilst the difference is Chinese euphemism using allusion but Vietnamese euphemism does not.Keywords: cultural factors, euphemism, human needs, language factors
Procedia PDF Downloads 301718 Real-Time Mine Safety System with the Internet of Things
Authors: Şakir Bingöl, Bayram İslamoğlu, Ebubekir Furkan Tepeli, Fatih Mehmet Karakule, Fatih Küçük, Merve Sena Arpacık, Mustafa Taha Kabar, Muhammet Metin Molak, Osman Emre Turan, Ömer Faruk Yesir, Sıla İnanır
Abstract:
This study introduces an IoT-based real-time safety system for mining, addressing global safety challenges. The wearable device, seamlessly integrated into miners' jackets, employs LoRa technology for communication and offers real-time monitoring of vital health and environmental data. Unique features include an LCD panel for immediate information display and sound-based location tracking for emergency response. The methodology involves sensor integration, data transmission, and ethical testing. Validation confirms the system's effectiveness in diverse mining scenarios. The study calls for ongoing research to adapt the system to different mining contexts, emphasizing its potential to significantly enhance safety standards in the industry.Keywords: mining safety, internet of things, wearable technology, LoRa, RFID tracking, real-time safety system, safety alerts, safety measures
Procedia PDF Downloads 63717 Conversion from Catholicism to Islam in and out of Prison: A Comparative Study
Authors: Nerissa Gloria Balboa, Aire Yukdawan, Venice Gordula, Rhea Jannagen Curva
Abstract:
This research examined the lived experiences and compared their similarities and differences of former Catholics turned Muslim converts in and out of prison. Qualitative comparative study with an Interpretative Phenomenological Analysis approach was used to explore the lives of Muslim converts. Interviews were conducted at Islamic Studies, Call and Guidance of the Philippines (ISCAG) and Tarbiyyah Islamic Female Institute for Muslim converts out of prison, New Bilibid Prison (NBP) and Correctional Institution for Women (CIW) for Muslim converts in prison. Results of the study show that first, for Muslim converts out of prison, exploration begins through (1) experiences of Catholicism as a norm in the family and eventual realization of its emptiness in practice, (2) experiences of Islam as a norm in the environment and discovery of meaningfulness of Islam (3) experiences of gradual holistic transformation of being a Muslim; and (4) experiences of extension of oneself towards family and society. Secondly, for Muslim converts in prison, exploration begins through (1) experiences of Apathy towards Catholicism and eventual deviation from moral standards, (2) experiences of prison condition as an environment of reflection on spirituality; and (3) experiences of positive effects of being a Muslim inside Prison. Comparisons show that there exists similarities and differences across the two settings in terms of (1) experiences of Catholicism and the degree of its internalization and actualization, (2) experiences of Islamic encounters and the process of conversion; and (3) experience of Islamic devotion and Islamic construct for the self. Theoretical bases of religious conversion found in unique contexts are discussed, initiating a paradigm shift of thinking that is needed to address the deeply rooted prejudices within Catholic and Islamic circles.Keywords: Catholicism, Islamic conversion, social psychology, religion
Procedia PDF Downloads 398716 Case Report: A Case of Confusion with Review of Sedative-Hypnotic Alprazolam Use
Authors: Agnes Simone
Abstract:
A 52-year-old male with unknown psychiatric and medical history was brought to the Psychiatric Emergency Room by ambulance directly from jail. He had been detained for three weeks for possession of a firearm while intoxicated. On initial evaluation, the patient was unable to provide a reliable history. He presented with odd jerking movements of his extremities and catatonic features, including mutism and stupor. His vital signs were stable. Patient was transferred to the medical emergency department for work-up of altered mental status. Due to suspicion for opioid overdose, the patient was given naloxone (Narcan) with no improvement. Laboratory work-up included complete blood count, comprehensive metabolic panel, thyroid stimulating hormone, vitamin B12, folate, magnesium, rapid plasma reagin, HIV, blood alcohol level, aspirin, and Tylenol blood levels, urine drug screen, and urinalysis, which were all negative. CT head and chest X-Ray were also negative. With this negative work-up, the medical team concluded there was no organic etiology and requested inpatient psychiatric admission. Upon re-evaluation by psychiatry, it was evident that the patient continued to have an altered mental status. Of note, the medical team did not include substance withdrawal in the differential diagnosis due to stable vital signs and a negative urine drug screen. The psychiatry team decided to check California's prescription drug monitoring program (CURES) and discovered that the patient was prescribed benzodiazepine alprazolam (Xanax) 2mg BID, a sedative-hypnotic, and hydrocodone/acetaminophen 10mg/325mg (Norco) QID, an opioid. After a thorough chart review, his daughter's contact information was found, and she confirmed his benzodiazepine and opioid use, with recent escalation and misuse. It was determined that the patient was experiencing alprazolam withdrawal, given this collateral information, his current symptoms, negative urine drug screen, and recent abrupt discontinuation of medications while incarcerated. After admission to the medical unit and two doses of alprazolam 2mg, the patient's mental status, alertness, and orientation improved, but he had no memory of the events that led to his hospitalization. He was discharged with a limited supply of alprazolam and a close follow-up to arrange a taper. Accompanying this case report, a qualitative review of presentations with alprazolam withdrawal was completed. This case and the review highlights: (1) Alprazolam withdrawal can occur at low doses and within just one week of use. (2) Alprazolam withdrawal can present without any vital sign instability. (3) Alprazolam withdrawal does not respond to short-acting benzodiazepines but does respond to certain long-acting benzodiazepines due to its unique chemical structure. (4) Alprazolam withdrawal is distinct from and more severe than other benzodiazepine withdrawals. This case highlights (1) the importance of physician utilization of drug-monitoring programs. This case, in particular, relied on California's drug monitoring program. (2) The importance of obtaining collateral information, especially in cases in which the patient is unable to provide a reliable history. (3) The importance of including substance intoxication and withdrawal in the differential diagnosis even when there is a negative urine drug screen. Toxidrome of withdrawal can be delayed. (4) The importance of discussing addiction and withdrawal risks of medications with patients.Keywords: addiction risk of benzodiazepines, alprazolam withdrawal, altered mental status, benzodiazepines, drug monitoring programs, sedative-hypnotics, substance use disorder
Procedia PDF Downloads 138715 Online Teacher Professional Development: An Extension of the Unified Theory of Acceptance and Use of Technology Model
Authors: Lovemore Motsi
Abstract:
The rapid pace of technological innovation, along with a global fascination with the internet, continues to result in a dominating call to integrate internet technologies in institutions of learning. However, the pressing question remains – how can online in-service training for teachers, support quality and success in professional development programmers. The aim of this study was to examine an integrated model that extended the Unified Theory of Acceptance and Use of Technology (UTAUT) with additional constructs – including attitude and behaviour intention – adopted from the Theory of Planned Behaviour (TPB) to answer the question. Data was collected from secondary school teachers at 10 selected schools in the Tshwane South district by means of the Statistical Package for Social Scientists (SPSS v 23.0), and the collected data was analysed quantitatively. The findings are congruent with model testing under conditions of volitional usage behaviour. In this regard, the role of facilitating condition variables is insignificant as a determinant of usage behaviour. Social norm variables also proved to be a weak determinant of behavioural intentions. Findings demonstrate that effort expectancy is the key determinant of online INSET usage. Based on these findings, the variable social influence and facilitating conditions are important factors in ensuring the acceptance of online INSET among teachers in selected secondary schools in the Tshwane South district.Keywords: unified theory of acceptance and use of technology (UTAUT), teacher professional development, secondary schools, online INSET
Procedia PDF Downloads 215714 Non-Adherence to Antidepressant Treatment and Its Predictors among Outpatients with Depressive Disorders
Authors: Selam Mulugeta, Barkot Milkias, Mesfin Araya, Abel Worku, Eyasu Mulugeta
Abstract:
In Ethiopia, there is inadequate information on non-adherence to antidepressant treatment in patients with depressive disorders. Having awareness of the pattern of adherence is important in future prognosis, quality of life, and functionality in these patients. This hospital-based cross-sectional quantitative study was done on a sample of 216 consecutive outpatients with depressive disorders. Data were collected using questionnaires through in-person and phone call interviews. The 8-item Morisky scale was used to assess the pattern of medication adherence. Other specially developed tools were used to obtain sociodemographic and clinical information from electronic medical records and patient interviews. Data were analyzed using the Statistical Package for the Social Sciences Version - 25. Univariate and multivariable analyses were carried out to assess factors associated with non-adherence. 90% of the participants had a primary diagnosis of major depressive disorder. Based on the 8-item Morisky Medication Adherence Scale, the prevalence of non-adherence was found to be 84.7%. Living distance between 11 to 50 km from the hospital (AOR= 11, 95% CI (29,46.6)), post-secondary level of education (AOR= 8.3, 95% CI (1, 64.4)) and taking multiple medications (AOR= 6.1, 95% CI (1, 34.9)) were found to have significantly increased odds of non-adherence. Non-adherence was significantly associated with factors such as increased living distance from the hospital, relatively higher educational level, and polypharmacy. Proper and patient-centered psychoeducation, addressing the communication gap between patients and doctors, adherence to prescribing guidelines, avoiding polypharmacy unless indicated & working on accessibility of treatment is essential to decrease non-adherence.Keywords: depressive disorders, Ethiopia, medication adherence, Addis Ababa
Procedia PDF Downloads 149713 Fake News During COVID-19 Pandemic: An Overview from A Legal Perspective
Authors: Ida Shafinaz Mohamed Kamil, Mohd Dahlan Abdul Malek
Abstract:
Today, the whole world is facing a catastrophe called the novel coronavirus disease known as COVID-19. As of October 2021, it has been reported that more than 248 million cases and 5 million deaths have been recorded worldwide. In Malaysia, 2,466,663 cases were reported, with 28,876 deaths recorded on 30 October 2021. Unfortunately, the world is not only facing the COVID-19 pandemic but the COVID-19 infodemic as well, where fake news about COVID-19 disease is spreading faster and more widely than from the virus itself. The spread of fake news is amplified through various social media platforms, which is causing concern among the community. The uncertainty in understanding what fake news really is has caused difficulties and challenges in providing a solution to the hazards that it creates. This article discusses what constitutes fake news and examines the current legal framework put in place to combat fake news in Malaysia. Employing a doctrinal research methodology, this article thoroughly analyzes the relevant legal provisions under the Communications and Multimedia Act 1998, the Penal Code and the Emergency (Essential Powers) Ordinance (No.2) 2021, which came into force on 12 March 2021 as well as related case laws, for offenses and punishments with regards to fake news. The findings from the analysis indicate that there is still room for improvement in regulating fake news, in particular concerning COVID-19.Keywords: fake news, legal pespective, covid 19, pendemic
Procedia PDF Downloads 85712 The Term of Intellectual Property and Artificial Intelligence
Authors: Yusuf Turan
Abstract:
Definition of Intellectual Property Rights according to the World Intellectual Property Organization: " Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce." It states as follows. There are 2 important points in the definition; we can say that it is the result of intellectual activities that occur by one or more than one PERSON and as INNOVATION. When the history and development of the relevant definitions are briefly examined, it is realized that these two points have remained constant and Intellectual Property law and rights have been shaped around these two points. With the expansion of the scope of the term Intellectual Property as a result of the development of technology, especially in the field of artificial intelligence, questions such as "Can "Artificial Intelligence" be an inventor?" need to be resolved within the expanding scope. In the past years, it was ruled that the artificial intelligence named DABUS seen in the USA did not meet the definition of "individual" and therefore would be an inventor/inventor. With the developing technology, it is obvious that we will encounter such situations much more frequently in the field of intellectual property. While expanding the scope, we should definitely determine the boundaries of how we should decide who performs the mental activity or creativity that we call indispensable on the inventor/inventor according to these problems. As a result of all these problems and innovative situations, it is clearly realized that not only Intellectual Property Law and Rights but also their definitions need to be updated and improved. Ignoring the situations that are outside the scope of the current Intellectual Property Term is not enough to solve the problem and brings uncertainty. The fact that laws and definitions that have been operating on the same theories for years exclude today's innovative technologies from the scope contradicts intellectual property, which is expressed as a new and innovative field. Today, as a result of the innovative creation of poetry, painting, animation, music and even theater works with artificial intelligence, it must be recognized that the definition of Intellectual Property must be revised.Keywords: artificial intelligence, innovation, the term of intellectual property, right
Procedia PDF Downloads 70711 Spinal Hydatidosis: Therapeutic Management of 5 Cases
Authors: Ghoul Rachid Brahim, Trad Khodja Rafik
Abstract:
Vertebral localization of the hydatid cyst is a severe form of bone hydatidosis, is a parasitic infection caused by the larval forms of the tapeworms Echinococcus granulosus, The disease is slowly remaining silent (a long incubation period) which may explain why this pathology is often discovered at the stage of neurological complications. The objective of this study is to recall the clinical and radiological aspects of this condition and the importance of early diagnosis and appropriate management. We report a study of 5 patients with vertebral hydatidosis, four men and one woman, four (04) patients operated in the emergency setting for spinal cord compression (decompression by wide laminectomy with evacuation of intra and extra canal vesicles).Albendazole-based medical treatment is instituted in all patients. Results: The evolution was favorable for three patients, the other two patients reoperated for a local recurrence. Conclusion: Vertebral hydatidosis is a rare condition with a poor prognosis due to the risk of neurological damage, the infiltrating nature of bone lesions, the frequency of relapses and therapeutic difficulties. The only curative method remains surgery, which must aim for complete and large excision of the lesions as if it were a “malignant tumour”.Keywords: hydatidosis, Echinococcosis granulosus, hydatid cyst, spinal cord compression, laminectomy
Procedia PDF Downloads 97710 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis
Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv
Abstract:
Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.Keywords: correlation analysis, hierarchical filtering, multisource data, network security
Procedia PDF Downloads 201709 "Good" Discretion Among Private Sector Street Level Bureaucrats
Authors: Anna K. Wood, Terri Friedline
Abstract:
In April and May 2020, the private banking industry approved over 1.7 million emergency small business loans, totaling over $650 billion in federal relief funds as part of the Paycheck Protection Program (PPP). Since the program’s rollout, the extensive evidence of discriminatory lending and misuse of funds has been revealed by investigative journalism and academic studies. This study is based on 41 interviews with frontline banking industry professionals conducted during the days and weeks of the PPP rollout, presenting a real-time narrative of the program rollout through the eyes of those in the role of a street-level bureaucrat. We present two themes from this data about the conditions under which these frontline workers experienced the PPP: Exigent Timelines and Defaulting to Existing Workplace Norms and Practices. We analyze these themes using literature on street-level organizations, bureaucratic discretion, and the differences between public and private sector logic. The results of this study present new directions for theorizing sector-level differences in street-level bureaucratic discretion in the context of mixed-sector collaboration on public service delivery, particularly under conditions of crisis and urgency.Keywords: street level bureaucracy, social policy, bureaucratic discretion, public private partnerships
Procedia PDF Downloads 104708 A Vehicle Detection and Speed Measurement Algorithm Based on Magnetic Sensors
Authors: Panagiotis Gkekas, Christos Sougles, Dionysios Kehagias, Dimitrios Tzovaras
Abstract:
Cooperative intelligent transport systems (C-ITS) can greatly improve safety and efficiency in road transport by enabling communication, not only between vehicles themselves but also between vehicles and infrastructure. For that reason, traffic surveillance systems on the road are of great importance. This paper focuses on the development of an on-road unit comprising several magnetic sensors for real-time vehicle detection, movement direction, and speed measurement calculations. Magnetic sensors can feel and measure changes in the earth’s magnetic field. Vehicles are composed of many parts with ferromagnetic properties. Depending on sensors’ sensitivity, changes in the earth’s magnetic field caused by passing vehicles can be detected and analyzed in order to extract information on the properties of moving vehicles. In this paper, we present a prototype algorithm for real-time, high-accuracy, vehicle detection, and speed measurement, which can be implemented as a portable, low-cost, and non-invasive to existing infrastructure solution with the potential to replace existing high-cost implementations. The paper describes the algorithm and presents results from its preliminary lab testing in a close to real condition environment. Acknowledgments: Work presented in this paper was co-financed by the European Regional Development Fund of the European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship, and Innovation (call RESEARCH–CREATE–INNOVATE) under contract no. Τ1EDK-03081 (project ODOS2020).Keywords: magnetic sensors, vehicle detection, speed measurement, traffic surveillance system
Procedia PDF Downloads 121707 Human Development Strengthening against Terrorism in ASEAN East Asia and Pacific: An Econometric Analysis
Authors: Tismazammi Mustafa, Jaharudin Padli
Abstract:
The frequency of terrorism is increasing throughout years that is resulting in loss of life, damaging people’s property, and destructing the environment. The incident of terrorism is not stationed in one particular country but has spread and scattered in other countries hence causing an increase in the number of terrorism cases. Thus, this paper aims to investigate the factors of human development upon the terrorism in East Asia and Pacific countries. This study used a panel ARDL model, in which it enables to capture the long run and the short run relationship among the variables of interest. Logit Model for Binary data is also used, in which to representing an attributes of dependent variables. This study focuses on several human development variables namely GDP per capita, population, human capital, land area, and technologies. The empirical finding revealed that the GDP per capita, population, human capital, land area, and technologies are positively and statistically significant in influencing the terrorism. Thus, the finding in this study will present as grounds to preserve human rights and develop public awareness and will offer guidelines to policy makers, emergency managers, first responders, public health workers, physicians, and other researchers.Keywords: terrorism, East Asia and Pacific, human development, econometric analysis
Procedia PDF Downloads 414706 Ending Communal Conflicts in Africa: The Relevance of Traditional Approaches to Conflict Resolution
Authors: Kindeye Fenta Mekonnen, Alagaw Ababu Kifle
Abstract:
The failure of international responses to armed conflict to address local preconditions for national stability has recently attracted what has been called the ‘local turn’ in peace building. This ‘local turn’ in peace building amplified a renewed interest in traditional/indigenous methods of conflict resolution, a field that has been hitherto dominated by anthropologists with their focus on the procedures and rituals of such approaches. This notwithstanding, there is still limited empirical work on the relevance of traditional methods of conflict resolution to end localized conflicts vis-à-vis hybrid and modern approaches. The few exceptions to this generally draw their conclusion from very few (almost all successful) cases that make it difficult to judge the validity and cross-case application of their results. This paper seeks to fill these gaps by undertaking a quantitative analysis of the trend and applications of different communal conflict resolution initiatives, their potential to usher in long-term peace, and the extent to which their outcomes are influenced by the intensity and scope of a conflict. The paper makes the following three tentative conclusions. First, traditional mechanisms and traditional actors still dominate the communal conflict resolution landscape, either individually or in combination with other methods. Second, traditional mechanisms of conflict resolution tend to be more successful in ending a conflict and preventing its re-occurrence compared to hybrid and modern arrangements. This notwithstanding and probably due to the scholarly call for local turn in peace building, contemporary communal conflict resolution approaches are becoming less and less reliant on traditional mechanisms alone and (therefore) less effective. Third, there is yet inconclusive evidence on whether hybridization is an asset or a liability in the resolution of communal conflicts and the extent to which this might be mediated by the intensity of a conflict.Keywords: traditional conflict resolution, hybrid conflict resolution, communal conflict, relevance, conflict intensity
Procedia PDF Downloads 82