Search results for: data breach and misuse
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24527

Search results for: data breach and misuse

24467 Laundering vs. Blanqueo: Translating Financial Crime Metaphors From English to Spanish

Authors: Stephen Gerome

Abstract:

This study examines the translation and use of metaphors in the realm of public safety discourse and intends to shed light on a continuing problem in cross-cultural communication. Metaphors can cause problems not only within languages but also in interlingual communication. The use and misuse of metaphors may hinder the ability to adequately communicate prevention efforts and, in some cases, facilitate and allow financial crime to go undetected. The use of lexicalized metaphors in communications by political entities, journalists, and legal agents in communications regarding law, policy making, compliance monitoring and enforcement as well as in adjudication can have negative consequences if misconstrued. This study provides examples of metaphor usage in published documents in a corpus linguistic study that compares the use of lexicalized metaphors in this discourse to shed light on possible unexpected consequences as well as counterproductive ones.

Keywords: translation, legal, corpus linguistics, financial

Procedia PDF Downloads 90
24466 Freedom with Limitations: The Nature of Free Expression in the European Case-Law

Authors: Laszlo Vari

Abstract:

In the digital age, the spread of the mobile world and the nature of the cyberspace, offers many new opportunities for the prevalence of the fundamental right to free expression, and therefore, for free speech and freedom of the press; however, these new information communication technologies carry many new challenges. Defamation, censorship, fake news, misleading information, hate speech, breach of copyright etc., are only some of the violations, all of which can be derived from the harmful exercise of freedom of expression, all which become more salient in the internet. Here raises the question: how can we eliminate these problems, and practice our fundamental freedom rightfully? To answer this question, we should understand the elements and the characteristic of the nature of freedom of expression, and the role of the actors whose duties and responsibilities are crucial in the prevalence of this fundamental freedom. To achieve this goal, this paper will explore the European practice to understand instructions found in the case-law of the European Court of Human rights for the rightful exercise of freedom of expression.

Keywords: collision of rights, European case-law, freedom opinion and expression, media law, freedom of information, online expression

Procedia PDF Downloads 126
24465 Antibiotic Prescribing in the Acute Care in Iraq

Authors: Ola A. Nassr, Ali M. Abd Alridha, Rua A. Naser, Rasha S. Abbas

Abstract:

Background: Excessive and inappropriate use of antimicrobial agents among hospitalized patients remains an important patient safety and public health issue worldwide. Not only does this behavior incur unnecessary cost but it is also associated with increased morbidity and mortality. The objective of this study is to obtain an insight into the prescribing patterns of antibiotics in surgical and medical wards, to help identify a scope for improvement in service delivery. Method: A simple point prevalence survey included a convenience sample of 200 patients admitted to medical and surgical wards in a government teaching hospital in Baghdad between October 2017 and April 2018. Data were collected by a trained pharmacy intern using a standardized form. Patient’s demographics and details of the prescribed antibiotics, including dose, frequency of dosing and route of administration, were reported. Patients were included if they had been admitted at least 24 hours before the survey. Patients under 18 years of age, having a diagnosis of cancer or shock, or being admitted to the intensive care unit, were excluded. Data were checked and entered by the authors into Excel and were subjected to frequency analysis, which was carried out on anonymized data to protect patient confidentiality. Results: Overall, 88.5% of patients (n=177) received 293 antibiotics during their hospital admission, with a small variation between wards (80%-97%). The average number of antibiotics prescribed per patient was 1.65, ranging from 1.3 for medical patients to 1.95 for surgical patients. Parenteral third-generation cephalosporins were the most commonly prescribed at a rate of 54.3% (n=159) followed by nitroimidazole 29.4% (n=86), quinolones 7.5% (n=22) and macrolides 4.4% (n=13), while carbapenems and aminoglycosides were the least prescribed together accounting for only 4.4% (n=13). The intravenous route was the most common route of administration, used for 96.6% of patients (n=171). Indications were reported in only 63.8% of cases. Culture to identify pathogenic organisms was employed in only 0.5% of cases. Conclusion: Broad-spectrum antibiotics are prescribed at an alarming rate. This practice may provoke antibiotic resistance and adversely affect the patient outcome. Implementation of an antibiotic stewardship program is warranted to enhance the efficacy, safety and cost-effectiveness of antimicrobial agents.

Keywords: Acute care, Antibiotic misuse, Iraq, Prescribing

Procedia PDF Downloads 108
24464 Modern Forms and Aesthetics in Design

Authors: Chukwuma Anya, Mekwa Eme

Abstract:

The term ‘’FORM’’ in design could be referred to as the combination of various shapes of different sizes and assembling them in appropriate positions to achieve a unique figure of high aesthetic value. A deduction from this definition is that forms contribute immensely to the actualization of aesthetics in a building. When these various shapes and figures are properly assembled, it may give rise to a concept in design. However some architects and other designers either misuse or abuse the use of these shapes, hence resulting to a design imbalance, lack of uniformity and expression. This academic work is designed to educate the public on the proper usage of some regular shapes like circles, rectangles, pentagons, hexagons, triangles etc, to achieve a unique form in design. By the end of this work, one should be able to assemble different shapes to express different emotions of the mind, such as peace, love, confusion, war, and unity. Some elements of design, such as balance, stability, functionality and aesthetics, will also be achieved even as the building maintains its unique form.

Keywords: aesthetics, form, balance, stability

Procedia PDF Downloads 64
24463 Applications of Big Data in Education

Authors: Faisal Kalota

Abstract:

Big Data and analytics have gained a huge momentum in recent years. Big Data feeds into the field of Learning Analytics (LA) that may allow academic institutions to better understand the learners’ needs and proactively address them. Hence, it is important to have an understanding of Big Data and its applications. The purpose of this descriptive paper is to provide an overview of Big Data, the technologies used in Big Data, and some of the applications of Big Data in education. Additionally, it discusses some of the concerns related to Big Data and current research trends. While Big Data can provide big benefits, it is important that institutions understand their own needs, infrastructure, resources, and limitation before jumping on the Big Data bandwagon.

Keywords: big data, learning analytics, analytics, big data in education, Hadoop

Procedia PDF Downloads 392
24462 Gender Policy in Nigeria: Implications for Sustainable Development in the Fourth Republic

Authors: Adadu Yahaya, Abdullahi Erunke Canice

Abstract:

The study sets out to examine the interface that tends to exist in the relationship between gender policy and Nigeria’s socio-economic development. Despite Nigeria’s ratification of virtually all international instruments on the protection and promotion of gender rights and equality, it appears that the practice is honored in the breach than in observance; hence, these policies have not been adequately domesticated and implemented. The implication of this is that the women folks have generally been isolated from mainstream politics and their political rights and privileges truncated in the scheme of things. The paper observes that gender inequality and marginalization in Nigeria has practically occasioned the unwholesome subjugation of Nigerian women to the background, hence poses more critical questions and challenges to the national question. The consequence of this, to this paper, is that Nigeria’s development process will be adversely affected if this trend is not checked. The paper sums up with appropriate policy options which are believed to have the potentials of giving women the right pride of place in the socio-economic and political dynamics in the 21st century Nigeria and beyond.

Keywords: development, equality, gender, policy

Procedia PDF Downloads 471
24461 Use of Adjunctive Cannabinoids in Opioid Dosing for Patients with Chronic Pain

Authors: Kristina De Milt, Nicole Huang, Jihye Park

Abstract:

Opioids have been a mainstay of the treatment of chronic pain, but their overprescription and misuse have led to an opioid epidemic. Recently, as an attempt to decrease the number of opioids prescribed, the use of cannabinoid therapy has become an increasingly popular adjunctive chronic pain management choice among providers. This review of literature investigates the effects of adjunctive cannabinoids to opioids in the management of chronic pain. The nine articles are included in the literature review range from observational studies to meta-analyses published in the year 2016 and after. A majority of the studies showed a decrease in the need for opioids after adjunctive cannabinoids were introduced and, in some instances, the cessation of opioid consumption. More high-quality evidence is needed to further support this stance and providers should weigh the benefits and risks of adjunctive cannabinoids according to the clinical picture.

Keywords: cannabis, chronic pain, opioids, pain management

Procedia PDF Downloads 235
24460 A Fellowship of Philosophy: Übermensch and the Will to Power in Tolkien

Authors: Ali Mirzabayati

Abstract:

This article associates Tolkien’s concept of power with Nietzsche’s Übermensch. Despite his catholic beliefs, Tolkien refuses to create religiously motivated characters, opening room for existentialist decisions. Who is an Übermensch? What Tolkienian character resembles this concept the most? To tend to these questions, the article studies the case of Adolf Hitler and Elisabeth Nietzsche, manipulating Nietzschean philosophy. An investigation of the Nazis’ misuse of philosophy, art, and myth for political advantage introduces a Nazi version of Übermensch, best reflected in Sauron and Saruman. Unlike the Nazi version, Nietzschean Übermensch is proven to emphasize internal power and seek harmony within one’s desires. Tolkien’s best candidates for Übermensch, Aragorn and Bilbo are examined through Nietzsche’s three metamorphoses of becoming a higher spirit. What is more, I will study Nietzsche’s admiration for cheer and eating, the main characteristics of the hobbits, to strengthen his bond with Tolkien.

Keywords: Tolkien, Nietzsche, literature, fantasy, history, philosophy

Procedia PDF Downloads 100
24459 The Misuse of Free Cash and Earnings Management: An Analysis of the Extent to Which Board Tenure Mitigates Earnings Management

Authors: Michael McCann

Abstract:

Managerial theories propose that, in joint stock companies, executives may be tempted to waste excess free cash on unprofitable projects to keep control of resources. In order to conceal their projects' poor performance, they may seek to engage in earnings management. On the one hand, managers may manipulate earnings upwards in order to post ‘good’ performances and safeguard their position. On the other, since managers pursuit of unrewarding investments are likely to lead to low long-term profitability, managers will use negative accruals to reduce current year’s earnings, smoothing earnings over time in order to conceal the negative effects. Agency models argue that boards of directors are delegated by shareholders to ensure that companies are governed properly. Part of that responsibility is ensuring the reliability of financial information. Analyses of the impact of board characteristics, particularly board independence on the misuse of free cash flow and earnings management finds conflicting evidence. However, existing characterizations of board independence do not account for such directors gaining firm-specific knowledge over time, influencing their monitoring ability. Further, there is little analysis of the influence of the relative experience of independent directors and executives on decisions surrounding the use of free cash. This paper contributes to this literature regarding the heterogeneous characteristics of boards by investigating the influence of independent director tenure on earnings management and the relative tenures of independent directors and Chief Executives. A balanced panel dataset comprising 51 companies across 11 annual periods from 2005 to 2015 is used for the analysis. In each annual period, firms were classified as conducting earnings management if they had discretionary accruals in the bottom quartile (downwards) and top quartile (upwards) of the distributed values for the sample. Logistical regressions were conducted to determine the marginal impact of independent board tenure and a number of control variables on the probability of conducting earnings management. The findings indicate that both absolute and relative measures of board independence and experience do not have a significant impact on the likelihood of earnings management. It is the level of free cash flow which is the major influence on the probability of earnings management. Higher free cash flow increases the probability of earnings management significantly. The research also investigates whether board monitoring of earnings management is contingent on the level of free cash flow. However, the results suggest that board monitoring is not amplified when free cash flow is higher. This suggests that the extent of earnings management in companies is determined by a range of company, industry and situation-specific factors.

Keywords: corporate governance, boards of directors, agency theory, earnings management

Procedia PDF Downloads 209
24458 Satellite Solutions for Koshi Floods

Authors: Sujan Tyata, Alison Shilpakar, Nayan Bakhadyo, Kushal K. C., Abhas Maskey

Abstract:

The Koshi River, acknowledged as the "Sorrow of Bihar," poses intricate challenges characterized by recurrent flooding. Within the Koshi Basin, floods have historically inflicted damage on infrastructure, agriculture, and settlements. The Koshi River exhibits a highly braided pattern across a 48 km stretch to the south of Chatara. The devastating flood from the Koshi River, which began in Nepal's Sunsari District in 2008, led to significant casualties and the destruction of agricultural areas.The catastrophe was exacerbated by a levee breach, underscoring the vulnerability of the region's flood defenses. A comprehensive understanding of environmental changes in the area is unveiled through satellite imagery analysis. This analysis facilitates the identification of high-risk zones and their contributing factors. Employing remote sensing, the analysis specifically pinpoints locations vulnerable to levee breaches. Topographical features of the area along with longitudinal and cross sectional profiles of the river and levee obtained from digital elevation model are used in the hydrological analysis for assessment of flood. To mitigate the impact of floods, the strategy involves the establishment of reservoirs upstream. Leveraging satellite data, optimal locations for water storage are identified. This approach presents a dual opportunity to not only alleviate flood risks but also catalyze the implementation of pumped storage hydropower initiatives. This holistic approach addresses environmental challenges while championing sustainable energy solutions.

Keywords: flood mitigation, levee, remote sensing, satellite imagery analysis, sustainable energy solutions

Procedia PDF Downloads 38
24457 A Dam Break Analysis Using MIKE11

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchahed

Abstract:

The consequences of a dam breach can be devastating; both in terms of lives lost and damaged infrastructure and property. Hydraulic modeling provides a clear picture of the possible consequences of partial or complete failure of a dam, which is the key to carry out emergency planning and conduct reliable risk assessments. In this paper, the MIKE11 model developed by the Danish Hydrologic Institute (DHI) was used to simulate the flood wave propagation associated with a potential failure analysis failure of Zardezas dam located in the city of Skikda in the North East of Algeria. MIKE11 results including inundation maps and the representative channel/valley cross-sections depicting flow depth and maximal flow velocities showed that Zardezas reservoir presents a significant risk to downstream areas in the event of a dam failure. These results can be used as the basis of the development of an Emergency Action Plan (EAP).The main objective of this plan is to predict the appropriate steps to avoid or at least decrease the consequences of unexpected failure of Zardezas dam.

Keywords: MIKE11, dam break, inundation maps, emergency action plan

Procedia PDF Downloads 439
24456 Analysis of Big Data

Authors: Sandeep Sharma, Sarabjit Singh

Abstract:

As per the user demand and growth trends of large free data the storage solutions are now becoming more challenge-able to protect, store and to retrieve data. The days are not so far when the storage companies and organizations are start saying 'no' to store our valuable data or they will start charging a huge amount for its storage and protection. On the other hand as per the environmental conditions it becomes challenge-able to maintain and establish new data warehouses and data centers to protect global warming threats. A challenge of small data is over now, the challenges are big that how to manage the exponential growth of data. In this paper we have analyzed the growth trend of big data and its future implications. We have also focused on the impact of the unstructured data on various concerns and we have also suggested some possible remedies to streamline big data.

Keywords: big data, unstructured data, volume, variety, velocity

Procedia PDF Downloads 527
24455 Research of Data Cleaning Methods Based on Dependency Rules

Authors: Yang Bao, Shi Wei Deng, WangQun Lin

Abstract:

This paper introduces the concept and principle of data cleaning, analyzes the types and causes of dirty data, and proposes several key steps of typical cleaning process, puts forward a well scalability and versatility data cleaning framework, in view of data with attribute dependency relation, designs several of violation data discovery algorithms by formal formula, which can obtain inconsistent data to all target columns with condition attribute dependent no matter data is structured (SQL) or unstructured (NoSQL), and gives 6 data cleaning methods based on these algorithms.

Keywords: data cleaning, dependency rules, violation data discovery, data repair

Procedia PDF Downloads 544
24454 Reducing Ambulance Offload Delay: A Quality Improvement Project at Princess Royal University Hospital

Authors: Fergus Wade, Jasmine Makker, Matthew Jankinson, Aminah Qamar, Gemma Morrelli, Shayan Shah

Abstract:

Background: Ambulance offload delays (AODs) affect patient outcomes. At baseline, the average AOD at Princess Royal University Hospital (PRUH) was 41 minutes, in breach of the 15-minute target. Aims: By February 2023, we aimed to reduce: the average AOD to 30 minutes percentage of AOD >30 minutes (PA30) to 25% and >60 minutes (PA60) to 10% Methods: Following a root-cause analysis, we implemented 2 Plan, Do, Study, Act (PDSA) cycles. PDSA-1 ‘Drop-and-run’: ambulances waiting >15 minutes for a handover left the patients in the Emergency Department (ED) and returned to the community. PDSA-2: Booking in the patients before the handover, allowing direct updates to online records, eliminating the need for handwritten notes. Outcome measures: AOD, PA30, and PA60, and process measures: total ambulances and patients in the ED were recorded for 16 weeks. Results: In PDSA-1, all parameters increased slightly despite unvarying ED crowding. In PDSA-2, two shifts in data were seen: initially, a sharp increase in the outcome measures consistent with increased ED crowding, followed by a downward shift when crowding returned to baseline (p<0.01). Within this interval, the AOD reduced to 29.9 minutes, and PA30 and PA60 were 31.2% and 9.2% respectively. Discussion/conclusion: PDSA-1 didn’t result in any significant changes; lack of compliance was a key cause. The initial upward shift in PDSA-2 is likely associated with NHS staff strikes. However, during the second interval, the AOD and the PA60 met our targets of 30 minutes and 10%, respectively, improving patient flow in the ED. This was sustained without further input and if maintained, saves 2 paramedic shifts every 3 days.

Keywords: ambulance offload, district general hospital, handover, quality improvement

Procedia PDF Downloads 81
24453 The Erasure of Sex and Gender Minorities by Misusing Sex and Gender in Public Health

Authors: Tessalyn Morrison, Alexis Dinno, Taurica Salmon

Abstract:

Sex and gender conflation continue to perpetuate the invisibility of gender minorities and obscure information about the ways that biological sex and gender affect health. The misuse of sex and gender terms, and their respective binaries, can yield inaccurate results. But more importantly, it contributes to the erasure of sex and gender minority health experiences. This paper discusses ways in which public health researchers can use sex and gender terms correctly and center the health experiences of intersex, transgender, non binary, and a-gender individuals. It includes promoting sensitivity in approaching minority communities, improving survey questions, and collaborating with sex and gender minority communities to improve research quality and participant experiences. Improving our standards for the quality of sex and gender term usage and centering sex and gender minorities in public health research are imperative to address the health inequalities faced by sex and gender minorities.

Keywords: epidemiology, gender, intersex, research methods, sex, transgender

Procedia PDF Downloads 220
24452 Investigating the Effect of the Psychoactive Substances Act 2016 on the Incidence of Adverse Medical Events in Her Majesty’s Prison (HMP) Leeds

Authors: Hayley Boal, Chloe Bromley, John Fairfield

Abstract:

Novel Psychoactive Substances (NPS) are synthetic compounds designed to reproduce effects of illicit drugs. Cheap, potent, and readily available on UK highstreets from so-called ‘head shops’, in recent years their use has surged and with it have emerged side effects including seizures, aggression, palpitations, coma, and death. Rapid development of new substances has vastly outpaced pre-existing drug legislation but the Psychoactive Substances Act 2016 rendered all but tobacco, alcohol, and amyl nitrates, illegal. Drug use has long been rife within prisons, but the absence of a reliable screening tool alongside the availability of NPS makes them ideal for prison use. Here we examine the occurrence of NPS-related adverse side effects within HMP Leeds, comparing May-September of 2015 and 2017 using daily reports distributed amongst prison staff summarising medical and behavioural incidents of the previous day. There was a statistically-significant rise of over 200% in the use of NPS between 2015 and 2017: 0.562 and 1.149 incidents per day respectively. In 2017, 38.46% incidents required ambulances, fallen from 51.02% in 2015. Although the most common descriptions in both years were ‘seizure’ and ‘unresponsive’, by 2017 ‘inhalation by staff’ had emerged. Patterns of NPS consumption mirrored the prison regime, peaking when cell doors opened, and prisoners could socialise. Despite limited data, the Psychoactive Substances Act has clearly been an insufficient deterrent to the prison population; more must be done to understand and address substance misuse in prison. NPS remains a significant risk to prisoners’ health and wellbeing.

Keywords: legislation, novel psychoactive substances, prison, spice

Procedia PDF Downloads 171
24451 Controversies Connected with the Admission of Illegally Gained Evidences in Polish Civil Proceedings

Authors: Aleksandra Czubak

Abstract:

The need to present evidence in civil proceedings is essential for getting the right result. It is for this reason that it is particularly important for the parties to present the most relevant and convincing evidence to the Court. Therefore, parties often try to gain evidence, even when the acquisition of such evidence is in breach of the law. Firstly, there will be discussed how evidence is applied in the Polish civil process and the Polish regulations of the evidence proceedings; with specific reference to evidence of major importance in the developing world. Further, it will be discussed the controversies connected with the admission of illegally gained evidence in civil proceedings. The credibility of the various measures is circumstantial and can only be determined by factors related to the recognized problem. For that reason, it is not the amount of evidence, but the value and relevance of this evidence that should be considered in determining the right result. This paper will also consider whether the end justifies the means? How far should parties go in order to achieve a favorable sentence or to create stronger evidence? Methods of persuasion of the court, as well as the acquisition of evidence, are not always fair and moral. It is on this area of controversy that this essay will focus. This paper concludes by considering the value of evidence and the possibility of using it to achieve a just sentence. Examples are based on Polish law; nevertheless, they encompass ideas common to most civil jurisdictions.

Keywords: civil proceedings, Europe (Poland), evidence, law

Procedia PDF Downloads 234
24450 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique

Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam

Abstract:

With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.

Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services

Procedia PDF Downloads 102
24449 Mining Big Data in Telecommunications Industry: Challenges, Techniques, and Revenue Opportunity

Authors: Hoda A. Abdel Hafez

Abstract:

Mining big data represents a big challenge nowadays. Many types of research are concerned with mining massive amounts of data and big data streams. Mining big data faces a lot of challenges including scalability, speed, heterogeneity, accuracy, provenance and privacy. In telecommunication industry, mining big data is like a mining for gold; it represents a big opportunity and maximizing the revenue streams in this industry. This paper discusses the characteristics of big data (volume, variety, velocity and veracity), data mining techniques and tools for handling very large data sets, mining big data in telecommunication and the benefits and opportunities gained from them.

Keywords: mining big data, big data, machine learning, telecommunication

Procedia PDF Downloads 381
24448 Evaluation of Correct Usage, Comfort and Fit of Personal Protective Equipment in Construction Work

Authors: Anna-Lisa Osvalder, Jonas Borell

Abstract:

There are several reasons behind the use, non-use, or inadequate use of personal protective equipment (PPE) in the construction industry. Comfort and accurate size support proper use, while discomfort, misfit, and difficulties to understand how the PPEs should be handled inhibit correct usage. The need for several protective equipments simultaneously might also create problems. The purpose of this study was to analyse the correct usage, comfort, and fit of different types of PPEs used for construction work. Correct usage was analysed as guessability, i.e., human perceptions of how to don, adjust, use, and doff the equipment, and if used as intended. The PPEs tested individually or in combinations were a helmet, ear protectors, goggles, respiratory masks, gloves, protective cloths, and safety harnesses. First, an analytical evaluation was performed with ECW (enhanced cognitive walkthrough) and PUEA (predictive use error analysis) to search for usability problems and use errors during handling and use. Then usability tests were conducted to evaluate guessability, comfort, and fit with 10 test subjects of different heights and body constitutions. The tests included observations during donning, five different outdoor work tasks, and doffing. The think-aloud method, short interviews, and subjective estimations were performed. The analytical evaluation showed that some usability problems and use errors arise during donning and doffing, but with minor severity, mostly causing discomfort. A few use errors and usability problems arose for the safety harness, especially for novices, where some could lead to a high risk of severe incidents. The usability tests showed that discomfort arose for all test subjects when using a combination of PPEs, increasing over time. For instance, goggles, together with the face mask, caused pressure, chafing at the nose, and heat rash on the face. This combination also limited sight of vision. The helmet, in combination with the goggles and ear protectors, did not fit well and caused uncomfortable pressure at the temples. No major problems were found with the individual fit of the PPEs. The ear protectors, goggles, and face masks could be adjusted for different head sizes. The guessability for how to don and wear the combination of PPE was moderate, but it took some time to adjust them for a good fit. The guessability was poor for the safety harness; few clues in the design showed how it should be donned, adjusted, or worn on the skeletal bones. Discomfort occurred when the straps were tightened too much. All straps could not be adjusted for somebody's constitutions leading to non-optimal safety. To conclude, if several types of PPEs are used together, discomfort leading to pain is likely to occur over time, which can lead to misuse, non-use, or reduced performance. If people who are not regular users should wear a safety harness correctly, the design needs to be improved for easier interpretation, correct position of the straps, and increased possibilities for individual adjustments. The results from this study can be a base for re-design ideas for PPE, especially when they should be used in combinations.

Keywords: construction work, PPE, personal protective equipment, misuse, guessability, usability

Procedia PDF Downloads 71
24447 Gis Based Flash Flood Runoff Simulation Model of Upper Teesta River Besin - Using Aster Dem and Meteorological Data

Authors: Abhisek Chakrabarty, Subhraprakash Mandal

Abstract:

Flash flood is one of the catastrophic natural hazards in the mountainous region of India. The recent flood in the Mandakini River in Kedarnath (14-17th June, 2013) is a classic example of flash floods that devastated Uttarakhand by killing thousands of people.The disaster was an integrated effect of high intensityrainfall, sudden breach of Chorabari Lake and very steep topography. Every year in Himalayan Region flash flood occur due to intense rainfall over a short period of time, cloud burst, glacial lake outburst and collapse of artificial check dam that cause high flow of river water. In Sikkim-Derjeeling Himalaya one of the probable flash flood occurrence zone is Teesta Watershed. The Teesta River is a right tributary of the Brahmaputra with draining mountain area of approximately 8600 Sq. km. It originates in the Pauhunri massif (7127 m). The total length of the mountain section of the river amounts to 182 km. The Teesta is characterized by a complex hydrological regime. The river is fed not only by precipitation, but also by melting glaciers and snow as well as groundwater. The present study describes an attempt to model surface runoff in upper Teesta basin, which is directly related to catastrophic flood events, by creating a system based on GIS technology. The main object was to construct a direct unit hydrograph for an excess rainfall by estimating the stream flow response at the outlet of a watershed. Specifically, the methodology was based on the creation of a spatial database in GIS environment and on data editing. Moreover, rainfall time-series data collected from Indian Meteorological Department and they were processed in order to calculate flow time and the runoff volume. Apart from the meteorological data, background data such as topography, drainage network, land cover and geological data were also collected. Clipping the watershed from the entire area and the streamline generation for Teesta watershed were done and cross-sectional profiles plotted across the river at various locations from Aster DEM data using the ERDAS IMAGINE 9.0 and Arc GIS 10.0 software. The analysis of different hydraulic model to detect flash flood probability ware done using HEC-RAS, Flow-2D, HEC-HMS Software, which were of great importance in order to achieve the final result. With an input rainfall intensity above 400 mm per day for three days the flood runoff simulation models shows outbursts of lakes and check dam individually or in combination with run-off causing severe damage to the downstream settlements. Model output shows that 313 Sq. km area were found to be most vulnerable to flash flood includes Melli, Jourthang, Chungthang, and Lachung and 655sq. km. as moderately vulnerable includes Rangpo,Yathang, Dambung,Bardang, Singtam, Teesta Bazarand Thangu Valley. The model was validated by inserting the rain fall data of a flood event took place in August 1968, and 78% of the actual area flooded reflected in the output of the model. Lastly preventive and curative measures were suggested to reduce the losses by probable flash flood event.

Keywords: flash flood, GIS, runoff, simulation model, Teesta river basin

Procedia PDF Downloads 295
24446 JavaScript Object Notation Data against eXtensible Markup Language Data in Software Applications a Software Testing Approach

Authors: Theertha Chandroth

Abstract:

This paper presents a comparative study on how to check JSON (JavaScript Object Notation) data against XML (eXtensible Markup Language) data from a software testing point of view. JSON and XML are widely used data interchange formats, each with its unique syntax and structure. The objective is to explore various techniques and methodologies for validating comparison and integration between JSON data to XML and vice versa. By understanding the process of checking JSON data against XML data, testers, developers and data practitioners can ensure accurate data representation, seamless data interchange, and effective data validation.

Keywords: XML, JSON, data comparison, integration testing, Python, SQL

Procedia PDF Downloads 119
24445 A Brief Review on Doping in Sports and Performance-Enhancing Drugs

Authors: Zahra Mohajer, Afsaneh Soltani

Abstract:

Doping is a major issue in competitive sports and is favored by vast groups of athletes. The feeling of being higher-ranking than others and gaining fame has caused many athletes to misuse drugs. The definition of doping is to use prohibited substances and/or methods that help physical or mental performances or both. Doping counts as the illegal use of chemical substances or drugs, excessive amounts of physiological substances to increase the performance at or out of competition or even the use of inappropriate medications to treat an injury to gain the ability to participate in a competition. The International Olympic Committee (IOC) and World Anti-Doping Agency (WADA) have forbidden these substances to ensure fair and equal competition and also the health of the competitors. As of 2004 WADA has published an international list of illegal substances used for doping, which is updated annually. In the process of the Genome Project scientists have gained the ability to treat numerous diseases by gene therapy, which may result in bodily performance increase and therefore a potential opportunity to misuse by some athletes. Gene doping is defined as the non-therapeutic direct and indirect genetic modifications using genetic materials that can improve the performances in sports events. Biosynthetic drugs are a form of indirect genetic engineering. The method can be performed in three ways such as injecting the DNA directly into the muscle, inserting the genetically engineered cells, or transferring the DNA using a virus as a vector. Erythropoietin is a hormone majorly released by the kidney and in small amounts by the liver. Its function is to stimulate the erythropoiesis and therefore the more production of red blood cells (RBC) which causes an increase in Hemoglobin (Hb). During this process, the oxygen delivery to muscles will increase, which will improve athletic performance and postpone exhaustion. There are ways to increase the oxygen transferred to muscles such as blood transfusion, stimulating the production of red blood cells by using Erythropoietin (EPO), and also using allosteric effectors of Hemoglobin. EPO can either be injected as a protein or can be inserted into the cells as the gene which encodes EPO. Adeno-associated viruses have been employed to deliver the EPO gene to the cells. Employing the genes that naturally exist in the human body such as the EPO gene can reduce the risk of detecting gene doping. The first research about blood doping was conducted in 1947. The study has shown that an increase in hematocrit (HCT) up to 55% following homologous transfusion makes it more unchallenging for the body to perform the exercise at the altitude. Thereafter athletes’ attraction to blood infusion escalated. Also, a study has demonstrated that by reinfusing their own blood 4 weeks after being drawn, three men have shown a rise in Hb level which improved the oxygen uptake, and a delay in exhaustion. The list of performance-enhancing drugs is published by WADA annually and includes the following drugs: anabolic agents, hormones, Beta-2 agonists, Beta-blockers, Diuretics, Stimulants, narcotics, cannabinoids, and corticosteroids.

Keywords: doping, PEDs, sports, WADA

Procedia PDF Downloads 94
24444 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 138
24443 Multi-Source Data Fusion for Urban Comprehensive Management

Authors: Bolin Hua

Abstract:

In city governance, various data are involved, including city component data, demographic data, housing data and all kinds of business data. These data reflects different aspects of people, events and activities. Data generated from various systems are different in form and data source are different because they may come from different sectors. In order to reflect one or several facets of an event or rule, data from multiple sources need fusion together. Data from different sources using different ways of collection raised several issues which need to be resolved. Problem of data fusion include data update and synchronization, data exchange and sharing, file parsing and entry, duplicate data and its comparison, resource catalogue construction. Governments adopt statistical analysis, time series analysis, extrapolation, monitoring analysis, value mining, scenario prediction in order to achieve pattern discovery, law verification, root cause analysis and public opinion monitoring. The result of Multi-source data fusion is to form a uniform central database, which includes people data, location data, object data, and institution data, business data and space data. We need to use meta data to be referred to and read when application needs to access, manipulate and display the data. A uniform meta data management ensures effectiveness and consistency of data in the process of data exchange, data modeling, data cleansing, data loading, data storing, data analysis, data search and data delivery.

Keywords: multi-source data fusion, urban comprehensive management, information fusion, government data

Procedia PDF Downloads 366
24442 Secure Text Steganography for Microsoft Word Document

Authors: Khan Farhan Rafat, M. Junaid Hussain

Abstract:

Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography

Procedia PDF Downloads 222
24441 Multicenter Baseline Survey to Outline Antimicrobial Prescribing Practices at Six Public Sectortertiary Care Hospitals in a Low Middle Income Country

Authors: N. Khursheed, M. Fatima, S. Jamal, A. Raza, S. Rattani, Q. Ahsan, A. Rasheed, M. Jawed

Abstract:

Introduction: Antibiotics are among the commonly prescribed medicines to treat bacterial infections. Their misuse intensifies resistance, and overuse incurs heavy losses to the healthcare system in terms of increased treatment costs and enhanced disease burden. Studies show that 40% of empirically used antibiotics are irrationally utilized. The objective of this study was to evaluate prescribing pattern of antibiotics at six public sector tertiary care hospitals across Pakistan. Methods: A multicenter cross-sectional point prevalence survey (PPS) was conducted in selected wards of six public sector tertiary care hospitals in Pakistan as part of the Clinical Engagement program by Fleming Fund Country Grant Pakistan in collaboration with Indus Hospital & Health Network (IHHN) from February to March 2021, these included Jinnah Postgraduate Medical Center and Dr. Ruth K. M. Pfau Civil Hospital from Karachi, Sheikh Zayed Hospital Lahore, Nishtar Medical University Hospital Multan, Medical Teaching Institute Hayatabad Medical Complex Peshawar, and Provincial Headquarters Hospital Gilgit. WHO PPS methodology was used for data collection (Hospital, ward, and patient level data was collected). Data was entered into the open-source Kobo Collect application and was analyzed using SPSS (version 22.0). Findings: Medical records of 837 in-patients were surveyed, of which the prevalence of antibiotics use was 78.5%. The most commonly prescribed antimicrobial was Ceftriaxone (21.7%) which is categorized in the Watch group of WHO AWaRe Classification, followed by Metronidazole (17.3%), Cefoperazone/Sulbactam (8.4%), Co-Amoxiclav (6.3%) and Piperacillin/Tazobactam (5.9%). The antibiotics were prescribed largely for surgical prophylaxis (36.7%), followed by community-acquired infections (24.7%). One antibiotic was prescribed to 46.7%, two to 39.9%, and three or more to 12.5 %. Two of six (30%) hospitals had functional drug and therapeutic committees, three (50%) had infection prevention and control committees, and one facility had an antibiotic formulary. Conclusion: Findings demonstrate high consumption of broad-spectrum antimicrobials and emphasizes the importance of expanding the antimicrobial stewardship program. Mentoring clinical teams will help to rationalize antimicrobial use.

Keywords: antimicrobial resistance, antimicrobial stewardship, point prevalence survey, antibiotics

Procedia PDF Downloads 89
24440 Forced Displacement and Mental Health Problems in Refugees Residing in Quetta for Decades

Authors: Silsila Sherzad, Hazrat Ali Khan, Tabasum Sherzad, Hazratullah, Sanaullah

Abstract:

Objective: To study the prevalence of common Mental health disorders among forcibly displaced people and to compare with the common mental health disorders among host community members. Study design: Analytical Study. Place of study: Balochistan institute of psychiatry and behavioral sciences, Quetta, Baluchistan, Pakistan. Methodology: Data from the Outpatient department were analyzed to numerate both the host community and refugees. Out of 4120, 354 refugee patients were identified using their proof registration (POR) card and for 3776 of the host community using their computerized national identity card (CNIC), data was analyzed for the prevalence of mental health disorders among them. Results: This study states that Afghan Refugees presented to OPD services of Balochistan institute of psychiatry and behavioral sciences, 47% were diagnosed as Major depressive disorder with/without psychosis, 19% with Generalized anxiety disorder, 5% were diagnosed as Bipolar Affective disorder, 5% With schizophrenia, 4% as Post-traumatic stress disorder, 3% as migraine, 3% conversion disorder, 2% Obsessive-compulsive disorder, 1% somatoform disorder and 10% of them presented with other psychiatric disorders, while in host community 21% were diagnosed as Major depressive disorder with/without psychosis, 24% as Generalized anxiety disorder, 12% as somatoform disorder, 10% as Obsessive-compulsive disorder, 8% as migraine, 7% as conversion disorder, 4% as Bipolar Affective disorder, 3% as schizophrenia, 3% as Mental and behavioral disorder due to substance misuse and rest of 7% presented with other psychiatric disorders. Conclusion: The conclusion of this study states that mental health disorders are more common among refugees than in other populations. The result of this study shows that there is a big difference in the prevalence of mental health disorders among displaced people and the rest of the population. Some Mental health disorders are present in a higher percentage among displaced people rather than among the host community, while some other disorders are present in a lower percentage among displaced people rather than among the host community. This study also highlights that further studies are needed to determine risk and protective factors within the host community.

Keywords: forced displacement, mental health, Afghan refugees, depression

Procedia PDF Downloads 90
24439 Reviewing Privacy Preserving Distributed Data Mining

Authors: Sajjad Baghernezhad, Saeideh Baghernezhad

Abstract:

Nowadays considering human involved in increasing data development some methods such as data mining to extract science are unavoidable. One of the discussions of data mining is inherent distribution of the data usually the bases creating or receiving such data belong to corporate or non-corporate persons and do not give their information freely to others. Yet there is no guarantee to enable someone to mine special data without entering in the owner’s privacy. Sending data and then gathering them by each vertical or horizontal software depends on the type of their preserving type and also executed to improve data privacy. In this study it was attempted to compare comprehensively preserving data methods; also general methods such as random data, coding and strong and weak points of each one are examined.

Keywords: data mining, distributed data mining, privacy protection, privacy preserving

Procedia PDF Downloads 502
24438 The Right to Data Portability and Its Influence on the Development of Digital Services

Authors: Roman Bieda

Abstract:

The General Data Protection Regulation (GDPR) will come into force on 25 May 2018 which will create a new legal framework for the protection of personal data in the European Union. Article 20 of GDPR introduces a right to data portability. This right allows for data subjects to receive the personal data which they have provided to a data controller, in a structured, commonly used and machine-readable format, and to transmit this data to another data controller. The right to data portability, by facilitating transferring personal data between IT environments (e.g.: applications), will also facilitate changing the provider of services (e.g. changing a bank or a cloud computing service provider). Therefore, it will contribute to the development of competition and the digital market. The aim of this paper is to discuss the right to data portability and its influence on the development of new digital services.

Keywords: data portability, digital market, GDPR, personal data

Procedia PDF Downloads 454