Search results for: preventing suicide in youth
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1515

Search results for: preventing suicide in youth

645 Solving the Overheating on the Top Floor of Energy Efficient Houses: The Envelope Improvement

Authors: Sormeh Sharifi, Wasim Saman, Alemu Alemu, David Whaley

Abstract:

Although various energy rating schemes and compulsory building codes are using around the world, there are increasing reports on overheating in energy efficient dwellings. Given that the cooling demand of buildings is rising globally because of the climate change, it is more likely that the overheating issue will be observed more. This paper studied the summer indoor temperature in eight air-conditioned multi-level houses in Adelaide which have complied with the Australian Nationwide Houses Energy Rating Scheme (NatHERS) minimum energy performance of 7.5 stars. Through monitored temperature, this study explores that overheating is experienced on 75.5% of top floors during cooling periods while the air-conditioners were running. This paper found that the energy efficiency regulations have significantly improved thermal comfort in low floors, but not on top floors, and the energy-efficient house is not necessarily adapted with the air temperature fluctuations particularly on top floors. Based on the results, this study suggests that the envelope of top floors for multi-level houses in South Australian context need new criteria to make the top floor more heat resistance in order to: preventing the overheating, reducing the summer pick electricity demand and providing thermal comfort. Some methods are used to improve the envelope of the eight case studies. The results demonstrate that improving roofs was the most effective part of the top floors envelope in terms of reducing the overheating.

Keywords: building code, climate change, energy-efficient building, energy rating, overheating, thermal comfort

Procedia PDF Downloads 198
644 Fake News Detection for Korean News Using Machine Learning Techniques

Authors: Tae-Uk Yun, Pullip Chung, Kee-Young Kwahk, Hyunchul Ahn

Abstract:

Fake news is defined as the news articles that are intentionally and verifiably false, and could mislead readers. Spread of fake news may provoke anxiety, chaos, fear, or irrational decisions of the public. Thus, detecting fake news and preventing its spread has become very important issue in our society. However, due to the huge amount of fake news produced every day, it is almost impossible to identify it by a human. Under this context, researchers have tried to develop automated fake news detection using machine learning techniques over the past years. But, there have been no prior studies proposed an automated fake news detection method for Korean news to our best knowledge. In this study, we aim to detect Korean fake news using text mining and machine learning techniques. Our proposed method consists of two steps. In the first step, the news contents to be analyzed is convert to quantified values using various text mining techniques (topic modeling, TF-IDF, and so on). After that, in step 2, classifiers are trained using the values produced in step 1. As the classifiers, machine learning techniques such as logistic regression, backpropagation network, support vector machine, and deep neural network can be applied. To validate the effectiveness of the proposed method, we collected about 200 short Korean news from Seoul National University’s FactCheck. which provides with detailed analysis reports from 20 media outlets and links to source documents for each case. Using this dataset, we will identify which text features are important as well as which classifiers are effective in detecting Korean fake news.

Keywords: fake news detection, Korean news, machine learning, text mining

Procedia PDF Downloads 265
643 A Systematic Mapping of the Use of Information and Communication Technology (ICT)-Based Remote Agricultural Extension for Women Smallholders

Authors: Busiswa Madikazi

Abstract:

This systematic mapping study explores the underrepresentation of women's contributions to farming in the Global South within the development of Information and Communication Technologies (ICT)-based extension methods. Despite women farmers constituting 70% of the agricultural labour force, their productivity is hindered by various constraints, including illiteracy, household commitments, and limited access to credit and markets. A systematic mapping approach was employed with the aim of identifying evidence gaps in existing ICT extension for women farmers. The data collection protocol follows a structured approach, incorporating key criteria for inclusion, exclusion, search strategy, and coding and the PICO strategy (Population, Intervention, Comparator, and Outcome). The results yielded 119 articles that qualified for inclusion. The findings highlight that mobile phone apps (WhatsApp) and radio/television programming are the primary extension methods employed while integrating ICT with training, field visits, and demonstrations are underutilized. Notably, the study emphasizes the inadequate attention to critical issues such as food security, gender equality, and attracting youth to farming within ICT extension efforts. These findings indicate a significant policy and practice gap, neglecting community-driven approaches that cater to women's specific needs and enhance their agricultural production. Map highlights the importance of refocusing ICT extension efforts to address women farmers’ unique challenges, thereby contributing to their empowerment and improving agricultural practices.

Keywords: agricultural extension, ICT, women farmers, smallholders

Procedia PDF Downloads 56
642 Barriers and Opportunities for Implementing Electronic Prescription Software in Public Libyan Hospitals

Authors: Abdelbaset M. Elghriani, Abdelsalam M. Maatuk, Isam Denna, Amira Abdulla Werfalli

Abstract:

Electronic prescription software (e-prescribing) benefits patients and physicians by preventing handwriting errors and giving accurate prescriptions. E-prescribing allows prescriptions to be written and sent to pharmacies electronically instead of using handwritten notes. Significant factors that may affect the adoption of e-prescription systems include lacking technical support, financial resources to operate the systems, and change resistance from some clinicians, which have been identified as barriers to the implementation of e-prescription systems. This study aims to explore the trends and opinions of physicians and pharmacists about e-prescriptions and to identify the obstacles and benefits of the application of e-prescriptions in the health care system. A cross-sectional descriptive study was conducted at three Libyan public hospitals. Data were collected through a self-constructed questionnaire to assess the opinions regarding potential constraining factors and benefits of implementing an e-prescribing system in hospitals. Data presented as mean, frequency distribution table, cross-tabulation, and bar charts. Data analysis was performed, and the results show that technical, financial, and organizational obstacles are the most important obstacles that prevent the application of e-prescribing systems in Libyan hospitals. In addition, there was awareness of the benefits of e-prescribing, especially reducing medication dispensing errors, and a desire of physicians and pharmacists to use electronic prescriptions.

Keywords: physicians, e-prescribing, health care system, pharmacists

Procedia PDF Downloads 117
641 Post Coronary Artery Stenting Reflighting: Need for Change in Policy with Changing Antiplatelet Therapy

Authors: Keshavamurthy Ganapathy Bhat, Manvinderpal Singh Marwaha

Abstract:

Background: Coronary artery Disease (CAD) is a common cause of morbidity, mortality and reason for unfitness amongst aircrew. Coronary angioplasty and stenting are the standard of care for CAD. Antiplatelet drugs like Aspirin and Clopidogrel(Dual Antiplatelet therapy) are routinely prescribed post-stenting which are permitted for flying. However, in the recent past, Ticagrelor is being used in place of Clopidogrel as per ACC AHA and ESC guidelines. However Ticagrelor is not permitted for flying. Case Presentation: A 55-year-old pilot suffered Anterior Wall Myocardial Infarction. Angiography showed blockages in Left Anterior Descending Artery(LAD) and Right coronary artery (RCA). He underwent primary angioplasty and stenting LAD and subsequent stenting to RCA. Recovery was uneventful. One year later he was asymptomatic with normal Left ventricular function and no reversible perfusion defect on stress MPI. He had patent stents and coronaries on check angiogram. However, he was not allowed to fly since he was on Ticagrelor. He had to be switched over to Clopidogrel from Ticagrelor one year after stenting to permit him for flying. Similarly, switching had to be done in a 45-year-old pilot. Ticagrelor has been proven to be more effective than clopidogrel and as safe as Clopidogrel in preventing stent thrombosis. If Clopidogrel is being permitted, there is no need to restrict Ticagrelor. Hence "Policy" needs to be changed. Conclusions: Dual Antiplatelet therapy is the standard of care post coronary stenting which has been proved safe and effective. Policy needs to be changed to permit flying with Ticagrelor which is more effective than Clopidogrel and equally safe.

Keywords: antiplatelet drugs, coronary artery disease, stenting, ticagrelor

Procedia PDF Downloads 161
640 Propranalol is Not Effective in Preventing the Progression to Severe Portal Hypertensive Gastropathy in Cirrhotic Patients who Had Undergone Variceal Eradication: A Randomised Controlled Trial

Authors: Jeffey George, Varghese Thomas

Abstract:

Background and Objectives: PHG is an important source of gastrointestinal bleeding in patients with portal hypertension. Aim: To assess the progression to severe portal hypertensive gastropathy(PHG) in patients with cirrhosis who were treated with maximum tolerated dose of propranalol, after variceal eradication to grade II or below. Methods: Cirrhotic patients(child A and B) presenting with upper gastrointestinal bleeding with endoscopic findings of mild or no PHG were followed up over 6 months after variceal eradication to assess the progression to severe PHG. Included patients were randomised to either maximum tolerated doses of propranalol (group A) or to no treatment (group B). Primary end point of the study were the development of gastrointestinal bleed, evidence of hepatic decompensation and death. Progression to severe PHG were compared between the two groups. Results: 56 patients (49 males) were enrolled (group A = 28, group B = 28). 8 patients were excluded from final analysis (gi bleed=5, encephalopathy=2,HCC=1 including 4 deaths).3 patients were lost to follow-up, and 1 developed intolerance to propranalol. Mean dose of propranalol used was 60 mg per day. Progression to severe PHG in the fundus over 6 months was 23.8% in group A versus 15.8 % in group B (p = 0.52). Severe PHG was noted in body in 14.3% in group A versus 21.1% in group B (p = 0.57). 23.8 % in group A had progression to severe PHG compared with 15.8 % in group B (p =0.52). There was no statistically significant difference in the progression of PHG between the two groups(p=0.43). Conclusion: In this short term study propranalol was found not to prevent the progression to severe portal hypertensive gastropathy in cirrhotic patients who had undergone endotherapy for esophageal varices.

Keywords: propranalol, portal hypertensive gastropathy, cirrhotic patients, gastroenterology

Procedia PDF Downloads 334
639 Temporary Ureteric Catheterization after Ureteropyeloscopy: Experience from Regional Australia

Authors: Jake Tempo, Jack Crozier, Huay Ann Chia, Philip Tan

Abstract:

Purpose: A prospective study was performed to determine whether temporary ureteric catheterization should be eliminated as a prophylactic method for preventing ureteric obstruction after uncomplicated ureteropyeloscopic lithotripsy. Material and Methods: From 2010 to 2014, 227 patients underwent uncomplicated ureteroscopic and/or pyeloscopic lithotripsy. Three patient-groups based on postoperative drainage method were analysed: temporary uretericcatheter (TUC), -ureteric JJ stent, and no-stent groups. Exclusion criteria included urosepsis, ureteric injury, and non-surgical complications delaying hospital-discharge. Outcome measures included parenteral analgesic requirements, prolonged hospitalization ≥2 days due to postoperative-pain, and readmissions rate. Results: Delayed discharge was reported in 14.5%(9 of 62) patients in the TUC group compared to 3.4%(4 of 119) in theureteric JJ stent group and 8.7%(4 of 46) in the no-drainage-group (p=0.02). Odds ratio for delayed-discharge between catheter- versus-ureteric JJ stent is 4.9 (95% CI = 1.6-15.0; p < 0.01). Parenteral analgesic requirements in the TUC group (12.9%) was also significantly higher than theureteric JJ stent group (1.7%; p=0.003). Readmissions were negligible between groups. Conclusions: Patients with ureteric catheters after uncomplicated ureteroscopy have a prolonged hospital stay with increased pain and parenteral analgesic requirements. There is a 7.6-fold increased requirement for parenteral analgesia and a 4.2-fold increased risk of delayed-discharge compared to a patient with a ureteric JJ stent.

Keywords: ureteric catheter, ureteric stent, ureteroscopy, pyeloscopy

Procedia PDF Downloads 132
638 Avoiding Medication Errors in Juvenile Facilities

Authors: Tanja Salary

Abstract:

This study uncovers a gap in the research and adds to the body of knowledge regarding medication errors in a juvenile justice facility. The study includes an introduction to data collected about medication errors in a juvenile justice facility and explores contributing factors that relate to those errors. The data represent electronic incident records of the medication errors that were documented from the years 2011 through 2019. In addition, this study reviews both current and historical research of empirical data about patient safety standards and quality care comparing traditional healthcare facilities to juvenile justice residential facilities. The theoretical/conceptual framework for the research study pertains to Bandura and Adams’s (1977) framework of self-efficacy theory of behavioral change and Mark Friedman’s results-based accountability theory (2005). Despite the lack of evidence in previous studies about addressing medication errors in juvenile justice facilities, this presenter will relay information that adds to the body of knowledge to note the importance of how assessing the potential relationship between medication errors. Implications for more research include recommendations for more education and training regarding increased communication among juvenile justice staff, including nurses, who administer medications to juveniles to ensure adherence to patient safety standards. There are several opportunities for future research concerning other characteristics about factors that may affect medication administration errors within the residential juvenile justice facility.

Keywords: juvenile justice, medication errors, psychotropic medications, behavioral health, juveniles, incarcerated youth, recidivism, patient safety

Procedia PDF Downloads 56
637 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS

Authors: Ali Riza Perçin, Eser Bingül

Abstract:

Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.

Keywords: social media, "generation Y", terrorist organization, islamic state IS

Procedia PDF Downloads 420
636 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 291
635 Bulking Rate of Cassava Genotypes and Their Root Yield Relationship at Guinea Savannah and Forest Transition Agroecological Zone of Nigeria

Authors: Olusegun D. Badewa, E. K. Tsado, A. S. Gana, K. D. Tolorunse, R. U. Okechukwu, P. Iluebbey, S. Ibrahim

Abstract:

Farmers are faced with varying production challenges ranging from unstable weather due to climate change, low yield, malnutrition, cattle invasion, and bush fires that have always affected their livelihood. Research effort must therefore be centered on improving farmers’ livelihood, nutrition, and health by providing early bulking biofortified cassava varieties that could be harvested earlier with reasonable root yield and thereby preventing long stay of the crop on their farmland. This study evaluated cassava genotypes at different harvesting months of 3, 6, 9, and 12 months after planting in order to evaluate their bulking rate at different agroecology of Mokwa and Ubiaja. Data were collected on fresh storage root yield, Harvest index, and Dry matter content. It was shown from the study that traits FSRY, HI, and DM were significant for genotype and months after planting and variable among the genotype while location had no effect on the yield traits. Early bulking genotypes were not high yielding and showed discontinuity at some point across the months. The retrogression in yield performance across months had no effect on the highest yielding. Also, for all the genotypes and across evaluated months, FSRY reduces at 9 MAP due to a reduction in dry matter content during the same month, and the best performing genotype was the genotype IBA90581, followed by IBA120036, IBA130896, and IBA980581 while the least performing was genotype IBA130818.

Keywords: early bulking, dry mater, harvest index, high yielding, root yield

Procedia PDF Downloads 215
634 Behavior and Obesity: The Perception of Healthcare Professionals Concerning the Role of Behavior on Obesity

Authors: Saeed Wahass

Abstract:

Objective: Obesity is epidemic, affecting all societies and cultures. Most serious medical illnesses are attributed to obesity. For this reason, all healthcare systems worldwide have focused on obesity for both intervention and prevention. However, there is scientific evidence supporting that obesity is treatable through implementing different modalities of interventions. They include biological interventions like medications and bariatric surgeries and behavioral interventions. It seems healthcare professionals may suggest the quick and the easiest interventions for obesity like surgery, ignoring other modesties that might require efforts from their sides and patients as well. Searching on the onset, progression and prevention, behavior plays a major role. As a result, psychological interventions have become increasingly core for intervention and prevention of obesity. They are effective and cost effective in dealing with obesity. Methods: A questionnaire describing the role of behavior on obesity and the way it can be prevented and treated was distributed to a group of health professionals who are dealing with obesity e.g. bariatric surgeons, bariatric physicians, psychologists, health educators, nurses and social workers. Results: 88% of healthcare professionals believed that behavior plays a major role on the onset and progression of obesity, 95% of them recognized that obesity can be prevented with consideration for behavior factors. A major proportion (87%) of the respondents see that psychological interventions are effective and cost effective in treating obesity. Conclusions: It optimistically appears that the majority of healthcare professionals believe that behavior is a key component in understanding, preventing and treating obesity. This outcome may help in developing specific training courses for healthcare professionals, who are dealing with obesity concerning the way they can treat patients behaviorally and, moreover, educating the community.

Keywords: behavior, obesity, healthcare provider, psychological interventions

Procedia PDF Downloads 483
633 Encapsulation and Protection of Bioactive Nutrients Based on Ligand-Binding Property of Milk Proteins

Authors: Hao Cheng, Yingzhou Ni, Amr M. Bakry, Li Liang

Abstract:

Functional foods containing bioactive nutrients offer benefits beyond basic nutrition and hence the possibility of delaying and preventing chronic diseases. However, many bioactive nutrients degrade rapidly under food processing and storage conditions. Encapsulation can be used to overcome these limitations. Food proteins have been widely used as carrier materials for the preparation of nano/micro-particles because of their ability to form gels and emulsions and to interact with polysaccharides. The mechanisms of interaction between bioactive nutrients and proteins must be understood in order to develop protein-based lipid-free delivery systems. Beta-lactoglobulin, a small globular protein in milk whey, exhibits an affinity to a wide range of compounds. Alfa-tocopherol, resveratrol and folic acid were respectively bound to the central cavity, the outer surface near Trp19–Arg124 and the hydrophobic pocket in the groove between the alfa-helix and the beta-barrel of the protein. Beta-lactoglobulin could thus bind the three bioactive nutrients simultaneously to form protein-multi-ligand complexes. Beta-casein, an intrinsically unstructured but major milk protein, could also interact with resveratrol and folic acid to form complexes. These results suggest the potential to develop milk-protein-based complex carrier systems for encapsulation of multiple bioactive nutrients for functional food application and also pharmaceutical and medical uses.

Keywords: milk protein, bioactive nutrient, interaction, protection

Procedia PDF Downloads 402
632 Using an Empathy Intervention Model to Enhance Empathy and Socially Shared Regulation in Youth with Autism Spectrum Disorder

Authors: Yu-Chi Chou

Abstract:

The purpose of this study was to establish a logical path of an instructional model of empathy and social regulation, providing feasibility evidence on the model implementation in students with autism spectrum disorder (ASD). This newly developed Emotional Bug-Out Bag (BoB) curriculum was designed to enhance the empathy and socially shared regulation of students with ASD. The BoB model encompassed three instructional phases of basic theory lessons (BTL), action plan practices (APP), and final theory practices (FTP) during implementation. Besides, a learning flow (teacher-directed instruction, student self-directed problem-solving, group-based task completion, group-based reflection) was infused into the progress of instructional phases to deliberately promote the social regulatory process in group-working activities. A total of 23 junior high school students with ASD were implemented with the BoB curriculum. To examine the logical path for model implementation, data was collected from the participating students’ self-report scores on the learning nodes and understanding questions. Path analysis using structural equation modeling (SEM) was utilized for analyzing scores on 10 learning nodes and 41 understanding questions through the three phases of the BoB model. Results showed (a) all participants progressed throughout the implementation of the BoB model, and (b) the models of learning nodes and phases were positive and significant as expected, confirming the hypothesized logic path of this curriculum.

Keywords: autism spectrum disorder, empathy, regulation, socially shared regulation

Procedia PDF Downloads 59
631 Community Perceptions and Attitudes Regarding Wildlife Crime in South Africa

Authors: Louiza C. Duncker, Duarte Gonçalves

Abstract:

Wildlife crime is a complex problem with many interconnected facets, which are generally responded to in parts or fragments in efforts to “break down” the complexity into manageable components. However, fragmentation increases complexity as coherence and cooperation become diluted. A whole-of-society approach has been developed towards finding a common goal and integrated approach to preventing wildlife crime. As part of this development, research was conducted in rural communities adjacent to conservation areas in South Africa to define and comprehend the challenges faced by them, and to understand their perceptions of wildlife crime. The results of the research showed that the perceptions of community members varied - most were in favor of conservation and of protecting rhinos, only if they derive adequate benefit from it. Regardless of gender, income level, education level, or access to services, conservation was perceived to be good and bad by the same people. Even though people in the communities are poor, a willingness to stop rhino poaching does exist amongst them, but their perception of parks not caring about people triggered an attitude of not being willing to stop, prevent or report poaching. Understanding the nuances, the history, the interests and values of community members, and the drivers behind poaching mind-sets (intrinsic or driven by transnational organized crime) is imperative to create sustainable and resilient communities on multiple levels that make a substantial positive impact on people’s lives, but also conserve wildlife for posterity.

Keywords: community perceptions, conservation, rhino poaching, whole-of-society approach, wildlife crime

Procedia PDF Downloads 226
630 Mothers, the Missing Link: A Critical Discourse Analysis of the Women-Centric Counterterrorism Measures

Authors: Bukola Solomon

Abstract:

In counterterrorism, policymakers typically design a confined role for women as family members and nurturers. In recent years, they have embraced the idea of mothers as the missing link to preventing and countering violent extremism. This ‘programmed’ role of women is derived from the convictions that women’s central roles in the family and community afford them the ‘unique set of skills’ to detect early signs of radicalization and extremism. This paper attempts to focus on the ‘mother’ narrative that frames women’s agency as mothers of ‘terrorists’ and ‘potential’ terrorists. The general underlying assumption of the ‘mother’ narrative is that naturally, every ‘terrorist’ has or once had a mother, and their radicalization is a maternal ‘oversight.’ By deconstructing the notion of motherhood as a social construct instead of an inherent female desire and ability, this paper argues that the assumption of ‘mothers know best’ is invalid. Also, this paper suggests that the ‘mother’ narrative is a deliberate effort to restrict women’s participation in counterterrorism as ‘preventers.’ Finally, this paper notes a global trend in which mothers are contesting the dominant view of women empowerment that restricts their agency by seeking alternative versions in terrorist organizations. And as such, they create parallel terror cells. Thus, the overemphasis on the role women plays as mothers in counterterrorism limits the scope and potential of counterterrorism programs by marginalizing gender issues and reinforcing gender disparities to the extent that the programs become counterproductive.

Keywords: countering violent extremism, counterterrorism, gender, gender roles, terrorism, women

Procedia PDF Downloads 110
629 Women Entrepreneurship as an Inventive Approach to Ensure a Sustainable Development in Anambre State

Authors: S. Muogbo Uju, Akpunonu Uju,

Abstract:

The prevailing harsh environment factors couple with poverty rate and unemployment propels a high rate of entrepreneurial activities in developing countries of the world. Women entrepreneurs operate within gender bias among other constraint that can constitute a threat or create opportunity for women entrepreneurs. This empirical paper investigates and critically examines women entrepreneurship as an inventive approach to sustainable development in Anambra State. The study used descriptive statistics (frequencies, mean, and percentages) to answer the three research questions posed. Hypotheses testing were done with person product moment correlation and multiple regressions were employed in data analysis. SPSS [statistical package for Social Science] software was used to run the analysis. Three hundred and fifty three (353) copies of questionnaires were administered, and one hundred and forty six (146) copies were returned. Consequently, the findings of this study portrayed a significant impact between women entrepreneurship activities, job creation, wealth creation, youth empowerment, poverty reduction, employment generation, and increase in standard of livings of people. Therefore, the findings prescribe that government should ensure that managerial lessons are accompanied with the skill acquisition programs in order for them to understand the rudiment of owing and sustaining a business. The study also recommends that women entrepreneurs that have overcome the inertia of starting a business should come together to create platforms that can help those women who are yet to take a step or kick-start such venture.

Keywords: women entrepreneurship, skill acquisition, sustainability, wealth creation

Procedia PDF Downloads 432
628 The Reception of Disclosure of Sexual Teens in Media

Authors: Rizky Kertanegara

Abstract:

Reception studies is one of the cultural studies lately evolved in the realm of communication science. This qualitative study was pioneered by Stuart Hall who initiated the dominant, negotiation, and opposition of audience reading to the text of the media. In its development, this reception studies is developed by Kim Christian Schroder become multidimensional reception studies. In this update, Schroder aware that there has been a bias between readings made by the informant with readings conducted by researchers over the informant. Therefore, he classifies the reception into two dimensions, namely the dimension of reading by informants and implications dimensions conducted by researcher. Using Schroder approach, these studies seek to describe the reception of adolescent girls, as research subjects, to the elements contained sexual openness in the music video Cinta Laura as the object of research. Researcher wanted to see how they interpret the values of Western culture based on the values of their culture as a teenager. Researchers used a descriptive qualitative research method by conducting in-depth interviews to the informants who comes from a religious school. The selection of informants was done by using purposeful sampling. Collaboration with the school, the researchers were able to select informants who could provide rich data related to the topic. The analysis showed that there is permissiveness informants in addressing sexual openness in the music video. In addition, informants from Catholic schools were more open than the informant derived from Islamic schools in accepting the values of sexual openness. This permisiveness is regarded as a form of self-actualization and gender equality.

Keywords: cultural studies, multidimensional reception model, sexual openness, youth audience

Procedia PDF Downloads 403
627 DWT-SATS Based Detection of Image Region Cloning

Authors: Michael Zimba

Abstract:

A duplicated image region may be subjected to a number of attacks such as noise addition, compression, reflection, rotation, and scaling with the intention of either merely mating it to its targeted neighborhood or preventing its detection. In this paper, we present an effective and robust method of detecting duplicated regions inclusive of those affected by the various attacks. In order to reduce the dimension of the image, the proposed algorithm firstly performs discrete wavelet transform, DWT, of a suspicious image. However, unlike most existing copy move image forgery (CMIF) detection algorithms operating in the DWT domain which extract only the low frequency sub-band of the DWT of the suspicious image thereby leaving valuable information in the other three sub-bands, the proposed algorithm simultaneously extracts features from all the four sub-bands. The extracted features are not only more accurate representation of image regions but also robust to additive noise, JPEG compression, and affine transformation. Furthermore, principal component analysis-eigenvalue decomposition, PCA-EVD, is applied to reduce the dimension of the features. The extracted features are then sorted using the more computationally efficient Radix Sort algorithm. Finally, same affine transformation selection, SATS, a duplication verification method, is applied to detect duplicated regions. The proposed algorithm is not only fast but also more robust to attacks compared to the related CMIF detection algorithms. The experimental results show high detection rates.

Keywords: affine transformation, discrete wavelet transform, radix sort, SATS

Procedia PDF Downloads 222
626 Seaworthiness and Liability Risks Involving Technology and Cybersecurity in Transport and Logistics

Authors: Eugene Wong, Felix Chan, Linsey Chen, Joey Cheung

Abstract:

The widespread use of technologies and cyber/digital means for complex maritime operations have led to a sharp rise in global cyber-attacks. They have generated an increasing number of liability disputes, insurance claims, and legal proceedings. An array of antiquated case law, regulations, international conventions, and obsolete contractual clauses drafted in the pre-technology era have become grossly inadequate in addressing the contemporary challenges. This paper offers a critique of the ambiguity of cybersecurity liabilities under the obligation of seaworthiness entailed in the Hague-Visby Rules, which apply either by law in a large number of jurisdictions or by express incorporation into the shipping documents. This paper also evaluates the legal and technological criteria for assessing whether a vessel is properly equipped with the latest offshore technologies for navigation and cargo delivery operations. Examples include computer applications, networks and servers, enterprise systems, global positioning systems, and data centers. A critical analysis of the carriers’ obligations to exercise due diligence in preventing or mitigating cyber-attacks is also conducted in this paper. It is hoped that the present study will offer original and crucial insights to policymakers, regulators, carriers, cargo interests, and insurance underwriters closely involved in dispute prevention and resolution arising from cybersecurity liabilities.

Keywords: seaworthiness, cybersecurity, liabilities, risks, maritime, transport

Procedia PDF Downloads 126
625 Pastoral Power, Early Modern Insurrections, and Contemporary Carelessness: What Foucault Can Teach Us about the “Crisis of Care”

Authors: Lucile Richard

Abstract:

Contemporary thinkers studying biopolitics and its lethal logic find little interest in Foucault's "vague sketch of the pastorate.” Despite pastoral power being depicted as the matrix of governmentality in the genealogy of biopower, most post-Foucauldian theorists disregard its study. Sovereign power takes precedence in the examination of the governmental connection between care, violence, and death. Questioning this recurring motif, this article advocates for a feminist exploration of pastoral power. It argues that giving attention to the genealogy of the pastorate is essential to account for the carelessness that runs today's politics. Examining Foucault's understanding of this "power to care" uncovers the link between care work and politics, a facet of governmentality often overlooked in sovereignty-centered perspectives. His description of “pastoral insurrections”, in so far as it highlights that caring, far from being excluded from politics, is the object of competing problematizations, also calls for a more nuanced and complex comprehension of the politicization of care and care work than the ones developed by feminist theorists. As such, it provides an opportunity to delve into under-theorized dimensions of the "care crisis" in feminist accounts. On one hand, it reveals how populations are disciplined and controlled, not only through caregiving obligations, but also through being assigned or excluded from receiving care. On the other, it stresses that the organization of the public sphere is just as important as the organization of the private sphere, which is the main focus for most feminists, in preventing marginalized perspectives on caring from gaining political momentum.

Keywords: Foucault, feminist theory, resistance, pastoral power, crisis of care, biopolitics

Procedia PDF Downloads 43
624 Vaccination against Hepatitis B in Tunisian Health Care Workers

Authors: Asma Ammar, Nabiha Bouafia , Asma BenCheikh, Mohamed Mahjoub, Olfa Ezzi, Wadiaa Bannour, Radhia Helali, Mansour Njah

Abstract:

Background: The objective of the present study was to identify factors associated with vaccination against Hepatitis B virus (HBV) among healthcare workers (HWs) in the University Hospital Center (UHC) Farhat Hached Sousse, Tunisia. Methods: We conducted a descriptive cross-sectional study all licensed physicians (n= 206) and a representative sample of paramedical staff (n= 372) exercising at UHC Hached Sousse (Tunisia) during two months (January and February 2014). Data were collected using a self-administered and pre-tested questionnaire, which composed by 21 questions. In order to determinate factors associated with vaccination against hepatitis B among HWs, this questionnaire was based on the Health Belief Model, one of the most classical behavior theories. Logistic regression with the stepwise method of Hosmer and Lemeshow was used to identify the determinants of the use of vaccination against HBV. Results: The response rates were 79.8%. Fifty two percent believe that HBV is frequent in our healthcare units and 60.6% consider it a severe infection. The prevalence of HWs vaccination was 39%, 95% CI [34.49%; 43.5%]. In multivariate analysis, determinants of the use of vaccination against HBV among HWs were young age (p=10-4), male gender (p = 0. 006), high or very high importance accorded to health (p = 0.035), perception membership in a risk group for HBV infection (p = 0.038) and very favorable or favorable opinion about vaccination against HVB (p=10-4). Conclusion: The results of our study should be considered in any strategy for preventing VHB infection in HWs. In the mean time, coverage with standard vaccines should be improved also by supplying complete information on the risks of VHB infection and on the safety and efficacy of vaccination.

Keywords: Hepatitis B virus, healthcare workers, prevalence, vaccination

Procedia PDF Downloads 338
623 The Improvement of Disease-Modifying Osteoarthritis Drugs Model Uptake and Retention within Two Cartilage Models

Authors: Polina Prokopovich

Abstract:

Disease-modifying osteoarthritis drugs (DMOADs) are a new therapeutic class for OA, preventing or inhibiting OA development. Unfortunately, none of the DMOADs have been clinically approved due to their poor therapeutic effects in clinical trials. The joint environment has played a role in the poor clinical performance of these drugs by limiting the amount of drug effectively delivered as well as the time that the drug spends within the joint space. The current study aims to enhance the cartilage uptake and retention time of the DMOADs-model (licofelone), which showed a significant therapeutic effect against OA progression and is currently in phase III. Licofelone will be covalently conjugated to the hydrolysable, cytocompatible, and cationic poly beta-amino ester polymers (PBAE). The cationic polymers (A16 and A87) can be electrostatically attached to the negatively charged cartilage component (glycosaminoglycan), which will increase the drug penetration through the cartilage and extend the drug time within the cartilage. In the cartilage uptake and retention time studies, an increase of 18 to 37 times of the total conjugated licofelone to A87 and A16 was observed when compared to the free licofelone. Furthermore, the conjugated licofelone to A87 was detectable within the cartilage at 120 minutes, while the free licofelone was not detectable after 60 minutes. Additionally, the A87-licofelone conjugate showed no effect on the chondrocyte viability. In conclusion, the cationic A87 and A16 polymers increased the percentage of licofelone within the cartilage, which could potentially enhance the therapeutic effect and pharmacokinetic performance of licofelone or other DMOADs clinically.

Keywords: PBAE, cartilage., osteoarthritis, injectable biomaterials, drug delivery

Procedia PDF Downloads 64
622 Optimization of Bifurcation Performance on Pneumatic Branched Networks in next Generation Soft Robots

Authors: Van-Thanh Ho, Hyoungsoon Lee, Jaiyoung Ryu

Abstract:

Efficient pressure distribution within soft robotic systems, specifically to the pneumatic artificial muscle (PAM) regions, is essential to minimize energy consumption. This optimization involves adjusting reservoir pressure, pipe diameter, and branching network layout to reduce flow speed and pressure drop while enhancing flow efficiency. The outcome of this optimization is a lightweight power source and reduced mechanical impedance, enabling extended wear and movement. To achieve this, a branching network system was created by combining pipe components and intricate cross-sectional area variations, employing the principle of minimal work based on a complete virtual human exosuit. The results indicate that modifying the cross-sectional area of the branching network, gradually decreasing it, reduces velocity and enhances momentum compensation, preventing flow disturbances at separation regions. These optimized designs achieve uniform velocity distribution (uniformity index > 94%) prior to entering the connection pipe, with a pressure drop of less than 5%. The design must also consider the length-to-diameter ratio for fluid dynamic performance and production cost. This approach can be utilized to create a comprehensive PAM system, integrating well-designed tube networks and complex pneumatic models.

Keywords: pneumatic artificial muscles, pipe networks, pressure drop, compressible turbulent flow, uniformity flow, murray's law

Procedia PDF Downloads 63
621 Emotional Impact and Moral Panic in Swedish Social Media during the COVID-19 Crisis

Authors: Sophia Yakhlef

Abstract:

In spring 2020, the spread of coronavirus disease 2019 (COVID-19) reached the epidemiological criteria to be declared a global pandemic. Global action was taken in order to stop the spread of the virus, such as, for example, restrictions regarding spending time outside of your home and, in several countries, periods of mandatory quarantine. Sweden's method of handling the pandemic has stood out among other European nations, and the tactic of relying on citizens' sense of civic solidarity, rather than enforcing legal restrictions preventing people from spending time outside, has been highly criticised in international news media. This situation has entailed a moral dilemma concerning the proper conduct of behaviour in everyday situations in Sweden, which is also reflected in public news media and social media. This media study focuses on Swedish social media debates and attitudes concerning moral dilemmas of handling this sense of civic solidarity. Comments on social media forums expressing outrage and anger regarding, amongst others, the actions of public media figures (such as celebrities, journalists, and bloggers) are analyzed. Drawing on a social psychological perspective on emotions, the study identifies ambiguities of moral disagreements and moral panics as ways of expressing that a moral norm has been violated. The findings suggest that social media is used in order to handle such ambiguities and make sense of the loosely defined norms of civic solidarity.

Keywords: COVID-19 crisis, moral disagreements, moral panic, social media, social norms, social psychology, Sweden

Procedia PDF Downloads 116
620 Plantlet Regeneration from Zygotic Embryos of Securidaca longepedunculata Fresen

Authors: Uche C. Okafor, Nwanneka M. Okpokwu, Felix Nwafor, Carl E. A. Okezie

Abstract:

Securidaca longepedunculata Fresen (Violet tree) belongs to the family Polygalaceae characterised by papillionaceous purplish flowers. This medicinally valued plant disappears at an alarming rate due to intensified anthropopressure particularly the unregulated manner of subterranean plant parts' collection from natural stands. Some indiscriminately harvested plants bear seeds containing both mature and immature zygotic embryos that are often discarded. Here, such seeds are collected for this experiment. Seeds were collected, washed, de-coated, and dipped in 70 % (v/v) ethanol for 30 s followed by rising in 5 % solution sodium hypochlorite, containing two drops of tween 20, for another 25 min. Mature zygotic embryos (MZEs) were excised from seeds and cultured in two basal media (MS and B5), three carbon sources (sucrose, glucose and fructose) at five concentrations (0-40 g/L) while immature zygotic embryos (iMZEs) were composed on similar basal media and carbon source supplemented with 0-2 mg/L Benzylaminopurine (BAP) and 0-2 mg/L Indole acetic acid (IAA). MZEs cultured on MS + 30g/L sucrose differed significantly from other treatments at p≤0.05 with maximum percent sprouting (85.24± 5.67 %) and shoot length (7.53±0.67 cm). MZEs culture had the maximum percent sprouting (85.24± 5.67 %) and shoot length (7.53±0.67 cm) in medium containing MS+ 30g L-1 sucrose. iMZEs on the other hand had maximum growth on MS + 40g/L sucrose supplemented with 1.5 mg/L IAA+ 1.0 mg/L BAP. This study is a geared towards creating an alternative path for the maximum production of plants in vitro, thereby, preventing the plants from disappearing.

Keywords: Gamborg's medium, Murashige and Skoog medium, Securidaca longepedunculata, zygotic embryos

Procedia PDF Downloads 147
619 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools

Authors: M. Kaya, M. Eris

Abstract:

Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.

Keywords: block matching, digital evidence, hash list, evaluation of digital evidence

Procedia PDF Downloads 247
618 The Role of Information and Communication Technology to Enhance Transparency in Public Funds Management in the DR Congo

Authors: Itulelo Matiyabu Imaja, Manoj Maharaj, Patrick Ndayizigamiye

Abstract:

Lack of transparency in public funds management is observed in many African countries. The DR Congo is among the most corrupted countries in Africa, and this is due mainly to lack of transparency and accountability in public funds management. Corruption has a negative effect on the welfare of the country’s citizens and the national economic growth. Public funds collection and allocation are the major areas whereby malpractices such as bribe, extortion, embezzlement, nepotism and other practices related to corruption are prevalent. Hence, there is a need to implement strong mechanisms to enforce transparency in public funds management. Many researchers have suggested some control mechanisms in curbing corruption in public funds management focusing mainly on law enforcement and administrative reforms with little or no insight on the role that ICT can play in preventing and curbing the corrupt behaviour. In the Democratic Republic of Congo (DRC), there are slight indications that the government of the DR Congo is integrating ICT to fight corruption in public funds collection and allocation. However, such government initiatives are at an infancy stage, with no tangible evidence on how ICT could be used effectively to address the issue of corruption in the context of the country. Hence, this research assesses the role that ICT can play for transparency in public funds management and suggest a framework for its adoption in the Democratic Republic of Congo. This research uses the revised Capability model (Capability, Empowerment, Sustainability model) as the guiding theoretical framework. The study uses the exploratory design methodology coupled with a qualitative approach to data collection and purposive sampling as sampling strategy.

Keywords: corruption, DR congo, ICT, management, public funds, transparency

Procedia PDF Downloads 334
617 Multilingualism as an Impetus to Nigerian Religious and Political Crises: the Way Forward

Authors: Kehinde, Taye Adetutu

Abstract:

The fact that Nigeria as a nation is faced by myriads of problems associated with religious crises and political insecurity is no news, the spoken statement and actions of most political giant were the major cause of this unrest. The 'unlearnt' youth within the regions has encompassed the situation. This scenario is further compounded by multilingual nature of the country as it is estimated that there exists amount 400 indigenous languages in Nigeria. It is an indisputable fact that english language which has assumed the status of an official language in Nigeria, given its status has a language of power and captivity by a few with no privilege to attend school. However, educating people in their indigenous language; crises can be averted through the proper orientation and mass literacy campaign, especially for the timid illiterate one, so as to live in unity, peace, tranquillity, and harmony as indivisible nation. In investigating the problem in this study with an emphasis on three major Nigerian language (Yoruba, Igbo and Hausa), participants observations and survey questionnaire were administered to about one hundred and twenty (120) respondents who were randomly selected throughout the three major ethnic groups in Nigeria. Findings from this study reveals that teaching and learning of cognitive words and information are more effective in ones mother tongue and helps in stimulating new ideas and changes. This paper was able to explore and critically examine the current state of affairs in Nigeria and proffer possible solutions to the prevailing situations by identifying how indigenous languages and linguistics can be used to ameliorate the present political and religious crisis for Nigeria, thus providing a proper recommendation to achieve meaningful stability and coexistence within a nation.

Keywords: multilingualism, political crisis, religious, Nigeria

Procedia PDF Downloads 428
616 Counter-Terrorism and De-Radicalization as Soft Strategies in Combating Terrorism in Indonesia: A Critical Review

Authors: Tjipta Lesmana

Abstract:

Terrorist attacks quickly penetrated Indonesia following the downfall of Soeharto regime in May 1998. Reform era was officially proclaimed. Indonesia turned to 'heaven state' from 'authoritarian state'. For the first time since 1966, the country experienced a full-scale freedom of expression, including freedom of the press, and heavy acknowledgement of human rights practice. Some religious extremists previously run away to neighbor countries to escape from security apparatus secretly backed home. Quickly they consolidated the power to continue their long aspiration and dream to establish 'Shariah Indonesia', Indonesia based on Khilafah ideology. Bali bombings I which shocked world community occurred on 12 October 2002 in the famous tourist district of Kuta on the Indonesian island of Bali, killing 202 people (including 88 Australians, 38 Indonesians, and people from more than 20 other nationalities). In the capital, Jakarta, successive bombings were blasted in Marriott hotel, Australian Embassy, residence of the Philippine Ambassador and stock exchange office. A 'drunken Indonesia' is far from ready to combat nationwide sudden and massive terrorist attacks. Police Detachment 88 (Densus 88) Indonesian counter-terrorism squad, was quickly formed following 2002 Bali Bombing. Anti-terrorism Provisional Act was immediately erected, as well, due to urgent need to fight terrorism. Some Bali bombings criminals were deadly executed after sentenced by the court. But a series of terrorist suicide attacks and another Bali bombings (the second one) in Bali, again, shocked world community. Terrorism network is undoubtedly spreading nationwide. Suspicion is high that they had close connection with Al Qaeda’s groups. Even 'Afghanistan alumni' and 'Syria alumni' returned to Indonesia to back up the local mujahidins in their fights to topple Indonesia constitutional government and set up Islamic state (Khilafah). Supported by massive aids from friendly nations, especially Australia and United States, Indonesia launched large scale operations to crush terrorism consisted of various radical groups such as JAD, JAS, and JAADI. Huge energy, money, and souls were dedicated. Terrorism is, however, persistently entrenched. High ranking officials from Detachment 88 squad and military intelligence believe that terrorism is still one the most deadly enemy of Indonesia.

Keywords: counter-radicalization, de-radicalization, Khalifah, Union State, Al Qaedah, ISIS

Procedia PDF Downloads 170