Search results for: weak rule priority
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2452

Search results for: weak rule priority

1492 Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan

Authors: Ishna Indika Jusi, Rifana Meika

Abstract:

Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds.

Keywords: Fintech, illegal, Indonesia, technology, terrorism financing

Procedia PDF Downloads 150
1491 Religious Beliefs versus Child’s Rights: Anti-Vaccine Movement in Indonesia

Authors: Ni Luh Bayu PurwaEka Payani, Destin Ristanti

Abstract:

Every child has the right to be healthy, and it is a parents’ obligation to fulfill their rights. In order to be healthy and prevented from the outbreak of infectious diseases, some vaccines are required. However, there are groups of people, who consider that vaccines consist of religiously forbidden ingredients. The government of Indonesia legally set the rule that all children must be vaccinated. However, merely based on religious beliefs and not supported by scientific evidence, these people ignore the vaccination. As a result, this anti-vaccine movement caused diphtheria outbreak in 2017. Categorized as a vulnerable group, child`s rights must be fulfilled in any forms. This paper tries to analyze the contradiction between religious beliefs and the fulfillment of child`s rights. Furthermore, it tries to identify the anti-vaccine movement as a form of human rights violation, especially regarding child's rights. This has been done by examining the event of the outbreak of diphtheria in 20 provinces of Indonesia. Furthermore, interview and literature reviews have been done to support the analysis. Through this process, it becomes clear that the anti-vaccine movements driven by religious beliefs did influence the outbreak of diphtheria. Hence, the anti-vaccine movements ignore the long-term effects not only on their own children’s health but also others.

Keywords: anti-vaccine movement, child rights, religious beliefs, right to health

Procedia PDF Downloads 190
1490 Meta Mask Correction for Nuclei Segmentation in Histopathological Image

Authors: Jiangbo Shi, Zeyu Gao, Chen Li

Abstract:

Nuclei segmentation is a fundamental task in digital pathology analysis and can be automated by deep learning-based methods. However, the development of such an automated method requires a large amount of data with precisely annotated masks which is hard to obtain. Training with weakly labeled data is a popular solution for reducing the workload of annotation. In this paper, we propose a novel meta-learning-based nuclei segmentation method which follows the label correction paradigm to leverage data with noisy masks. Specifically, we design a fully conventional meta-model that can correct noisy masks by using a small amount of clean meta-data. Then the corrected masks are used to supervise the training of the segmentation model. Meanwhile, a bi-level optimization method is adopted to alternately update the parameters of the main segmentation model and the meta-model. Extensive experimental results on two nuclear segmentation datasets show that our method achieves the state-of-the-art result. In particular, in some noise scenarios, it even exceeds the performance of training on supervised data.

Keywords: deep learning, histopathological image, meta-learning, nuclei segmentation, weak annotations

Procedia PDF Downloads 122
1489 The Power of a Vulnerable State: The Rights Revolution and the Emergence of Human Resources Management Departments

Authors: Soheila Ghanbari

Abstract:

After the Civil Rights Act of 1964 was enacted, federal policy transformed employment rights. Equal employment opportunity law, legislation for occupational safety and health, and regulations for fringe benefits were established to ensure that employees have rights to equal protection, health and safety, and the benefits guaranteed by employers. In research analyzing data from 279 organizations over time, it was discovered that legal changes prompted organizations to establish personnel, antidiscrimination, safety, and benefits departments to ensure compliance. However, as the process of institutionalization advanced, middle managers began to separate these fresh offices from policy and rationalize them solely in economic terms as a component of the new human resources management model. This common occurrence is seen in the United States, where the Constitution represents government control of business as unlawful. It could potentially clarify the extended lack of a state theory in organizational analysis and shed light on a puzzle pointed out by state theorists: the federal state is weak in terms of administration but strong in terms of norms.

Keywords: management, state, human, resources, employment

Procedia PDF Downloads 21
1488 Prediction of Extreme Precipitation in East Asia Using Complex Network

Authors: Feng Guolin, Gong Zhiqiang

Abstract:

In order to study the spatial structure and dynamical mechanism of extreme precipitation in East Asia, a corresponding climate network is constructed by employing the method of event synchronization. It is found that the area of East Asian summer extreme precipitation can be separated into two regions: one with high area weighted connectivity receiving heavy precipitation mostly during the active phase of the East Asian Summer Monsoon (EASM), and another one with low area weighted connectivity receiving heavy precipitation during both the active and the retreat phase of the EASM. Besides,a way for the prediction of extreme precipitation is also developed by constructing a directed climate networks. The simulation accuracy in East Asia is 58% with a 0-day lead, and the prediction accuracy is 21% and average 12% with a 1-day and an n-day (2≤n≤10) lead, respectively. Compare to the normal EASM year, the prediction accuracy is lower in a weak year and higher in a strong year, which is relevant to the differences in correlations and extreme precipitation rates in different EASM situations. Recognizing and identifying these effects is good for understanding and predicting extreme precipitation in East Asia.

Keywords: synchronization, climate network, prediction, rainfall

Procedia PDF Downloads 421
1487 Analysis of Artificial Hip Joint Using Finite Element Method

Authors: Syed Zameer, Mohamed Haneef

Abstract:

Hip joint plays very important role in human beings as it takes up the whole body forces generated due to various activities. These loads are repetitive and fluctuating depending on the activities such as standing, sitting, jogging, stair casing, climbing, etc. which may lead to failure of Hip joint. Hip joint modification and replacement are common in old aged persons as well as younger persons. In this research study static and Fatigue analysis of Hip joint model was carried out using finite element software ANSYS. Stress distribution obtained from result of static analysis, material properties and S-N curve data of fabricated Ultra High molecular weight polyethylene / 50 wt% short E glass fibres + 40 wt% TiO2 Polymer matrix composites specimens were used to estimate fatigue life of Hip joint using stiffness Degradation model for polymer matrix composites. The stress distribution obtained from static analysis was found to be within the acceptable range.The factor of safety calculated from linear Palmgren linear damage rule is less than one, which indicates the component is safe under the design.

Keywords: hip joint, polymer matrix composite, static analysis, fatigue analysis, stress life approach

Procedia PDF Downloads 337
1486 Waste Generation in Iranian Building Industry: Addressing a Theory

Authors: Golnaz Moghimi, Alireza Afsharghotli, Alireza Rezaei

Abstract:

Construction waste has been gradually increased as a result of upsizing construction projects which are occurred within the lifecycle of buildings. Since waste management is a major priority and has profound impacts on the volume of waste generated in construction stage, the majority of efforts have been attempted to reuse, recycle and reduce waste. However, there is still room to study on lack of sufficient knowledge about waste management in construction industry. This paper intends to provide an insight into the effect of project management knowledge areas on waste management solely on construction stage. To this end, a survey among Iranian building construction industry contractors was conducted to identify the effectiveness of project management knowledge areas on three jobsite key factors including ‘Site activity’, ‘Training’, and ‘Awareness’. As a result, four management disciplines were identified as most influential ones on amount of construction waste. These disciplines were Project Cost Management, Quality Management, Human Resource Management, and Integration Management. Based on the research findings, a new model was presented to develop effective construction waste strategies.

Keywords: awareness, PMBOK, site activity, training, waste management

Procedia PDF Downloads 319
1485 Management of Pain in Patients under Vitamin K Antagonists: Experience of the Unit of Clinical Pharmacology of EHU Oran, Algeria

Authors: Amina Bayazid, Habiba Fetati, Houari Toumi

Abstract:

Introduction: The clinical value of vitamin K antagonists (VKA) has been widely demonstrated in numerous indications. Unfortunately, VKA are not devoid of drawbacks and risk of serious bleeding. The iatrogenic induced by these drugs is a major public health problem. Patients & Methods: We conducted a retrospective study period extending from February 2012 to August 2013 in the pharmacovigilance service of EHUO (clinical pharmacology unit). The prescription of painkillers was analyzed in patients on VKA followed at our level. The influence of these analgesics on the evolution of the INR is an important component in our work. Results: We counted a total of 195 patients, of whom 32 (or 16.41% of the total population) had received analgesic treatment. The frequencies of different categories of analgesics administered were: • Analgesics opioids: 0% • Analgesics weak opioids: Tramadol: 21.87% • The non-opioid analgesics: -AINS: 71.87% (indomethacin: 68.75% ibuprofen: 3.12%) - Paracetamol: 6.25% -Salicyles (Acetylsalicylic acid): 0%. Conclusion: The management of pain in patients under vitamin K antagonists has special features, given their many drug interactions with analgesics and their influence on the evolution of the INR which can have dramatic consequences. As such, special attention must be paid to the use of analgesics in this type of patient.

Keywords: vitamin K antagonists, pain killers, interactions, INR

Procedia PDF Downloads 278
1484 Developing and integrated Clinical Risk Management Model

Authors: Mohammad H. Yarmohammadian, Fatemeh Rezaei

Abstract:

Introduction: Improving patient safety in health systems is one of the main priorities in healthcare systems, so clinical risk management in organizations has become increasingly significant. Although several tools have been developed for clinical risk management, each has its own limitations. Aims: This study aims to develop a comprehensive tool that can complete the limitations of each risk assessment and management tools with the advantage of other tools. Methods: Procedure was determined in two main stages included development of an initial model during meetings with the professors and literature review, then implementation and verification of final model. Subjects and Methods: This study is a quantitative − qualitative research. In terms of qualitative dimension, method of focus groups with inductive approach is used. To evaluate the results of the qualitative study, quantitative assessment of the two parts of the fourth phase and seven phases of the research was conducted. Purposive and stratification sampling of various responsible teams for the selected process was conducted in the operating room. Final model verified in eight phases through application of activity breakdown structure, failure mode and effects analysis (FMEA), healthcare risk priority number (RPN), root cause analysis (RCA), FT, and Eindhoven Classification model (ECM) tools. This model has been conducted typically on patients admitted in a day-clinic ward of a public hospital for surgery in October 2012 to June. Statistical Analysis Used: Qualitative data analysis was done through content analysis and quantitative analysis done through checklist and edited RPN tables. Results: After verification the final model in eight-step, patient's admission process for surgery was developed by focus discussion group (FDG) members in five main phases. Then with adopted methodology of FMEA, 85 failure modes along with its causes, effects, and preventive capabilities was set in the tables. Developed tables to calculate RPN index contain three criteria for severity, two criteria for probability, and two criteria for preventability. Tree failure modes were above determined significant risk limitation (RPN > 250). After a 3-month period, patient's misidentification incidents were the most frequent reported events. Each RPN criterion of misidentification events compared and found that various RPN number for tree misidentification reported events could be determine against predicted score in previous phase. Identified root causes through fault tree categorized with ECM. Wrong side surgery event was selected by focus discussion group to purpose improvement action. The most important causes were lack of planning for number and priority of surgical procedures. After prioritization of the suggested interventions, computerized registration system in health information system (HIS) was adopted to prepare the action plan in the final phase. Conclusion: Complexity of health care industry requires risk managers to have a multifaceted vision. Therefore, applying only one of retrospective or prospective tools for risk management does not work and each organization must provide conditions for potential application of these methods in its organization. The results of this study showed that the integrated clinical risk management model can be used in hospitals as an efficient tool in order to improve clinical governance.

Keywords: failure modes and effective analysis, risk management, root cause analysis, model

Procedia PDF Downloads 226
1483 Leveraging Information for Building Supply Chain Competitiveness

Authors: Deepika Joshi

Abstract:

Operations in automotive industry rely greatly on information shared between Supply Chain (SC) partners. This leads to efficient and effective management of SC activity. Automotive sector in India is growing at 14.2 percent per annum and has huge economic importance. We find that no study has been carried out on the role of information sharing in SC management of Indian automotive manufacturers. Considering this research gap, the present study is planned to establish the significance of information sharing in Indian auto-component supply chain activity. An empirical research was conducted for large scale auto component manufacturers from India. Twenty four Supply Chain Performance Indicators (SCPIs) were collected from existing literature. These elements belong to eight diverse but internally related areas of SC management viz., demand management, cost, technology, delivery, quality, flexibility, buyer-supplier relationship, and operational factors. A pair-wise comparison and an open ended questionnaire were designed using these twenty four SCPIs. The questionnaire was then administered among managerial level employees of twenty-five auto-component manufacturing firms. Analytic Network Process (ANP) technique was used to analyze the response of pair-wise questionnaire. Finally, twenty-five priority indexes are developed, one for each respondent. These were averaged to generate an industry specific priority index. The open-ended questions depicted strategies related to information sharing between buyers and suppliers and their influence on supply chain performance. Results show that the impact of information sharing on certain performance indicators is relatively greater than their corresponding variables. For example, flexibility, delivery, demand and cost related elements have massive impact on information sharing. Technology is relatively less influenced by information sharing but it immensely influence the quality of information shared. Responses obtained from managers reveal that timely and accurate information sharing lowers the cost, increases flexibility and on-time delivery of auto parts, therefore, enhancing the competitiveness of Indian automotive industry. Any flaw in dissemination of information can disturb the cycle time of both the parties and thus increases the opportunity cost. Due to supplier’s involvement in decisions related to design of auto parts, quality conformance is found to improve, leading to reduction in rejection rate. Similarly, mutual commitment to share right information at right time between all levels of SC enhances trust level. SC partners share information to perform comprehensive quality planning to ingrain total quality management. This study contributes to operations management literature which faces scarcity of empirical examination on this subject. It views information sharing as a building block which firms can promote and evolve to leverage the operational capability of all SC members. It will provide insights for Indian managers and researchers as every market is unique and suppliers and buyers are driven by local laws, industry status and future vision. While major emphasis in this paper is given to SC operations happening between domestic partners, placing more focus on international SC can bring in distinguished results.

Keywords: Indian auto component industry, information sharing, operations management, supply chain performance indicators

Procedia PDF Downloads 530
1482 Fuzzy Inference System for Risk Assessment Evaluation of Wheat Flour Product Manufacturing Systems

Authors: Atrin Barzegar, Yas Barzegar, Stefano Marrone, Francesco Bellini, Laura Verde

Abstract:

The aim of this research is to develop an intelligent system to analyze the risk level of wheat flour product manufacturing system. The model consists of five Fuzzy Inference Systems in two different layers to analyse the risk of a wheat flour product manufacturing system. The first layer of the model consists of four Fuzzy Inference Systems with three criteria. The output of each one of the Physical, Chemical, Biological and Environmental Failures will be the input of the final manufacturing systems. The proposed model based on Mamdani Fuzzy Inference Systems gives a performance ranking of wheat flour products manufacturing systems. The first step is obtaining data to identify the failure modes from expert’s opinions. The second step is the fuzzification process to convert crisp input to a fuzzy set., then the IF-then fuzzy rule applied through inference engine, and in the final step, the defuzzification process is applied to convert the fuzzy output into real numbers.

Keywords: failure modes, fuzzy rules, fuzzy inference system, risk assessment

Procedia PDF Downloads 51
1481 Mobility of Metallic Trace Elements (MTE) in Water and Sediment of the Rivers: Case of Nil River, North-Eastern Algerian

Authors: S. Benessam, T. H. Debieche, S. Amiour, A. Chine, S. Khelili

Abstract:

The metallic trace elements (MTE) are present in water and sediments of the rivers with weak concentrations. Several physicochemical parameters (Eh, pH and oxygen dissolved) and chemical processes (adsorption, absorption, complexation and precipitation) as well as nature of the sediments control their mobility. In order to determine the effect of these factors on the mobility of some MTE (Cd, Cr, Cu, Fe, Pb and Zn) in water of the rivers, a two-monthly monitoring of the physicochemical parameters and chemistry of water and sediments of the Nil wadi (Algeria) was carried out during the period from November 2013 to January 2015. The results show that each MTE has its own conditions of mobility and generally are very influence by the variations of the pH and Eh. Under the natural conditions, neutral pH with basic and medium oxidizing, only the lead presented in water with raised values, indicating its solubility in water and its salting out of the sediments. The other MTE present raised concentrations in the sediments, indicating their trapping by adsorption and/or chemical precipitation. The chemical form of each ETM was given by Eh-pH diagrams. The spatio-temporal monitoring of these ETM shows the effect of the rains, the dry periods and the rejects in the variation of their concentrations.

Keywords: chemistry, metallic trace elements, sediment, water

Procedia PDF Downloads 264
1480 A GIS Based Approach in District Peshawar, Pakistan for Groundwater Vulnerability Assessment Using DRASTIC Model

Authors: Syed Adnan, Javed Iqbal

Abstract:

In urban and rural areas groundwater is the most economic natural source of drinking. Groundwater resources of Pakistan are degraded due to high population growth and increased industrial development. A study was conducted in district Peshawar to assess groundwater vulnerable zones using GIS based DRASTIC model. Six input parameters (groundwater depth, groundwater recharge, aquifer material, soil type, slope and hydraulic conductivity) were used in the DRASTIC model to generate the groundwater vulnerable zones. Each parameter was divided into different ranges or media types and a subjective rating from 1-10 was assigned to each factor where 1 represented very low impact on pollution potential and 10 represented very high impact. Weight multiplier from 1-5 was used to balance and enhance the importance of each factor. The DRASTIC model scores obtained varied from 47 to 147. Using quantile classification scheme these values were reclassified into three zones i.e. low, moderate and high vulnerable zones. The areas of these zones were calculated. The final result indicated that about 400 km2, 506 km2, and 375 km2 were classified as low, moderate, and high vulnerable areas, respectively. It is recommended that the most vulnerable zones should be treated on first priority to facilitate the inhabitants for drinking purposes.

Keywords: DRASTIC model, groundwater vulnerability, GIS in groundwater, drinking sources

Procedia PDF Downloads 428
1479 Collision Avoidance Maneuvers for Vessels Navigating through Traffic Separation Scheme

Authors: Aswin V. J., Sreeja S., R. Harikumar

Abstract:

Ship collision is one of the major concerns while navigating in the ocean. In congested sea routes where there are hectic offshore operations, ships are often forced to take close encounter maneuvers. Maritime rules for preventing collision at sea are defined in the International Regulations for Preventing Collision at Sea. Traffic Separation Schemes (TSS) are traffic management route systems ruled by International Maritime Organization (IMO), where the traffic lanes indicate the general direction of traffic flow. The Rule 10 of International Regulations for Preventing Collision at Sea prescribes the conduct of vessels while navigating through TSS. But no quantitative criteria regarding the procedures to detect and evaluate collision risk is specified in International Regulations for Preventing Collision at Sea. Most of the accidents that occur are due to operational errors affected by human factors such as lack of experience and loss of situational awareness. In open waters, the traffic density is less when compared to that in TSS, and hence the vessels can be operated in autopilot mode. A collision avoidance method that uses the possible obstacle trajectories in advance to predict “collision occurrence” and can generate suitable maneuvers for collision avoidance is presented in this paper. The suitable course and propulsion changes that can be used in a TSS considering International Regulations for Preventing Collision at Sea are found out for various obstacle scenarios.

Keywords: collision avoidance, maneuvers, obstacle trajectories, traffic separation scheme

Procedia PDF Downloads 57
1478 The Emerging Post-Islamism and the Politics of Pakistan’s Jamaat-i-Islami in the Contemporary Muslim World

Authors: Shahzada Gulfam

Abstract:

Islamism was considered as a new phenomenon in Muslim World to revolt against static Religious Traditionalists and the Imperialists. Islamist political parties viewed the establishment of an Islamic state within the limits of Sharia’h as their destination. The Islamists movements like Ikhwan-ul Muslimun, Jamaat-i-Islami etc. did appear with revolutionary agenda but were contained by military forces and the secular modernists of Muslim World. The Muslim rulers, historically could not respect the democratic and moral norms and equally emerged as dictators in democracies, military rule as well as in monarchies. The Arab Spring did not follow the Islamists agenda but gathered the common masses against the corrupt rulers to have a just democratic political system. The Islamic State and Sharia’h were not their immediate targets but the achievement of moral norms in Muslim societies and eradication of dictatorial rule were the basic aims. This phenomenon is named as post-Islamism. The political struggle of PAT (Pakistan Awami Tehreek) and the PTI (Pakistan Tehreek-i-Insaf) has been following the footsteps of Arab Spring and can be noted as the extension of Arab Spring in Muslim World. The results of this struggle would define the fate of Post-Islamism in Pakistan. Has Jamaat-i-Islami got the potential to reform its agenda accordingly? This paper intends to study the Jamaat’s struggle and tries to predict Jamaat’s role in post-Islamism scenario. There is a clear distinction between the people of religion and the people following the popular materialistic westernized value system. This division is also evident in political parties. Pakistan has been ruled mostly by the secular parties and rulers. The inability to establish Islamic system by replacing the imperial system has created militancy and revolt which requires the establishment of a sound model Islamic based system in the country. The political parties of Pakistan could not device a modernize agenda, equally acceptable in modernized world and addressing the prevailing issues and also having the indigenous religious and cultural roots. The inability of Jamaat-i-Islami Pakistan to transform its agenda accordingly to serve the post-Islamism has made it irrelevant in Pakistan’s politics. Once Jamaat leaves behind its hard position as an Islamist party and accepts the post-Islamism as beginning to create its idealized state and society, it can pursue its agenda gradually. The phenomenon of post-Islamism does not make Islamists irrelevant but invites them to listen to the priorities of masses rather than insisting on the agenda of their respective ideologues to be followed for all times. The ruling Muslim democrats and military dictators of Pakistan have been following unfair means to sustain their political power which gave rise to space for the new political parties to emerge and organize agitation successfully in Pakistani Politics. Jamaat-i-Islami could not fill that space to be an agent of Post-Islamism and could not break their chains which had been tying them to the prevailing failed democracy of Pakistan. Post-Islamists are the addressers of the rulers corruption and are struggling for reforms in system. Jamaat due to its ideological compulsions could not transform its agenda accordingly. The new scenario indicates that the Post-Islamism which emerged in Arab World can be taken as first step to establish democracy and justice in state and society and then the establishment of Islamic law and the establishment of an Islamic state should have been the next targets. This gradual agenda would have delivered public support to the Jamaat which deserved that but PTI & PAT have cashed this opportunity in Pakistani politics by strengthening their respective vote banks.

Keywords: arab spring, islamic state, islamic political parties, muslim world, post-islamism

Procedia PDF Downloads 348
1477 Epidemiological Profile of Healthcare Associated Infections in Intensive Care Unit

Authors: Abdessamad Dali-Ali, Houaria Beldjillali, Fouzia Agag, Asmaa Oukebdane, Ramzi Tidjani, Arslane Bettayeb, Khadidja Meddeber, Radia Dali-Yahia, Nori Midoun

Abstract:

Healthcare-associated infections are a real public health problem, especially in intensive care units. The aim of our study was to describe the epidemiological profile and to estimate the incidence of these infections at the intensive care unit of our teaching hospital. A prospective study was conducted, from June 2012 to December 2013. During this period, 305 patients having a duration of hospitalization equal or more than 48 hours were included in the study. In terms of the incidence of healthcare associated infections, nosocomial pneumonia occupied the first position with a cumulative incidence rate of 20.0%, followed by bacteremia (5.6%), central venous catheter infections (4%), and urinary tract infections (3%). In the case of isolated microorganisms, Gram-negative bacilli not enterobacteriaceae occupied the first place with 48.5%, followed by enterobacteria (32.1%). Acinetobacter baumannii was the most common germ (27.6%). Our study showed that the rate of health-care-associated infections was relatively high in the intensive care unit. A control program to reduce all infections is a priority for the Infection Control Associated Committee.

Keywords: epidemiological profile, healthcare associated infections, intensive care units, teaching hospital of Oran, Algeria

Procedia PDF Downloads 279
1476 The Role of Sexual Satisfaction Sexual Satisfaction in Marital Satisfaction Married Men

Authors: Maghsoud Nader Pilehroud, Mohmmad Alizadeh, Soheila Golipour, Sedigeh Tajabadipour

Abstract:

Aim: in terms of importance, sexual issues are of the highest priority in married life issues and sexual compatibility is of the most important reasons of success in married life and consequently marital satisfaction.the present research was conducted with the aim of The role of sexual satisfaction sexual satisfaction in marital satisfaction married men. Study Design: this research is descriptive and is of correlation type.Method: The statistical population includes all the married men of Ardebil city out of which, 60 men were chosen using random sampling as the research samples. The research instruments were ENRICH couple scale and Hudson sexual satisfaction scale. The findings were analyzed using descriptive statistics method (mean and standard deviation) and inferential statistics (Pearson's correlation and regression) and SPSS-16 software. Results: the results showed that sexual satisfaction has a positive and significant relationship with marital satisfaction and all of its components, and that sexual satisfaction can predict marital satisfaction. The results also showed that sexual and marital satisfaction, are not significantly related to any of the variables of education level, duration of marriage and number of children. conclusion: according to the results, it can be claimed that sexual skills training for couples can be influential at increasing their martial satisfaction, and that also, sexual satisfaction has an important role in marital satisfaction.

Keywords: sexual satisfaction, marital satisfaction, married men, Iran

Procedia PDF Downloads 127
1475 Assessment of Air Pollution Impacts On Population Health in Béjaia City

Authors: Benaissa Fatima, Alkama Rezak, Annesi-Maesano Isabella

Abstract:

To assess the health impact of the air pollution on the population of Béjaia, we carried out a descriptive epidemiologic inquiry near the medical establishments of three areas. From the registers of hospital admissions, we collected data on the hospital mortality and admissions relating to the various cardiorespiratory pathologies generated by this type of pollution. In parallel, data on the automobile fleet of Bejaia and other measurements were exploited to show that the concentrations of the pollutants are strongly correlated with the concentration the urban traffic. This study revealed that the whole of the population is touched, but the sensitivity to pollution can show variations according to the age, the sex and the place of residence. So the under population of the town of Bejaia marked the most raised death and morbidity rates, followed that of Kherrata. Weak rates are recorded for under rural population of Feraoun. This approach enables us to conclude that the population of Béjaia could not escape the urban pollution generated by her old automobile fleet. To install a monitoring and measuring site of the air pollution in this city could provide a beneficial tool to protect its inhabitants by them informing on quality from the air that they breathe and measurements to follow to minimize the impacts on their health and by alerting the authorities during the critical situations.

Keywords: air, urban pollution, health, impacts

Procedia PDF Downloads 335
1474 Economic Growth through Quality in Higher Education

Authors: Mohammad Mushir Khan, C. Satyanarayana

Abstract:

Education is considered as one of the prime bottlenecks in the economic growth of India. The Ministry of Human Resource & Development, Government of India has, therefore, given special attention to this issue and the Gross Enrollment Ratio (GER) in Higher Education has increased marginally during last five years, with the efforts and various policy decisions like Right to Education (RTE) and other fee reimbursement schemes, initiated by the State Governments. But still this is one of the lowest, if assessed at the global level. It is true that the GER has improved but the survey reveals that the quality has been badly affected. This paper tries to assess the impact of lack of quality education in various sectors that affects Indian Economy and thereby signifies the need of immediate policy decision at the government level. It is to be noted that in higher education, science, management, engineering and technology plays vital role as far as shaping country’s economy is concerned and as such the quality needs to be addressed, particularly, in these streams. The paper, after carefully studying lots of survey reports and other government/ non-government documents recommends measures to be initiated by the Central Government, on priority, for improving quality of education. The quality up-gradation in higher education single handedly provides real fuel to the India’s growth Engine, as it has potential to touch each and every sector that strengthens country’s economy.

Keywords: higher education, economy, accreditation, industry, technology

Procedia PDF Downloads 402
1473 The Role of Named Entity Recognition for Information Extraction

Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov

Abstract:

Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.

Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area

Procedia PDF Downloads 57
1472 Contractual Complexity and Contract Parties' Opportunistic Behavior in Construction Projects: In a Contractual Function View

Authors: Mengxia Jin, Yongqiang Chen, Wenqian Wang, Yu Wang

Abstract:

The complexity and specificity of construction projects have made common opportunism phenomenon, and contractual governance for opportunism has been a topic of considerable ongoing research. Based on TCE, the research distinguishes control and coordination as different functions of the contract to investigate their complexity separately. And in a nuanced way, the dimensionality of contractual control is examined. Through the analysis of motivation and capability of strong or weak form opportunism, the framework focuses on the relationship between the complexity of above contractual dimensions and different types of opportunistic behavior and attempts to verify the possible explanatory mechanism. The explanatory power of the research model is evaluated in the light of empirical evidence from questionnaires. We collect data from Chinese companies in the construction industry, and the data collection is still in progress. The findings will speak to the debate surrounding the effects of contract complexity on opportunistic behavior. This nuanced research will derive implications for research on the role of contractual mechanisms in dealing with inter-organizational opportunism and offer suggestions for curbing contract parties’ opportunistic behavior in construction projects.

Keywords: contractual complexity, contractual control, contractual coordinatio, opportunistic behavior

Procedia PDF Downloads 363
1471 Computer-Aided Diagnosis of Polycystic Kidney Disease Using ANN

Authors: G. Anjan Babu, G. Sumana, M. Rajasekhar

Abstract:

Many inherited diseases and non-hereditary disorders are common in the development of renal cystic diseases. Polycystic kidney disease (PKD) is a disorder developed within the kidneys in which grouping of cysts filled with water like fluid. PKD is responsible for 5-10% of end-stage renal failure treated by dialysis or transplantation. New experimental models, application of molecular biology techniques have provided new insights into the pathogenesis of PKD. Researchers are showing keen interest for developing an automated system by applying computer aided techniques for the diagnosis of diseases. In this paper a multi-layered feed forward neural network with one hidden layer is constructed, trained and tested by applying back propagation learning rule for the diagnosis of PKD based on physical symptoms and test results of urinanalysis collected from the individual patients. The data collected from 50 patients are used to train and test the network. Among these samples, 75% of the data used for training and remaining 25% of the data are used for testing purpose. Furthermore, this trained network is used to implement for new samples. The output results in normality and abnormality of the patient.

Keywords: dialysis, hereditary, transplantation, polycystic, pathogenesis

Procedia PDF Downloads 358
1470 Identifying Understanding Expectations of School Administrators Regarding School Assessment

Authors: Eftah Bte. Moh Hj Abdullah, Izazol Binti Idris, Abd Aziz Bin Abd Shukor

Abstract:

This study aims to identify the understanding expectations of school administrators concerning school assessment. The researcher utilized a qualitative descriptive study on 19 administrators from three secondary schools in the North Kinta district. The respondents had been interviewed on their understanding expectations of school assessment using the focus group discussion method. Overall findings showed that the administrators’ understanding expectations of school assessment was weak; especially in terms of content focus, articulation across age and grade, transparency and fairness, as well as the pedagogical implications. Findings from interviews indicated that administrators explained their understanding expectations of school assessment from the aspect of school management, and not from the aspect of instructional leadership or specifically as assessment leaders. The study implications from the administrators’ understanding expectations may hint at the difficulty of the administrators to function as assessment leaders, in order to reduce their focus as manager, and move towards their primary role in the process of teaching and learning. The administrator, as assessment leaders, would be able to reach assessment goals via collaboration in identifying and listing teacher assessment competencies, how to construct assessment capacity, how to interpret assessment correctly, the use of assessment and how to use assessment information to communicate confidently and effectively to the public.

Keywords: assessment leaders, assessment goals, instructional leadership, understanding expectation of assessment

Procedia PDF Downloads 432
1469 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System

Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav

Abstract:

The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.

Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization

Procedia PDF Downloads 366
1468 Automatic Assignment of Geminate and Epenthetic Vowel for Amharic Text-to-Speech System

Authors: Tadesse Anberbir, Bankole Felix, Tomio Takara

Abstract:

In the development of a text-to-speech synthesizer, automatic derivation of correct pronunciation from the grapheme form of a text is a central problem. Particularly deriving phonological features which are not shown in orthography is challenging. In the Amharic language, geminates and epenthetic vowels are very crucial for proper pronunciation, but neither is shown in orthography. In this paper, to proposed and integrated a morphological analyzer into an Amharic Text-to-Speech system, mainly to predict geminates and epenthetic vowel positions and prepared a duration modeling method. Amharic Text-to-Speech system (AmhTTS) is a parametric and rule-based system that adopts a cepstral method and uses a source filter model for speech production and a Log Magnitude Approximation (LMA) filter as the vocal tract filter. The naturalness of the system after employing the duration modeling was evaluated by sentence listening test, and we achieved an average Mean Opinion Score (MOS) 3.4 (68%), which is moderate. By modeling the duration of geminates and controlling the locations of epenthetic vowel, we are able to synthesize good quality speech. Our system is mainly suitable to be customized for other Ethiopian languages with limited resources.

Keywords: amharic, gemination, Speech synthesis, morphology, epenthesis

Procedia PDF Downloads 61
1467 A Method for the Extraction of the Character's Tendency from Korean Novels

Authors: Min-Ha Hong, Kee-Won Kim, Seung-Hoon Kim

Abstract:

The character in the story-based content, such as novels and movies, is one of the core elements to understand the story. In particular, the character’s tendency is an important factor to analyze the story-based content, because it has a significant influence on the storyline. If readers have the knowledge of the tendency of characters before reading a novel, it will be helpful to understand the structure of conflict, episode and relationship between characters in the novel. It may therefore help readers to select novel that the reader wants to read. In this paper, we propose a method of extracting the tendency of the characters from a novel written in Korean. In advance, we build the dictionary with pairs of the emotional words in Korean and English since the emotion words in the novel’s sentences express character’s feelings. We rate the degree of polarity (positive or negative) of words in our emotional words dictionary based on SenticNet. Then we extract characters and emotion words from sentences in a novel. Since the polarity of a word grows strong or weak due to sentence features such as quotations and modifiers, our proposed method consider them to calculate the polarity of characters. The information of the extracted character’s polarity can be used in the book search service or book recommendation service.

Keywords: character tendency, data mining, emotion word, Korean novel

Procedia PDF Downloads 318
1466 The Constitution of Kenya, 2010, and the Feminist Legal Theory

Authors: Tecla Rita Karendi, Andy Cons Matata

Abstract:

Although before and at the advent of colonial administration, several women such as Mekatilili wa Menza and Muthoni Nyanjiru took up leadership positions in resisting the colonial administration. Kenya is generally considered a patriarchal society. Many women who tried to take up positions of leadership in postcolonial Kenya, such as the Nobel Prize winner Wangari Maathai, were branded as prostitutes or generally immoral women. However, the Constitution of Kenya, 2010, has since made a huge impact not only in the area of affirmative action but also in various aspects of the feminist legal theory such as the constitutional requirement that no more than two-thirds of the members of the elective or appointive bodies should be of the same gender. This favours women who are often sidelined in elective posts such as parliament or county assemblies and state-appointed posts in the parastatals and commissions. The constitution also recognizes the right to abortion, which was outrightly outlawed in the independence constitution. Certain practices adverse to women’s health, such as wife inheritance, female genital mutilation, and property rights, are either outlawed or framed to recognized women’s rights. The education of the girl-child is also now considered a priority, unlike in the past. Despite these developments, a lot remains to be done.

Keywords: feminist legal theory, constitution of Kenya, 2010, affirmative action, leadership

Procedia PDF Downloads 186
1465 Carl Schmitt in the Age of Immanence: A Critical Reading

Authors: Manuel Iretzberger

Abstract:

This paper aims to uncover the ideological aspects in the political thought of Carl Schmitt, who is enjoying an ever-increasing popularity in various academic fields, following in the wake of rising interest in questions of sovereignty and legitimacy. Given Schmitt’s biography, i.e. his role as the ‘Crown Jurist of the Third Reich’ (Gurian), an extraordinarily thorough examination is necessary; however, instead of merely ‘deconstructing’ his works, certain ontological truths he might have attained, shall be taken seriously. To this end, his notions of politics and the state of exception are scrutinized, which are indeed considered intriguing, yet prove to be enigmatic and impalpable at the core when read closely. In order to explain this conjuncture, both Schmitt’s philosophy of history and his ‘secret discussion’ (Agamben) with Walter Benjamin are depicted. As it turns out – it is argued – his concept of the Political has to be conceived of as embedded in a much broader context: In a post-transcendental, immanent age, he regards traditional modes of representation as no longer feasible and clings to authoritarianism as a surrogate – his Catholicism plays a decisive role here, forcing him to inject normatively biased assumptions into his political writings. Seeing Schmitt perform ‘rearguard action’ not only serves to disarm his work of most of its menacing aura, it also allows drawing conclusions about ways of legitimatizing democratic rule in modern times, as the paper tries to outline in its last section.

Keywords: Benjamin, history, immanence, Schmitt, sovereignty

Procedia PDF Downloads 272
1464 Public Interest Law for Gender Equality: An Exploratory Study of the 'Single Woman Reproductive Rights' Movement in China

Authors: Xiaofei Zhu

Abstract:

As a 'weapon of the weak', the Public Interest Law can provide a better perspective for the cause of gender justice. In recent years, the legal practice of single female reproductive rights in China has already possessed the elements of public interest law activities and the possibility of public interest law operation. Through the general operating procedures of public interest law practice, that is, from the choice of subject, the planning of the case, the operation of the strategy and the later development, the paper analyzes the gains and losses of the legal practice of single female reproductive rights in China, and puts forward some ideas on its possible operation path. On this basis, it is believed that the cause of women's rights should be carried out under the broad human rights perspective; it is necessary to realize the particularity of different types of women's rights protection practice; the practice of public interest law needs to accurately grasp the constituent elements of all aspects of the case, and strive to find the opportunities of institutional and social change; the practice of public welfare law of gender justice should be carried out from a long-term perspective.

Keywords: single women’s reproductive rights, public interest law, gender justice, legal strategies, legal change

Procedia PDF Downloads 119
1463 Access to Climate Change Information Through the Implementation of the Paris Agreement

Authors: Ana Cristina A. P. Carvalho, Solange Teles Da Silva

Abstract:

In April, 174 countries signed the Paris Agreement, a multilateral agreement on climate change which deals with greenhouse gas emissions, mitigation, adaptation, finance, access to information, transparency, among other subjects related to the environment. Since then, Parties shall cooperate in taking measures, as appropriate, to enhance climate change education, training, public awareness, public participation and public access to information, recognizing the importance of these steps with respect to enhancing actions under this Agreement. This paper aims to analyze the consequences of this new rule in terms of the implementation of the Agreement, collecting data from Brazilian and Canadian legislations in order to identify if these countries have rules complying with the Treaty, the steps that have been already taken and if they could be used as examples for other countries. The analysis will take into consideration the different kinds of climate change information, means of transparency, reliability of the data and how to spread the information. The methodology comprehends a comparative legal research based on both the Paris Agreement and domestic laws of Brazil and Canada, as well as on doctrine and Court decisions. The findings can contribute to the implementation of the Paris Agreement through compliance with this Treaty at countries’ domestic and policy level.

Keywords: climate change information, domestic legislation, Paris Agreement, public policy

Procedia PDF Downloads 278