Search results for: personal authentication
1321 Needs Assessment of Barangay Health Workers in Delivering Health Care Services: Basis for Communication Planning
Authors: Ivan N. Gallegos, Merle Dawn Comidoy, Mira Sol Cabal, Paul Martin Acol, Arnie Polistico
Abstract:
Barangay Health Workers (BHWs) are the lead health advocates who provide basic health care services at the grass-roots level. Hence, adequate skills and training are needed to deliver these services effectively. The study aimed at identifying the communication needs of Barangay health workers situated at the dumpsite of Davao City, Philippines, gravitating towards designing a communication plan tailor-fitted to their needs. It employed a qualitative research design, particularly an in-depth interview of the health workers. Several communication problems were identified, including the lack of participation of BHWs in the Barangay development plan, the lack of a continuous skills enhancement program, ineffective communication strategies resulting in insufficient knowledge of proper personal hygiene, and the inactive participation of community members in health services. Based on these communication problems, the following activities and training were suggested: capacitating BHWs on writing proposals and plans; basic communication skills training; educational seminars for parents; and a sanitation campaign.Keywords: communication planning, health care services, Barangay health workers, communication strategies
Procedia PDF Downloads 841320 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 4141319 A quantitative Analysis of Impact of Potential Variables on the Energy Performance of Old and New Buildings in China
Authors: Yao Meng, Mahroo Eftekhari, Dennis Loveday
Abstract:
Currently, there are two types of heating systems in Chinese residential buildings, with respect to the controllability of the heating system, one is an old heating system without any possibility of controlling room temperature and another is a new heating system that provides temperature control of individual rooms. This paper is aiming to evaluate the impact of potential variables on the energy performance of old and new buildings respectively in China, and to explore how the use of individual room temperature control would change occupants’ heating behaviour and thermal comfort in Chinese residential buildings and its impact on the building energy performance. In the study, two types of residential buildings have been chosen, the new building install personal control on the heating system, together with ‘pay for what you use’ tariffs. The old building comprised uncontrolled heating with payment based on floor area. The studies were carried out in each building, with a longitudinal monitoring of indoor air temperature, outdoor air temperature, window position. The occupants’ behaviour and thermal sensation were evaluated by questionnaires. Finally, use the simulated analytic method to identify the impact of influence variables on energy use for both types of buildings.Keywords: residential buildings, China, design parameters, energy efficiency, simulation analytics method
Procedia PDF Downloads 5511318 The Influence of Wasta on Employees and Organizations in Kuwait
Authors: Abrar Al-Enzi
Abstract:
This study investigates the role of the popular utilization of Wasta within Arab societies. Wasta, by definition, is a set of personal networks based on family or kinship ties in which power and influence are utilized to get things done. As Wasta evolved, it became intensely rooted in Arab cultures, which is considered as an intrinsic tool of the culture, a method of doing business transactions and as a family obligation. However, the consequences related to Wasta in business are substantial as it impacts organizational performance, employee’s perception of the organization and the atmosphere between employees. To date, there has been little in-depth organizational research on the impact of Wasta. Hence, the question that will be addressed is: Does Wasta influence human resource management, knowledge sharing and innovation in Kuwait, which in turn affects employees’ commitment within organizations? As a result, a mixed method sequential exploratory research design will be used to examine the mentioned subject, which consists of three phases: (1) Doing some initial exploratory interviews; (2) Developing a paper-based and online survey (Quantitative method) based on the findings; (3) Lastly, following up with semi-structured interviews (Qualitative method). The rationale behind this approach is that both qualitative and quantitative methods complement each other by providing a more complete picture of the subject matter.Keywords: commitment, HRM practices, social capital, Wasta
Procedia PDF Downloads 2611317 Design Guidelines for an Enhanced Interaction Experience in the Domain of Smartphone-Based Applications for Sport and Fitness
Authors: Paolo Pilloni, Fabrizio Mulas, Salvatore Carta
Abstract:
Nowadays, several research studies point up that an active lifestyle is essential for physical and mental health benefits. Mobile phones have greatly influenced people’s habits and attitudes also in the way they exercise. Our research work is mainly focused on investigating how to exploit mobile technologies to favour people’s exertion experience. To this end, we developed an exertion framework users can exploit through a real world mobile application, called BLINDED, designed to act as a virtual personal trainer to support runners during their trainings. In this work, inspired by both previous findings in the field of interaction design for people with visual impairments, feedback gathered from real users of our framework, and positive results obtained from two experimentations, we present some new interaction facilities we designed to enhance the interaction experience during a training. The positive obtained results helped us to derive some interaction design recommendations we believe will be a valid support for designers of future mobile systems conceived to be used in circumstances where there are limited possibilities of interaction.Keywords: human computer interaction, interaction design guidelines, persuasive mobile technologies for sport and health
Procedia PDF Downloads 5321316 A System Dynamics Approach to Exploring Personality Traits in Young Children
Authors: Misagh Faezipour
Abstract:
System dynamics is a systems engineering approach that can help address the complex challenges in different systems. Little is known about how the brain represents people to predict behavior. This work is based on how the brain simulates different personal behavior and responds to them in the case of young children ages one to five. As we know, children’s minds/brains are just as clean as a crystal, and throughout time, in their surroundings, families, and education center, they grow to develop and have different kinds of behavior towards the world and the society they live in. Hence, this work aims to identify how young children respond to various personality behavior and observes their reactions towards them from a system dynamics perspective. We will be exploring the Big Five personality traits in young children. A causal model is developed in support of the system dynamics approach. These models graphically present the factors and factor relationships that contribute to the big five personality traits and provide a better understanding of the entire behavior model. A simulator will be developed that includes a set of causal model factors and factor relationships. The simulator models the behavior of different factors related to personality traits and their impacts and can help make more informed decisions in a risk-free environment.Keywords: personality traits, systems engineering, system dynamics, causal model, behavior model
Procedia PDF Downloads 961315 Self-Perceived Employability of Students of International Relations of University of Warmia and Mazury in Poland
Authors: Marzena Świgoń
Abstract:
Nowadays, graduates should be prepared for serious challenges in the internal and external labor market. The notion that a degree is a “passport to employment” has been relegated to the past. In the last few years a phenomenon in the form of the increasing unemployment of highly educated young people in EU countries, including Poland has been observed. Empirical studies were conducted among Polish students in the scope of the so-called self-perceived employability review. In this study, a special scale was used which consisted of 19 statements regarding five components: student’s perception of university; field of study; self-belief; state of the external labor market; and, personal knowledge management. The respondent group consisted of final-year master’s students of International Relations at the University of Warmia and Mazury in Olsztyn, Poland. The findings of the empirical studies were compiled using statistical methods: descriptive statistics and inferential statistics. In general, in light of the conducted studies, the self-perceived employability of the Polish students was not high. Limitations of the studies were discussed, as well as the implications for future research in the scope of the students’ employability.Keywords: self-perceived employability, students of international relations, university students, students employability
Procedia PDF Downloads 3401314 Impact of Marketing towards Behavior Intention
Authors: Sathyamangalam Rangasamy Guru Prasath
Abstract:
Due to the increasing homogeneity in product offerings, the attendant services provided are emerging as a key differentiator in the mind of the consumers. Services marketing are a sub field of marketing which covers the marketing of both goods and services. Service marketing differs from product marketing due to the face that services are intangible and typically require personal interaction with the customer. Relationships are a key factor when it comes to the marketing of services. The role of interpersonal relationships distinguishes service and product marketing in strategic vision and organizational considerations. This paper explores some of the trends in service marketing as they relate to strategic vision, operational and organizational changes, and marketing tactics. The presence of the customer in the service facility means that capacity management becomes an important driver of the firm’s profitability service marketing is a process from the organization’s point of view, but an experience from the customer’s perspective. The quality of the experience is a function of the careful design of customer service processes, adoption of standardized procedures, rigorous management of service quality, high standards of training and automation. Services marketing helps to ensure that these processes are designed from the customer’s perspective. Services marketing includes customer loyalty, managing relationships, complaint handling, improving service quality and productivity of service operations, and how to become a service leader in your industry.Keywords: customer perspective, product marketing, service marketing, rigorous management
Procedia PDF Downloads 3701313 Prosody of Text Communication: Inducing Synchronization and Coherence in Chat Conversations
Authors: Karolina Ziembowicz, Andrzej Nowak
Abstract:
In the current study, we examined the consequences of adding prosodic cues to text communication by allowing users to observe the process of message creation while engaged in dyadic conversations. In the first condition, users interacted through a traditional chat that requires pressing ‘enter’ to make a message visible to an interlocutor. In another, text appeared on the screen simultaneously as the sender was writing it, letter after letter (Synchat condition), so that users could observe the varying rhythm of message production, precise timing of message appearance, typos and their corrections. The results show that the ability to observe the dynamics of message production had a twofold effect on the social interaction process. First, it enhanced the relational aspect of communication – interlocutors synchronized their emotional states during the interaction, their communication included more statements on relationship building, and they evaluated the Synchat medium as more personal and emotionally engaging. Second, it increased the coherence of communication, reflected in greater continuity of the topics raised in Synchat conversations. The results are discussed from the interaction design (IxD) perspective.Keywords: chat communication, online conversation, prosody, social synchronization, interaction incoherence, relationship building
Procedia PDF Downloads 1411312 The Analysis of One Million Reddit Confessions Corpus: The Use of Emotive Verbs and First Person Singular Pronoun as Linguistic Psychotherapy Features
Authors: Natalia Wojarnik
Abstract:
The paper aims to present the analysis of a Reddit confessions corpus. The interpretation focuses on the use of emotional language, in particular emotive verbs, in the context of personal pronouns. The analysis of the linguistic properties answers the question of what the Reddit users confess about and who is the subject of confessions. The study reveals that the specific language patterns used in Reddit confessions reflect the language of depression and the language used by patients during different stages of their psychotherapy sessions. The paper concludes that Reddit users are more willing to confess about their own experiences, not rarely very private and intimate, extensively using the first person singular pronoun I. It indicates that the Reddit users use the language of depression and the language used by psychotherapy patients. The language they use is very emotionally impacted and includes many emotive verbs such as want, feel, need, hate, love. This finding in Reddit confessions correlates with the extensive use of stative affective verbs in the first stages of the psychotherapy sessions. Lastly, the paper refers to the positive and negative lexicon and helps determine how online posts can serve as a depression detector and “talking cure” for the users.Keywords: confessions, emotional language, emotive verbs, pronouns, first person pronoun, language of depression, depression detection, psychotherapy language
Procedia PDF Downloads 1191311 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)
Authors: Dilip Singh Sisodia, Shrish Verma
Abstract:
Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework
Procedia PDF Downloads 3481310 Implementation of a Photo-Curable 3D Additive Manufacturing Technology with Grey Capability by Using Piezo Ink-jets
Authors: Ming-Jong Tsai, Y. L. Cheng, Y. L. Kuo, S. Y. Hsiao, J. W. Chen, P. H. Liu, D. H. Chen
Abstract:
The 3D printing is a combination of digital technology, material science, intelligent manufacturing and control of opto-mechatronics systems. It is called the third industrial revolution from the view of the Economist Journal. A color 3D printing machine may provide the necessary support for high value-added industrial and commercial design, architectural design, personal boutique, and 3D artist’s creation. The main goal of this paper is to develop photo-curable color 3D manufacturing technology and system implementation. The key technologies include (1) Photo-curable color 3D additive manufacturing processes development and materials research (2) Piezo type ink-jet head control and Opto-mechatronics integration technique of the photo-curable color 3D laminated manufacturing system. The proposed system is integrated with single Piezo type ink-jet head with two individual channels for two primary UV light curable color resins which can provide for future colorful 3D printing solutions. The main research results are 16 grey levels and grey resolution of 75 dpi.Keywords: 3D printing, additive manufacturing, color, photo-curable, Piezo type ink-jet, UV Resin
Procedia PDF Downloads 5611309 Discussion of Leadership Styles and Performance Management in MNEs
Authors: Yin-Tsuo Huang
Abstract:
Most leadership theories focus on leader's development. However, in reality, the led is also very important in the leadership process. Development relates to ensure the individual to grow in the skills, knowledge, and abilities to perform at leaders’ highest possible level now and for the future. The topic area of the relationships among leadership styles, subordinate maturity, and information distinction was identified because it is a practical problem and personal experiences occurring in multinational enterprises. Some questions to be answered through this critical analysis of the literature are: (1) What are the effective leadership styles in the leader-member and member-member relationships? (2) How do the subordinates react to leaders’ managerial style? (3) What are the relationships among leadership styles, subordinate maturity, and resulting information distinction? (4) What kinds of information distinction effects the relationships between leadership styles and subordinate maturity? (5) Where do leaders and subordinates can get information, and how? (6) In what areas are leaders’ or subordinates’ knowledge weakest, and how can they get others to prove the information they need? (7) How important is that information to the subordinates? (8) Do the leaders keep too much information for their subordinates because it is inconvenient? The main purpose of this review is to explore the theoretical and empirical literature about the relationships among leadership style, subordinates maturity, and information distinction implications in multinational Taiwanese organizations to identify areas of future scholarly inquiry.Keywords: leadership style, subordinate maturity, information distinction, multinational organization
Procedia PDF Downloads 5131308 Fear and Anxiety among School Age Children Undergoing Dental Treatment in an Oral Health Unit
Authors: Maha Ibrahim Mohamed Khalifa
Abstract:
Background: Dental fear and anxiety lead to avoidance of dental treatment and deterioration of oral health. Aim of the study: To assess the levels of fear and anxiety among school-age children undergoing dental treatment. Setting: The study was conducted in Outpatient Dental Clinics at Benha Teaching Hospital. Research design: A descriptive research design was utilized to conduct the study. Sample: A purposive sample of 60 school-age children and their mothers attending at the previously mentioned setting was included. Tools: Three tools were used: Tool one: A structured interviewing questionnaire for Personal characteristics of children and their mothers. Tool two: Dental Subscale of Children's Fear Survey Schedule (CFSS-DS). Tool three: Modified Dental Anxiety Scale (MDAS). Results: It was illustrated that more than two-fifths (43.3%) of children had maximum fear and more than half of children (53.3%) had maximal anxiety. Conclusion: Many school-age children undergoing dental treatment suffer from high levels of fear and anxiety. Recommendations: The study recommended further research should be conducted to assess levels of fear and anxiety among children undergoing dental treatments and preferable nursing interventions for reducing their fears and anxieties.Keywords: fear, anxiety, children, dental treatment
Procedia PDF Downloads 881307 A Witty Relief Ailment Based on the Integration of IoT and Cloud
Authors: Sai Shruthi Sridhar, A. Madhumidha, Kreethika Guru, Priyanka Sekar, Ananthi Malayappan
Abstract:
Numerous changes in technology and its recent development are structuring long withstanding effect to our world, one among them is the emergence of “Internet of Things” (IoT). Similar to Technology world, one industry stands out in everyday life–healthcare. Attention to “quality of health care” is an increasingly important issue in a global economy and for every individual. As per WHO (World Health Organization) it is estimated to be less than 50% adhere to the medication provided and only about 20% get their medicine on time. Medication adherence is one of the top problems in healthcare which is fixable by use of technology. In recent past, there were minor provisions for elderly and specially-skilled to get motivated and to adhere medicines prescribed. This paper proposes a novel solution that uses IOT based RFID Medication Reminder Solution to provide personal health care services. This employs real time tracking which offer quick counter measures. The proposed solution builds on the recent digital advances in sensor technologies, smart phones and cloud services. This novel solution is easily adoptable and can benefit millions of people with a direct impact on the nation’s health care expenditure with innovative scenarios and pervasive connectivity.Keywords: cloud services, IoT, RFID, sensors
Procedia PDF Downloads 3471306 Force Sensing Resistor Testing of Hand Forces and Grasps during Daily Functional Activities in the Covid-19 Pandemic
Authors: Monique M. Keller, Roline Barnes, Corlia Brandt
Abstract:
Introduction Scientific evidence on the hand forces and the types of grasps measurement during daily tasks are lacking, leaving a gap in the field of hand rehabilitation and robotics. Measuring the grasp forces and types produced by the individual fingers during daily functional tasks is valuable to inform and grade rehabilitation practices for second to fifth metacarpal fractures with robust scientific evidence. Feix et al, 2016 identified the most extensive and complete grasp study that resulted in the GRASP taxonomy. Covid-19 virus changed data collection across the globe and safety precautions in research are essential to ensure the health of participants and researchers. Methodology A cross-sectional study investigated six healthy adults aged 20 to 59 years, pilot participants’ hand forces during 105 tasks. The tasks were categorized into five sections namely, personal care, transport and moving around, home environment and inside, gardening and outside, and office. The predominant grasp of each task was identified guided by the GRASP Taxonomy. Grasp forces were measured with 13mm force-sensing resistors glued onto a glove attached to each of the dominant and non-dominant hand’s individual fingers. Testing equipment included Flexiforce 13millimetres FSR .5" circle, calibrated prior to testing, 10k 1/4w resistors, Arduino pro mini 5.0v – compatible, Esp-01-kit, Arduino uno r3 – compatible board, USB ab cable - 1m, Ftdi ft232 mini USB to serial, Sil 40 inline connectors, ribbon cable combo male header pins, female to female, male to female, two gloves, glue to attach the FSR to glove, Arduino software programme downloaded on a laptop. Grip strength measurements with Jamar dynamometer prior to testing and after every 25 daily tasks were taken to will avoid fatigue and ensure reliability in testing. Covid-19 precautions included wearing face masks at all times, screening questionnaires, temperatures taken, wearing surgical gloves before putting on the testing gloves 1.5 metres long wires attaching the FSR to the Arduino to maintain social distance. Findings Predominant grasps observed during 105 tasks included, adducted thumb (17), lateral tripod (10), prismatic three fingers (12), small diameter (9), prismatic two fingers (9), medium wrap (7), fixed hook (5), sphere four fingers (4), palmar (4), parallel extension (4), index finger extension (3), distal (3), power sphere (2), tripod (2), quadpod (2), prismatic four fingers (2), lateral (2), large-diameter (2), ventral (2), precision sphere (1), palmar pinch (1), light tool (1), inferior pincher (1), and writing tripod (1). Range of forces applied per category, personal care (1-25N), transport and moving around (1-9 N), home environment and inside (1-41N), gardening and outside (1-26.5N), and office (1-20N). Conclusion Scientifically measurements of finger forces with careful consideration to types of grasps used in daily tasks should guide rehabilitation practices and robotic design to ensure a return to the full participation of the individual into the community.Keywords: activities of daily living (ADL), Covid-19, force-sensing resistors, grasps, hand forces
Procedia PDF Downloads 1901305 Effectiveness of Homoeopathic Medicine Conium Maculatum 200 C for Management of Pyuria
Authors: Amir Ashraf
Abstract:
Homoeopathy is an alternative system of medicine discovered by German physician Samuel Hahnemann in 1796. It has been used by several people for various health conditions globally for more than last 200 years. In India, homoeopathy is considered as a major system of alternative medicine. Homoeopathy is found effective in various medical conditions including Pyuria. Pyuria is the condition in which pus cells are found in urine. Homoeopathy is very useful for reducing pus cells, and homeopathically potentized Conium Mac (Hemlock) is an important remedy commonly used for reducing pyuria. Aim: To reduce the amount pus cells found in urine using Conium Mac 200C. Methods: Design. Small N Design. Samples: Purposive Sampling with 5 cases diagnosed as pyuria. Tools: Personal Data Schedule and ICD-10 Criteria for Pyuria. Techniques: Potentized homoeopathic medicine, Conium Mac 200th potency is used. Statistical Analysis: The statistical analyses were done using non-parametric tests. Results: There is significant pre/post difference has been identified. Conclusion: Homoeopathic potency, Conium Mac 200 C is effective in reducing the increased level of pus cells found in urine samples.Keywords: homoeopathy, alternative medicine, Pyuria, Conim Mac, small N design, non-parametric tests, homeopathic physician, Ashirvad Hospital, Kannur
Procedia PDF Downloads 3351304 Women Hashtactivism: Civic Engagement in Saudi Arabia
Authors: Mohammed Ibahrine
Abstract:
One of the prominent trends in the Saudi digital space in recent years is the boom in the use of social networking sites such as Facebook, YouTube, and Twitter. As of 2016, Twitter has over six million users in Saudi Arabia. In the wake of the recent political instability in the Arab region, digital platforms have gained importance for both, personal and professional purposes. A conspicuously observable tide of social activism has risen, with Twitter playing an increasingly important role. One of their primary goals is to enforce the logic of public visibility, social mobility and civic participation in the Saudi society. Saudi women use Twitter to disseminate specific and relevant information and promote their social agenda that remained unrecognized and invisible in the mainstream media and thus in the public sphere. The question is to what extent does Twitter empower Saudi women or reinforces their social immobility and invisibility? This paper focuses on three kinds of empowerment through Twitter in the religiously conservative and socially patriarchal Saudi society. It traces and analyses how Saudi female hashtactivism is increasingly becoming a site of struggle over visibility, mobility, control, and civic participation. The underlying thesis is that Twitter makes a contribution to the development of participatory culture, especially in the lives of women.Keywords: civic, hashtactivism, Saudi Arabia, Twiterverse
Procedia PDF Downloads 3231303 Open Minds but Closed Access: Why Are There so Few Gold Open Access LIS Journals And Why Are so Many Librarians Unwilling to Unlock Their Scholarship?
Authors: Sarah Baker, Jayati Chaudhuri
Abstract:
Librarians have embraced the open access movement in all disciplines but their own. They are strong advocates on college campuses and curate institutional repositories, yet there are surprisingly few open access LIS journals. Presenters evaluated the open access availability of library and information science literature. After analyzing the top 100 library science journals (the top 50 journals from Scimago and JCR) and finding very few gold open access journals, they then investigated the availability of open access articles from the top 10 closed access journals. Presenters would like to generate a conversation on what type of proactive approach librarians can take to increase open access to literature within our discipline. Librarians like their colleagues in other disciplines are not motivated to submit their articles to their institutional repositories. Presenters have found a similar reluctance from their fellow colleagues regarding open access initiatives on campus. Presenters will describe Open Access Week activities as part of a campus-wide initiative and share some faculty comments, concerns, and misconceptions that came up as a part of this dialog. Presenters will discuss their personal experiences providing access to faculty publications through the California State University Los Angeles institutional repository.Keywords: faculty scholarship, institutional repositories, library and information science journals, open access
Procedia PDF Downloads 3311302 Massively Parallel Sequencing Improved Resolution for Paternity Testing
Authors: Xueying Zhao, Ke Ma, Hui Li, Yu Cao, Fan Yang, Qingwen Xu, Wenbin Liu
Abstract:
Massively parallel sequencing (MPS) technologies allow high-throughput sequencing analyses with a relatively affordable price and have gradually been applied to forensic casework. MPS technology identifies short tandem repeat (STR) loci based on sequence so that repeat motif variation within STRs can be detected, which may help one to infer the origin of the mutation in some cases. Here, we report on one case with one three-step mismatch (D18S51) in family trios based on both capillary electrophoresis (CE) and MPS typing. The alleles of the alleged father (AF) are [AGAA]₁₇AGAG[AGAA]₃ and [AGAA]₁₅. The mother’s alleles are [AGAA]₁₉ and [AGAA]₉AGGA[AGAA]₃. The questioned child’s (QC) alleles are [AGAA]₁₉ and [AGAA]₁₂. Given that the sequence variants in repeat regions of AF and mother are not observed in QC’s alleles, the QC’s allele [AGAA]₁₂ was likely inherited from the AF’s allele [AGAA]₁₅ by loss of three repeat [AGAA]. Besides, two new alleles of D18S51 in this study, [AGAA]₁₇AGAG[AGAA]₃ and [AGAA]₉AGGA[AGAA]₃, have not been reported before. All the results in this study were verified using Sanger-type sequencing. In summary, the MPS typing method can offer valuable information for forensic genetics research and play a promising role in paternity testing.Keywords: family trios analysis, forensic casework, ion torrent personal genome machine (PGM), massively parallel sequencing (MPS)
Procedia PDF Downloads 3021301 The Imperative of Adult Education in the Knowledge Society
Authors: Najim Akorede Babalola
Abstract:
Adult Education is a multi and interdisciplinary in nature that cut across different fields of study which includes education, social sciences, engineering even information technologies that dominate the contemporary world among others. In the past, Adult Education has been used as an instrument of civilization by teaching people how to read and write as well as earning a better living. The present world has witnessed a transition from industrial age to information age which is also known as knowledge society needs Adult Education for knowledge acquisition and update of existing knowledge. An individual needs Adult Education in either of its various forms (on-the-job-training, in-service training, extramural classes, vocational education, continuing education among others) in order to develop towards the information society trends; this is because Adult Education is a process of transforming an individual through acquisition of relevant skills and knowledge for personal as well as societal development. Evidence abounds in the literature that Adult Education has not only assisted people in the medieval period but still assisting people in this modern society in changing and transforming their lives for a better living. This study, therefore, raised a salient question that with different ideas and innovations brought by the contemporary world, is Adult Education relevant? It is on this basis that this study intends to examine the relevance of Adult Education in the past and present in order to determine its future relevance.Keywords: adult education, multi and inter-disciplinary, knowledge society, skill acquisition
Procedia PDF Downloads 3491300 Acoustic Analysis for Comparison and Identification of Normal and Disguised Speech of Individuals
Authors: Surbhi Mathur, J. M. Vyas
Abstract:
Although the rapid development of forensic speaker recognition technology has been conducted, there are still many problems to be solved. The biggest problem arises when the cases involving disguised voice samples come across for the purpose of examination and identification. Such type of voice samples of anonymous callers is frequently encountered in crimes involving kidnapping, blackmailing, hoax extortion and many more, where the speaker makes a deliberate effort to manipulate their natural voice in order to conceal their identity due to the fear of being caught. Voice disguise causes serious damage to the natural vocal parameters of the speakers and thus complicates the process of identification. The sole objective of this doctoral project is to find out the possibility of rendering definite opinions in cases involving disguised speech by experimentally determining the effects of different disguise forms on personal identification and percentage rate of speaker recognition for various voice disguise techniques such as raised pitch, lower pitch, increased nasality, covering the mouth, constricting tract, obstacle in mouth etc by analyzing and comparing the amount of phonetic and acoustic variation in of artificial (disguised) and natural sample of an individual, by auditory as well as spectrographic analysis.Keywords: forensic, speaker recognition, voice, speech, disguise, identification
Procedia PDF Downloads 3681299 Rethinking the Pre-Trial Detention Law of Ethiopia: An International Law and Constitutional Law Perspective
Authors: Addisu Teshama
Abstract:
The existing criminal procedure law which is the main determinant of the phenomena of pre-trial detention is under revision in Ethiopia. The drafting work is completed and submitted for approval to the House of Peoples Representatives. The drafters of the draft law claim that the existing law is not in harmony with the constitutionally and internationally recognized principles pertinent to pretrial detention regulation. Further, the drafters allege that the drafting process is dictated by human rights principles recognized in the FDRE constitution and international human rights instruments ratified by Ethiopia. This article aims to the asses the plausibility of the claims of the drafters. For that purpose, this article uses the standards and guidelines articulated by international human rights standard setters as bench marks to juxtapose and judge the existing law and the draft criminal procedure and evidence code (DCrimPEC). The study found that the many aspects of the pre-trial detention law of Ethiopia are not in compliance with international law standards in the existing criminal procedure law. The DCrimPEC is aimed to harmonize the existing law with the constitution and international law standards. In this regard, the study found that the DCrimPEC has made significant changes on pre-trial detention policies which are not in harmony the principle of presumption of innocence. However, there are still gaps.Keywords: pre-trial detention, right to personal liberty, right to bail, Ethiopia
Procedia PDF Downloads 521298 Human Computer Interaction Using Computer Vision and Speech Processing
Authors: Shreyansh Jain Jeetmal, Shobith P. Chadaga, Shreyas H. Srinivas
Abstract:
Internet of Things (IoT) is seen as the next major step in the ongoing revolution in the Information Age. It is predicted that in the near future billions of embedded devices will be communicating with each other to perform a plethora of tasks with or without human intervention. One of the major ongoing hotbed of research activity in IoT is Human Computer Interaction (HCI). HCI is used to facilitate communication between an intelligent system and a user. An intelligent system typically comprises of a system consisting of various sensors, actuators and embedded controllers which communicate with each other to monitor data collected from the environment. Communication by the user to the system is typically done using voice. One of the major ongoing applications of HCI is in home automation as a personal assistant. The prime objective of our project is to implement a use case of HCI for home automation. Our system is designed to detect and recognize the users and personalize the appliances in the house according to their individual preferences. Our HCI system is also capable of speaking with the user when certain commands are spoken such as searching on the web for information and controlling appliances. Our system can also monitor the environment in the house such as air quality and gas leakages for added safety.Keywords: human computer interaction, internet of things, computer vision, sensor networks, speech to text, text to speech, android
Procedia PDF Downloads 3621297 Risky Driving Behavior among Bus Driver in Jakarta
Authors: Ratri A. Benedictus, Felicia M. Yolanda
Abstract:
Public transport is a crucial issue for capital city in developing country, such as Jakarta. Inadequate number and low quality of public transport services resulting personal vehicles as the main option. As a result, traffic jams are getting worse in Jakarta. The low quality of public transport, particularly buses, compounded by the risk behavior of the driver. Traffic accidents involving public bus in Jakarta were often the case, even result in fatality. The purpose of this study is to get a description of risk behavior among the public bus drivers in Jakarta. 132 bus drivers become respondent of this study. Risky Driving Behavior scale of Dorn were used. Data were analyzed using descriptive statistics. 51.5% of respondents felt often showing risky behavior while on driving. The highest type of risky driving behavior is still using the unsafe bus (62%). Followed by trespass the bus line (30%), over speed (21%), violate the road signs (15%) and driving with unhealthy physical condition (4%). Results of this study suggested that high understanding of the bus drivers on their risk behaviors have not lead to the emergence of safe driving behavior. Therefore, together with technical engineering and instrumentation work intervention over this issue, psychological aspects also need to be considered, such as: risk perception, safety attitude,safety culture, locus of control and Fatalism.Keywords: bus driver, psychological factors, public transportation, risky driving behavior
Procedia PDF Downloads 3581296 Protection of a Doctor’s Reputation Against the Unjustified Medical Malpractice Allegations
Authors: Anna Wszołek
Abstract:
For a very long time, the doctor-patient relationship had a paternalistic character. The events of the II World War, as well as fast development of the biotechnology and medicine caused an important change in that relationship. Human beings and their dignity were put in the centre of philosophical and legal debate. The increasing frequency of clinical trials led to the emergence of bioethics, which dealt with the topic of the possibilities and boundaries of such research in relation to individual’s autonomy. Thus, there was a transformation from a paternalistic relationship to a more collaborative one in which the patient has more room for self-determination. Today, patients are more and more aware of their rights and the obligations placed on doctors and the health care system, which is linked to an increase in medical malpractice claims. Unfortunately, these claims are not always justified. There is a strong concentration around the topic of patient’s good, however, at the other side there are doctors who feel, on the example of Poland, they might be easily accused and sued for medical malpractice even though they fulfilled their duties. Such situation may have a negative impact on the quality of health care services and patient’s interests. This research is going to present doctor’s perspective on the topic of medical malpractice allegations. It is supposed to show possible damage to a doctor’s reputation caused by frivolous and weakly justified medical malpractice accusations, as well as means to protect this reputation.Keywords: doctor's reputation, medical malpractice, personal rights, unjustified allegations
Procedia PDF Downloads 911295 Factors Affecting Corruption in Ethiopia from Higher Education Instructors' Perceptions: Evidence from Business and Economics College, Bahir Dar University
Authors: Asmamaw Yigzaw Chirkos
Abstract:
Corruption increasingly has become one of the greatest challenges of the contemporary world. It undermines good government and rule of law and in turn leads to the misallocation of public resources, harms both the private and public sector and particularly hurts the poor. Corruption is found everywhere, but it is deep-rooted in the poor countries of Sub-Saharan Africa countries. Corruption in developing countries continues to be one of the greatest factors of poverty and underdevelopment. As it is the case in other developing countries, in Ethiopia, the culture of corruption has grown roots in the society at large and become endemic. Institutions, which were designed for the regulation of the relationships between citizens and the State, are being used instead for the personal enrichment of public officials and other corrupt private agents. This paper, therefore, assesses the major factors affecting Corruption in Ethiopia from higher education instructors’ Perceptions with special reference to Business and Economics College of Bahir Dar University. The findings of the study support several previously conducted studies in that each factor examined had a moderate to high positive correlation with corruption, where r ranged between .35 and .54. In addition, the 13 variables together explain about 37 percent change in perceived corruption in Ethiopia (R²= .37).Keywords: Bahir Dar university, corruption, Ethiopia, factors, instructors perceptions
Procedia PDF Downloads 2441294 Investigating Teachers’ Perceptions about the Use of Technology in Second Language Learning at Universities in Pakistan
Authors: Nadir Ali Mugheri
Abstract:
This study has explored the perceptions of English language teachers (ELT) regarding use of technology in learning English as a second language (L2) at Universities in Pakistan. In this regard, 200 ELT teachers from 80 leading universities were selected through a judgmental sampling method. Results established that most of the teachers supported integration and incorporation of technology in the language classroom so as to teach L2 in an effective and efficient way. This study unearthed that the teachers termed the use of technology in learning English as a second language (ESL) as a positive step towards enhancing the learning capabilities and improving the personal traits of the students or learners. Findings suggest that the integration of technology in the language learning makes the learners within the classroom active and enthusiastic, and the teachers need to be equipped with the latest knowledge of mobile assisted language learning (MALL) and computer assisted language learning (CALL) so that they may ensure use of this innovative technology in their teaching practices. Results also indicated that the technology has proved itself a stimulus for improving language in the ELT milieu. The use of technology helps teachers develop themselves professionally. This study discovered that there are many determinants that make teaching and learning within the classroom efficacious, while the use of technology is one of them. Data was collected through qualitative design in order to get a complete depiction. Semi-structured interviews were conducted and analyzed through thematic analysis.Keywords: english language teaching, computer assisted language learning, use of technology, thematic analysis
Procedia PDF Downloads 691293 Enabling Gender Equality in Leadership: An Exploration of Leadership and Self-Awareness, Using Community Participatory Action Research Methods
Authors: Robyn Jackaman
Abstract:
This research explores the characterization of leadership, self-awareness, and gender identity within a higher educational institution. This is in response to the widely researched area of gender in relation to senior management levels and the contemporary reflection of this issue in leadership, where gender diversity is lacking. Through organizational platforms, the University has self-identified issues relating to gender, equality, and representation. With equality being central to the core of the project, a Community Participatory Action Research approach was implemented. This approach was chosen as it is recognized for facilitating change within community contexts which complements the University Campus culture. Seventeen semi-structured interviews gave qualitative insight into working habitus (from both professional and academic services), leadership attributions and qualities and gender significance within the workplace. The research team (cross-disciplinary) used framework analysis to code and categorized the data. Key findings presented categories in gender significance to personal/work identity, organizational change and positive reflections on leadership characteristics and roles. This research has helped support the creation of tools to better assist the organization in gender equality, inclusion, and leadership development.Keywords: gendered work, gender equality, leadership, university organization
Procedia PDF Downloads 1731292 The Study of Personal Participation in Educational Quality Assurance: Case Study of Programs in Graduate School, Suan Sunandha Rajabhat University
Authors: Nopadol Burananat, Kedsara Tripaichayonsak
Abstract:
This research aims to study the level of expectations and participation of personnel in implementing educational quality assurance of programs in Graduate School, Rajabhat Suan Sunandha University. The sample used in this study is 60 participants. The tool used for data collection is a questionnaire constructed by the researcher. The analysis is done by frequency, percentage, mean and standard deviation. It was found that the level of expectations personnel in Graduate School, Suan Sunandha Rajabhat University in implementing educational quality assurance is at high level. The category which received the most score is Action, followed by Check, Do and Plan, respectively. For the level of participation of personnel at program level of Graduate School, Suan Sunandha Rajabhat University in implementing educational quality assurance, the overall score is at high level. The category which received the most score is Action, followed by Do, Check and Plan, respectively.Keywords: participation, implementation of educational quality assurance, educational quality assurance, expectations and participation
Procedia PDF Downloads 384