Search results for: popular mind
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2208

Search results for: popular mind

828 Criminal Law Instruments to Counter Corporate Crimes in Poland

Authors: Dorota Habrat

Abstract:

In Polish law, the idea of the introduction of corporate responsibility for crimes is becoming more popular and creates a lot of questions. The need to introduce into the Polish legal system liability of corporate (collective entities) has resulted, among others, from the Polish Republic's international commitments, in particular related to membership in the European Union. The Act of 28 October 2002 on the liability of collective entities for acts prohibited under penalty is one of the example of adaptation of Polish law to Community law. Introduction to Polish law a criminal nature liability of corporations (legal persons) has resulted in a lot of controversy and lack of acceptance from both the scientific community as well as the judiciary. The responsibility of collective entities under the Act has a criminal nature. The main question concerns the ability of the collective entity to be brought to guilt under criminal law sense. Polish criminal law knows only the responsibility of individual persons. So far, guilt as a personal feature of action, based on the ability of the offender to feel in his psyche, could be considered only in relation to the individual person, while the said Act destroyed this conviction. Guilt of collective entity must be proven under at least one of the three possible forms: the guilt in the selection or supervision and so called organizational guilt. The next question is how the principle of proportionality in relation to criminal measures in response of collective entities should be considered. It should be remembered that the legal subjectivity of collective entities, including their rights and freedoms, is an emanation of the rights and freedoms of individual persons which create collective entities and through these entities implement their rights and freedoms. The adopted Act largely reflects the international legal regulations but also contains the unknown and original legislative solutions.

Keywords: criminal corporate responsibility, Polish criminal law, legislative solutions, Act of 28 October 2002

Procedia PDF Downloads 502
827 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.

Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)

Procedia PDF Downloads 88
826 Digital and Technological Transformation of Trekking Routes of Cappadocia Valleys

Authors: Şenay Güngör, Emre Elbaşi, Beyda Sadikoğlu, Utku Eren Bağci, Ömer Uzunel

Abstract:

One of the first places that comes to mind when it comes to tourism in Turkey is the Cappadocia Region. Due to its rich geological and geomorphological heritage, Cappadocia is one of the most visited destinations in the world. In fact, in the first half of 2023, the number of international tourists visiting Cappadocia exceeded 2 million. Considering that the economy of the Cappadocia region is largely based on tourism, it is understood that the quality and technology integration levels of the touristic services offered in the region are of great importance. In this context; as a result of the observations made in Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys, where the important hiking routes of the Cappadocia Region are located, it has been observed that the digital level of the routes is insufficient. It has been observed that the telephone networks in the area are very low or have completely lost their signal strength. In addition, it was determined that the materials such as maps and brochures used by tourism agencies to introduce the valleys are simple and incomplete. It is thought that this situation negatively affects the tourists' orientation and touristic experience in the field. Eliminating these deficiencies identified in the field, improving the digital level of the above-mentioned hiking routes and increasing the added value in destinations are among the main objectives of our study. Within the scope of the study, a mobile application that can work both online and offline on hiking routes has been prepared. 3D modeling of Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys were made using Geographical Information Systems (GIS). In addition, a website has been created to enable tourists to easily access all the above-mentioned information, visuals and technological applications related to the routes. As it is known, the effective use of information and communication technologies in touristic regions not only increases the satisfaction levels of tourists, but also positively affects the attraction of qualified tourists to the region. When the tangible and intangible outputs of this study are evaluated, it is thought that it will serve the social and economic development of the region and set an example for the digital transformation of other routes in the region.

Keywords: nevşehir, cappadocia, cappadocia valleys, trekking route

Procedia PDF Downloads 61
825 Continuous FAQ Updating for Service Incident Ticket Resolution

Authors: Kohtaroh Miyamoto

Abstract:

As enterprise computing becomes more and more complex, the costs and technical challenges of IT system maintenance and support are increasing rapidly. One popular approach to managing IT system maintenance is to prepare and use an FAQ (Frequently Asked Questions) system to manage and reuse systems knowledge. Such an FAQ system can help reduce the resolution time for each service incident ticket. However, there is a major problem where over time the knowledge in such FAQs tends to become outdated. Much of the knowledge captured in the FAQ requires periodic updates in response to new insights or new trends in the problems addressed in order to maintain its usefulness for problem resolution. These updates require a systematic approach to define the exact portion of the FAQ and its content. Therefore, we are working on a novel method to hierarchically structure the FAQ and automate the updates of its structure and content. We use structured information and the unstructured text information with the timelines of the information in the service incident tickets. We cluster the tickets by structured category information, by keywords, and by keyword modifiers for the unstructured text information. We also calculate an urgency score based on trends, resolution times, and priorities. We carefully studied the tickets of one of our projects over a 2.5-year time period. After the first 6 months, we started to create FAQs and confirmed they improved the resolution times. We continued observing over the next 2 years to assess the ongoing effectiveness of our method for the automatic FAQ updates. We improved the ratio of tickets covered by the FAQ from 32.3% to 68.9% during this time. Also, the average time reduction of ticket resolution was between 31.6% and 43.9%. Subjective analysis showed more than 75% reported that the FAQ system was useful in reducing ticket resolution times.

Keywords: FAQ system, resolution time, service incident tickets, IT system maintenance

Procedia PDF Downloads 335
824 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 168
823 Authentic Visual Resources for the Foreign Language Classroom

Authors: O. Yeret

Abstract:

Visual resources are all around us, especially in today's media-driven world, which gravitates, more and more, towards the visual. As a result, authentic resources, such as television advertisements, become testaments – authentic cultural materials – that reflect the landscape of certain groups and communities during a specific point in time. Engaging language students with popular advertisements can provide a great opportunity for developing cultural awareness, a component that is sometimes overlooked in the foreign language classroom. This paper will showcase practical examples of using Israeli Television Ads in various Modern Hebrew language courses. Several approaches for combining the study of language and culture, through the use of advertisements, will be included; for example, targeted assignments based on students' proficiency levels, such as: asking to recognize vocabulary words and answer basic information questions, as opposed to commenting on the significance of an ad and analyzing its particular cultural elements. The use of visual resources in the language classroom does not only enable students to learn more about the culture of the target language, but also to combine their language skills. Most often, interacting with an ad requires close listening and some reading (through captions or other data). As students analyze the ad, they employ their writing and speaking skills by answering questions in text or audio form. Hence, these interactions are able to elicit complex language use across the four domains: listening, speaking, writing, and reading. This paper will include examples of practical assignments that were developed for several Modern Hebrew language courses, together with the specific advertisements and questions related to them. Conclusions from the process and recent feedback notes received from students regarding the use of visual resources will be mentioned as well.

Keywords: authentic materials, cultural awareness, second language acquisition, visual resources

Procedia PDF Downloads 106
822 Performance Evaluation and Comparison between the Empirical Mode Decomposition, Wavelet Analysis, and Singular Spectrum Analysis Applied to the Time Series Analysis in Atmospheric Science

Authors: Olivier Delage, Hassan Bencherif, Alain Bourdier

Abstract:

Signal decomposition approaches represent an important step in time series analysis, providing useful knowledge and insight into the data and underlying dynamics characteristics while also facilitating tasks such as noise removal and feature extraction. As most of observational time series are nonlinear and nonstationary, resulting of several physical processes interaction at different time scales, experimental time series have fluctuations at all time scales and requires the development of specific signal decomposition techniques. Most commonly used techniques are data driven, enabling to obtain well-behaved signal components without making any prior-assumptions on input data. Among the most popular time series decomposition techniques, most cited in the literature, are the empirical mode decomposition and its variants, the empirical wavelet transform and singular spectrum analysis. With increasing popularity and utility of these methods in wide ranging applications, it is imperative to gain a good understanding and insight into the operation of these algorithms. In this work, we describe all of the techniques mentioned above as well as their ability to denoise signals, to capture trends, to identify components corresponding to the physical processes involved in the evolution of the observed system and deduce the dimensionality of the underlying dynamics. Results obtained with all of these methods on experimental total ozone columns and rainfall time series will be discussed and compared

Keywords: denoising, empirical mode decomposition, singular spectrum analysis, time series, underlying dynamics, wavelet analysis

Procedia PDF Downloads 106
821 Treaties-Fulfilled or Breached: A Study for Peacefulness of Religions

Authors: Syed A. Alam, Arifa Bilal

Abstract:

A propagated wave of barbaric and injustice Muslims has been popularized by the International powers in the recent past to divert the winning force of Muslims in the Afghan war against Russia. It is a tactic to demolish the power of Jihaad and the religious image of Islam. The propaganda picturized that Muslims were not peaceful or trustworthy people by displaying some brutal actions of a little number of funded people. The word ‘Islam’ is titled as ‘complete codes of life’ because of the peacefulness and trustworthiness of these codes for whole lives. These codes help the whole of humanity beyond the boundaries of any religion, sect, creed, color, geography, or race to lead their lives peacefully and trustfully. The human beings who act upon these codes of life, Islam, can be called Muslims. Those people are not Muslims who do not act upon these codes of life. History is evident that the Muslims proved themselves, collectively, that they are acting upon these codes of life. In this article, an analytical study was conducted regarding popular treaties signed between Muslims and non-Muslim communities in different times and regions on different matters. The study included the treaties of Hudabiyah Treaty, Mithaq-e-Madinah, Lucknow Pact, Indus Water Pact, Air Space Violation Treaty, Gallipoli Treaty, Amity Treaty, US-Russia Peace Treaty, and Wadi Arab Peace Treaty. After critical analysis of these treaties, it can be clearly concluded that Muslims fulfilled these treatises, but non-Muslim stakeholders of these treaties broke these treaties in one aspect or many and in the start or later. It can be concluded that the history of treaties between Muslim and non-Muslim communities declared that Muslims had fulfilled these treaties and pacts, so they are more trustworthy and peaceful people.

Keywords: fulfilled treaties, Muslim and non-muslim pacts, Islam and peacefulness, Islam and treaties

Procedia PDF Downloads 128
820 Digital And Technological Transformation of Cappadocia Valleys: Kizilçukur, Meskendi̇r, Güllüdere 1, Güllüdere 2

Authors: Şenay Güngör, Emre Elbaşi, Beyda Sadikğlu, Utku Eren Bağci, Ömer Uzunel

Abstract:

One of the first places that comes to mind when it comes to tourism in Turkey is the Cappadocia Region. Due to its rich geological and geomorphological heritage, Cappadocia is one of the most visited destinations in the world. In fact, in the first half of 2023, the number of international tourists visiting Cappadocia exceeded 2 million. Considering that the economy of the Cappadocia region is largely based on tourism, it is understood that the quality and technology integration levels of the touristic services offered in the region are of great importance. In this context; as a result of the observations made in Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys, where the important hiking routes of the Cappadocia Region are located, it has been observed that the digital level of the routes is insufficient. It has been observed that the telephone networks in the area are very low or have completely lost their signal strength. In addition, it was determined that the materials such as maps and brochures used by tourism agencies to introduce the valleys are simple and incomplete. It is thought that this situation negatively affects the tourists' orientation and touristic experience in the field. Eliminating these deficiencies identified in the field, improving the digital level of the above-mentioned hiking routes and increasing the added value in destinations are among the main objectives of our study. Within the scope of the study, a mobile application that can work both online and offline on hiking routes has been prepared. 3D modeling of Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys were made using Geographical Information Systems (GIS). In addition, a website has been created to enable tourists to easily access all the above-mentioned information, visuals and technological applications related to the routes. As it is known, the effective use of information and communication technologies in touristic regions not only increases the satisfaction levels of tourists, but also positively affects the attraction of qualified tourists to the region. When the tangible and intangible outputs of this study are evaluated, it is thought that it will serve the social and economic development of the region and set an example for the digital transformation of other routes in the region.

Keywords: nevşehir, cappadocia, cappadocia valleys, tourism route

Procedia PDF Downloads 55
819 Identity and Disability in Contemporary East Asian Dance

Authors: Sanghyun Park

Abstract:

Influenced by the ideas of collectivism, East Asian contemporary dance is marked by an emphasis on unity and synchronization. A growing element of this discipline that disrupts the path that strives to attain perfection, requiring coordination between multiple parties in order to produce work of their highest artistic potential, with the support from individuals or groups is the presence of disabled dancers. Kawanaka Yo, a Japanese dancer with a mental disability, argues through her '“Dance of Peace' that a dancer should focus on her impulses and natural thoughts through improvisational dancing and eschewal of documentation. Professor and poet Jung-Gyu Jeong, co-founder of the Korea Disability International Art Company, demonstrates with his company’s modernized performances of popular works and musicals that disabled artists do not need perfection so long as they can assert their finesse to mimic or create an equivalence with able-bodied dancers. Yo has studied various forms of modern dance and ballet in Japan and has used her training to ease her mental disability but also accept her handicap as an extension of her identity, representing a trend in disabled dance that favors individuality and acceptance. In contrast, Jeong is an influential figure in South Korea for disabled dancers and artists, believing that disabled artists must overcome a certain threshold in order to reach a status as an artist that is equivalent to a 'normal artist.' East Asian art created by the disabled should not be judged according to different criteria or rubrics compared to able-bodied artists because, as Yo explains, a person’s identity and her handicaps characterize the meaning of, and the value of, the piece.

Keywords: disability studies, modern dance, East Asia, politics of identity

Procedia PDF Downloads 205
818 Facile Surfactant-Assisted Green Synthesis of Stable Biogenic Gold Nanoparticles with Potential Antibacterial Activity

Authors: Sneha Singh, Abhimanyu Dev, Vinod Nigam

Abstract:

The major issue which decides the impending use of gold nanoparticles (AuNPs) in nanobiotechnological applications is their particle size and stability. Often the AuNPs obtained biomimetically are considered useless owing to their instability in the aqueous medium and thereby limiting the widespread acceptance of this facile green synthesis procedure. So, the use of nontoxic surfactants is warranted to stabilize the biogenic nanoparticles (NPs). But does the surfactant only play a role in stabilizing by being adsorbed to the NPs surface or can it have any other significant contribution in synthesis process and controlling their size as well as shape? Keeping this idea in mind, AuNPs were synthesized by using surfactant treated (lechate) and untreated (cell lysate supernatant) Bacillus licheniformis cell extract. The cell extracts mediated reduction of chloroauric acid (HAuCl 4) in the presence of non-ionic surfactant, Tween 20 (TW20), and its effect on the AuNPs stability was studied. Interestingly, the surfactant used in the study served as potential alternative to harvest cellular enzymes involved in bioreduction process in a hassle free condition. The surfactants ability to solubilize/leach membrane proteins and simultaneously stabilizing the AuNPs could have advantage from process point of view as it will reduce the time and economics involve in the nanofabrication of biogenic NPs. The synthesis was substantiated with UV-Vis spectroscopy, Dynamic light scattering study, FTIR spectroscopy, and Transmission electron microscopy. The Zeta potential of AuNPs solutions was measured routinely to corroborate the stability observations recorded visually. Highly stable, ultra-small AuNPs of 2.6 nm size were obtained from the study. Further, the biological efficacy of the obtained AuNPs as potential antibacterial agent was evaluated against Bacilllus subtilis, Pseudomonas aeruginosa, and Escherichia coli by observing the zone of inhibition. This potential of AuNPs of size < 3 nm as antibacterial agent could pave way for development of new antimicrobials and overcoming the problems of antibiotics resistance

Keywords: antibacterial, bioreduction, nanoparticles, surfactant

Procedia PDF Downloads 233
817 Fault Tolerant Control of the Dynamical Systems Based on Internal Structure Systems

Authors: Seyed Mohammad Hashemi, Shahrokh Barati

Abstract:

The problem of fault-tolerant control (FTC) by accommodation method has been studied in this paper. The fault occurs in any system components such as actuators, sensors or internal structure of the system and leads to loss of performance and instability of the system. When a fault occurs, the purpose of the fault-tolerant control is designate strategy that can keep the control loop stable and system performance as much as possible perform it without shutting down the system. Here, the section of fault detection and isolation (FDI) system has been evaluated with regard to actuator's fault. Designing a fault detection and isolation system for a multi input-multi output (MIMO) is done by an unknown input observer, so the system is divided to several subsystems as the effect of other inputs such as disturbing given system state equations. In this observer design method, the effect of these disturbances will weaken and the only fault is detected on specific input. The results of this approach simulation can confirm the ability of the fault detection and isolation system design. After fault detection and isolation, it is necessary to redesign controller based on a suitable modification. In this regard after the use of unknown input observer theory and obtain residual signal and evaluate it, PID controller parameters redesigned for iterative. Stability of the closed loop system has proved in the presence of this method. Also, In order to soften the volatility caused by Annie variations of the PID controller parameters, modifying Sigma as a way acceptable solution used. Finally, the simulation results of three tank popular example confirm the accuracy of performance.

Keywords: fault tolerant control, fault detection and isolation, actuator fault, unknown input observer

Procedia PDF Downloads 450
816 Comparison of Risk Analysis Methodologies Through the Consequences Identification in Chemical Accidents Associated with Dangerous Flammable Goods Storage

Authors: Daniel Alfonso Reséndiz-García, Luis Antonio García-Villanueva

Abstract:

As a result of the high industrial activity, which arises from the search to satisfy the needs of products and services for society, several chemical accidents have occurred, causing serious damage to different sectors: human, economic, infrastructure and environmental losses. Historically, with the study of this chemical accidents, it has been determined that the causes are mainly due to human errors (inexperienced personnel, negligence, lack of maintenance and deficient risk analysis). The industries have the aim to increase production and reduce costs. However, it should be kept in mind that the costs involved in risk studies, implementation of barriers and safety systems is much cheaper than paying for the possible damages that could occur in the event of an accident, without forgetting that there are things that cannot be replaced, such as human lives.Therefore, it is of utmost importance to implement risk studies in all industries, which provide information for prevention and planning. The aim of this study is to compare risk methodologies by identifying the consequences of accidents related to the storage of flammable, dangerous goods for decision making and emergency response.The methodologies considered in this study are qualitative and quantitative risk analysis and consequence analysis. The latter, by means of modeling software, which provides radius of affectation and the possible scope and magnitude of damages.By using risk analysis, possible scenarios of occurrence of chemical accidents in the storage of flammable substances are identified. Once the possible risk scenarios have been identified, the characteristics of the substances, their storage and atmospheric conditions are entered into the software.The results provide information that allows the implementation of prevention, detection, control, and combat elements for emergency response, thus having the necessary tools to avoid the occurrence of accidents and, if they do occur, to significantly reduce the magnitude of the damage.This study highlights the importance of risk studies applying tools that best suited to each case study. It also proves the importance of knowing the risk exposure of industrial activities for a better prevention, planning and emergency response.

Keywords: chemical accidents, emergency response, flammable substances, risk analysis, modeling

Procedia PDF Downloads 86
815 The Influence of Class and Gender on the Capitalist Patriarchal Society in Fitzgerald’s “The Great Gatsby”: A Marxist Feminist Perspective

Authors: Atousa Mirzapour Kouhdasht

Abstract:

The Great Gatsby is a 1925 novel set in the Jazz Age on Long Island by American writer F. Scott Fitzgerald. The novel depicts interactions between the first-person narrator, Nick Carraway, and his mysterious millionaire neighbor, Jay Gatsby, and his obsession to reunite with his former lover, Daisy Buchanan. During World War II, the Council on Books in Wartime sent free copies to American soldiers, so the novel experienced an unanticipated wave in popularity. This newfound popularity brought up critical literary re-examination. The work soon became a part of most American high school curricula and, as a result, a part of American popular culture. Multiple adaptations, on stage and screen, followed in the succeeding decades. The novel's treatment of social class, old money versus those who do not have familial wealth, gender, race, and its cynical attitude towards the American Dream is now a matter of discussion. The old money does not allow the new money to present itself due to its fear of changes. Although Gatsby is now a wealthy man who throws many parties, he is not considered equal to Thomas Buchanan, Daisy's husband, a millionaire who lives in East Egg. Even Gatsby feels shame when it comes to the history of his family, who was not actually from the bourgeoisie. Furthermore, the patriarchal system restrains women's behavior in society and puts them in the second position after men to follow what men ask them to do. The female characters are not able to make decisions for themselves. So the researcher uses The Great Gatsby, patriarchal theory, and Marxist feminist perspective to investigate the influence of gender and social status on women's position in a patriarchal society.

Keywords: Marxist, feminist, class status, gender, the American dream, The Great Gatsby, Fitzgerald

Procedia PDF Downloads 119
814 Identification of Spam Keywords Using Hierarchical Category in C2C E-Commerce

Authors: Shao Bo Cheng, Yong-Jin Han, Se Young Park, Seong-Bae Park

Abstract:

Consumer-to-Consumer (C2C) E-commerce has been growing at a very high speed in recent years. Since identical or nearly-same kinds of products compete one another by relying on keyword search in C2C E-commerce, some sellers describe their products with spam keywords that are popular but are not related to their products. Though such products get more chances to be retrieved and selected by consumers than those without spam keywords, the spam keywords mislead the consumers and waste their time. This problem has been reported in many commercial services like e-bay and taobao, but there have been little research to solve this problem. As a solution to this problem, this paper proposes a method to classify whether keywords of a product are spam or not. The proposed method assumes that a keyword for a given product is more reliable if the keyword is observed commonly in specifications of products which are the same or the same kind as the given product. This is because that a hierarchical category of a product in general determined precisely by a seller of the product and so is the specification of the product. Since higher layers of the hierarchical category represent more general kinds of products, a reliable degree is differently determined according to the layers. Hence, reliable degrees from different layers of a hierarchical category become features for keywords and they are used together with features only from specifications for classification of the keywords. Support Vector Machines are adopted as a basic classifier using the features, since it is powerful, and widely used in many classification tasks. In the experiments, the proposed method is evaluated with a golden standard dataset from Yi-han-wang, a Chinese C2C e-commerce, and is compared with a baseline method that does not consider the hierarchical category. The experimental results show that the proposed method outperforms the baseline in F1-measure, which proves that spam keywords are effectively identified by a hierarchical category in C2C e-commerce.

Keywords: spam keyword, e-commerce, keyword features, spam filtering

Procedia PDF Downloads 293
813 Implementing Service Learning in the Health Education Curriculum

Authors: Karen Butler

Abstract:

Johnson C. Smith University, one of the nation’s oldest Historically Black Colleges and Universities, has a strong history of service learning and community service. We first integrated service learning and peer education into health education courses in the spring of 2000. Students enrolled in the classes served as peer educators for the semester. Since then, the program has evolved and expanded but remains an integral part of several courses. The purpose of this session is to describe our program in terms of development, successes, and obstacles, and feedback received. A detailed description of the service learning component in HED 235: Drugs and Drug Education and HED 337: Environmental Health will be provided. These classes are required of our Community Health majors but are also popular electives for students in other disciplines. Three sources of student feedback were used to evaluate and continually modify the component: the SIR II course evaluation, service learning reflection papers, and focus group interviews. Student feedback has been largely positive. When criticism was given, it was thoughtful and constructive – given in the spirit of making it better for the next group. Students consistently agreed that the service learning program increased their awareness of pertinent health issues; that both the service providers and service recipients benefited from the project; and that the goals/issues targeted by the service learning component fit the objectives of the course. Also, evidence of curriculum and learning enhancement was found in the reflection papers and focus group sessions. Service learning sets up a win-win situation. It provides a way to respond to campus and community health needs while enhancing the curriculum, as students learn more by doing things that benefit the health and wellness of others. Service learning is suitable for any health education course and any target audience would welcome the effort.

Keywords: black colleges, community health, health education, service learning

Procedia PDF Downloads 338
812 Tracking the Mind's Mouth: Use of Smart Technology for Effective Teaching of Speaking to Pupils with Developmental Co-ordination Disorder

Authors: Sadeq Al Yaari, Muhammad Alkhunayn, Ayah Al Yaari, Ayman Al Yaari, Montaha Al Yaari, Adham Al Yaari, Sajedah Al Yaari, Fatehi Eissa

Abstract:

Developmental co-ordination disorder (DCD) (also known as dyspraxia) causes a child to speak less well than expected in social conversations. We propose that the smart speaking technology could help improve sound production mechanism at both phonetic and phonological levels, which leads to better articulation of an utterance. The participants are twelve privately beginner pupils aged between 6-12 years old and diagnosed with DCD (apraxia) divided into two groups: Experimental group (n=6) and control group (called apraxic control group) (n=6). A total of fifty typically developing and achieving (TD) pupils participated as control group 2 in both groups and were preassigned into two groups (27 pupils with the treatment group and 23 with the apraxic control group). Weekly quizzes were given to all participants each week for four continuous months and results were analyzed by psychoneurolinguists and a statistician. Although being taught by the same speech-language therapist (SLT), treatment group along with TD groups were taught a full-time speaking course with sociolinguistic themes covering both phonetic and phonological properties. The course lasted for a whole semester whereby smart speaking aids have become dominant while apraxic control group and its TD group were not. Compared with apraxic control group and its TD subgroup, results show obvious changes in speaking behavioral mechanism of the DCD experimental group and its TD subgroup. Improvement could be taken from the scores where the zero marks disappeared in the fourth week (end of the first month of treatment). Good marks (5 +/10) were seen starting from the eighth week and culminating with full marks in the week number 15 of treatment where some participants scored full mark. This study concludes to support the primacy of the smart educational technology for speaking purposes and also shows that such aids can expand the range of academic performance differential categories. Further research is required to evaluate the current demonizing of smart educational aids and weighting more reasonably the relationship specificity that speaking aids can offer to other language skills, as well as their limitations.

Keywords: smart educational technology, speaking aids, pupils with SCD, apraxia

Procedia PDF Downloads 47
811 Synthesis and Characterization of Cellulose-Based Halloysite-Carbon Adsorbent

Authors: Laura Frydel, Piotr M. Slomkiewicz, Beata Szczepanik

Abstract:

Triclosan has been used as a disinfectant in many medical products, such as: hand disinfectant soaps, creams, mouthwashes, pastes and household cleaners. Due to its strong antimicrobial activity, triclosan is becoming more and more popular and the consumption of disinfectants with triclosan in it is increasing. As a result, this compound increasingly finds its way into waters and soils in an unchanged form, pollutes the environment and may have a negative effect on organisms. The aim of this study was to investigate the synthesis of cellulose-based halloysite-carbon adsorbent and perform its characterization. The template in the halloysite-carbon adsorbent was halloysite nanotubes and the carbon precursor was microcrystalline cellulose. Scanning electron microscope (SEM) images were obtained and the elementary composition (qualitative and quantitative) of the sample was determined by energy dispersion spectroscopy (EDS). The identification of the crystallographic composition of the halloysite nanotubes and the sample of the halloysite-carbon composite was carried out using the X-ray powder diffraction (XRPD) method. The FTIR spectra were acquired before and after the adsorption process in order to determine the functional groups on the adsorbent surface and confirm the interactions between adsorbent and adsorbate molecules. The parameters of the porous structure of the adsorbent, such as the specific surface area (Brunauer-Emmett-Teller method), the total pore volume and the volume of mesopores and micropores were determined. Total carbon and total organic carbon were also determined in the samples. A cellulose-based halloysite-carbon adsorbent was used to remove triclosan from water. The degree of removal of triclosan from water was approximately 90%. The results indicate that the halloysite-carbon composite can be successfully used as an effective adsorbent for removing triclosan from water.

Keywords: Adsorption, cellulose, halloysite, triclosan

Procedia PDF Downloads 125
810 The Bayesian Premium Under Entropy Loss

Authors: Farouk Metiri, Halim Zeghdoudi, Mohamed Riad Remita

Abstract:

Credibility theory is an experience rating technique in actuarial science which can be seen as one of quantitative tools that allows the insurers to perform experience rating, that is, to adjust future premiums based on past experiences. It is used usually in automobile insurance, worker's compensation premium, and IBNR (incurred but not reported claims to the insurer) where credibility theory can be used to estimate the claim size amount. In this study, we focused on a popular tool in credibility theory which is the Bayesian premium estimator, considering Lindley distribution as a claim distribution. We derive this estimator under entropy loss which is asymmetric and squared error loss which is a symmetric loss function with informative and non-informative priors. In a purely Bayesian setting, the prior distribution represents the insurer’s prior belief about the insured’s risk level after collection of the insured’s data at the end of the period. However, the explicit form of the Bayesian premium in the case when the prior is not a member of the exponential family could be quite difficult to obtain as it involves a number of integrations which are not analytically solvable. The paper finds a solution to this problem by deriving this estimator using numerical approximation (Lindley approximation) which is one of the suitable approximation methods for solving such problems, it approaches the ratio of the integrals as a whole and produces a single numerical result. Simulation study using Monte Carlo method is then performed to evaluate this estimator and mean squared error technique is made to compare the Bayesian premium estimator under the above loss functions.

Keywords: bayesian estimator, credibility theory, entropy loss, monte carlo simulation

Procedia PDF Downloads 330
809 Tracing Syrian Refugees Urban Mobilities: The Case of Egypt and Canada

Authors: N. Elgendy, N. Hussein

Abstract:

The current Syrian crisis has caused unprecedented practices of global mobility. The process of forced eviction and the resettlement of refugees could be seen through the insights of the “new mobilities paradigm”. The mobility of refugees in terms of meaning and practice is a subject that calls for further studies. There is a need for the development of an approach to human mobility to understand a practice that is turning into a phenomenon in the 21st century. This paper aims at studying, from a qualitative point of view, the process of movement within the six constituents of mobility defined as the first phase of the journey of a refugee. The second phase would include the process of settling in and re-defining the host country as new “home” to refugees. The change in the refugee state of mind and crossing the physical and mental borders from a “foreigner” to a citizen is encouraged by both the governmental policies and the local communities’ efforts to embrace these newcomers. The paper would focus on these policies of social and economic integration. The concept of integration connotes the idea that refugees would enjoy the opportunities, rights and services available to the citizens of the refugee’s new community. So, this paper examines this concept through showcasing the two hosting countries of Canada and Egypt, as they provide two contrasting situations in terms of cultural, geographical, economic and political backgrounds. The analysis would highlight the specific policies defined towards the refugees including the mass communication, media calls, and access to employment. This research is part of a qualitative research project on the process of Urban Mobility practiced by the Syrian Refugees, drawing on conversational interviews with new-settlers who have moved to the different hosting countries, from their home in Syria. It explores these immigrants’ practical and emotional relationships with the process of movement and settlement. It uses the conversational interviews as a tool to document analysis and draw relationships in an attempt to establish an understanding of the factors that contribute to the new-settlers feeling of home and integration within the new community.

Keywords: integration, mobility, policy, refugees

Procedia PDF Downloads 311
808 An Approach towards Smart Future: Ict Infrastructure Integrated into Urban Water Networks

Authors: Ahsan Ali, Mayank Ostwal, Nikhil Agarwal

Abstract:

Abstract—According to a World Bank report, millions of people across the globe still do not have access to improved water services. With uninterrupted growth of cities and urban inhabitants, there is a mounting need to safeguard the sustainable expansion of cities. Efficient functioning of the urban components and high living standards of the residents are needed to be ensured. The water and sanitation network of an urban development is one of its most essential parts of its critical infrastructure. The growth in urban population is leading towards increased water demand, and thus, the local water resources are severely strained. 'Smart water' is referred to water and waste water infrastructure that is able to manage the limited resources and the energy used to transport it. It enables the sustainable consumption of water resources through co-ordinate water management system, by integrating Information Communication Technology (ICT) solutions, intended at maximizing the socioeconomic benefits without compromising the environmental values. This paper presents a case study from a medium sized city in North-western Pakistan. Currently, water is getting contaminated due to the proximity between water and sewer pipelines in the study area, leading to public health issues. Due to unsafe grey water infiltration, the scarce ground water is also getting polluted. This research takes into account the design of smart urban water network by integrating ICT (Information and Communication Technology) with urban water network. The proximity between the existing water supply network and sewage network is analyzed and a design of new water supply system is proposed. Real time mapping of the existing urban utility networks will be projected with the help of GIS applications. The issue of grey water infiltration is addressed by providing sustainable solutions with the help of locally available materials, keeping in mind the economic condition of the area. To deal with the current growth of urban population, it is vital to develop new water resources. Hence, distinctive and cost effective procedures to harness rain water would be suggested as a part of the research study experiment.

Keywords: GIS, smart water, sustainability, urban water management

Procedia PDF Downloads 211
807 Efficiency of Robust Heuristic Gradient Based Enumerative and Tunneling Algorithms for Constrained Integer Programming Problems

Authors: Vijaya K. Srivastava, Davide Spinello

Abstract:

This paper presents performance of two robust gradient-based heuristic optimization procedures based on 3n enumeration and tunneling approach to seek global optimum of constrained integer problems. Both these procedures consist of two distinct phases for locating the global optimum of integer problems with a linear or non-linear objective function subject to linear or non-linear constraints. In both procedures, in the first phase, a local minimum of the function is found using the gradient approach coupled with hemstitching moves when a constraint is violated in order to return the search to the feasible region. In the second phase, in one optimization procedure, the second sub-procedure examines 3n integer combinations on the boundary and within hypercube volume encompassing the result neighboring the result from the first phase and in the second optimization procedure a tunneling function is constructed at the local minimum of the first phase so as to find another point on the other side of the barrier where the function value is approximately the same. In the next cycle, the search for the global optimum commences in both optimization procedures again using this new-found point as the starting vector. The search continues and repeated for various step sizes along the function gradient as well as that along the vector normal to the violated constraints until no improvement in optimum value is found. The results from both these proposed optimization methods are presented and compared with one provided by popular MS Excel solver that is provided within MS Office suite and other published results.

Keywords: constrained integer problems, enumerative search algorithm, Heuristic algorithm, Tunneling algorithm

Procedia PDF Downloads 321
806 Effects of Bariatric Surgery on Preventing the Progression of Diabetic Retinopathy

Authors: Yunzi Chen, James Laybourne, Sarah Steven, Peter Carey, David Steel, Maria Sandinha

Abstract:

Introduction: Bariatric surgery is popular with the rising incidence of obesity. Its well-known benefits include significant and rapid glycaemic control. However, cases of paradoxical worsening in diabetic retinopathy (DR) despite improved glycaemic control have been reported. Purpose: clarification on the evolution of diabetic retinopathy after bariatric surgery. Method: retrospective study of 40 patients with Type 2 diabetes who underwent bariatric surgery in a UK specialist bariatric unit between 2009 and 2011. Pre-operative and post-operative visual acuity (VA), weight, HbA1c and annual DRSS screening results were analysed. Median follow up was 50 months. Results: No significant change in VA was found during the post-operative period. 85% of patients improved HbA1c post-operatively of which 53% achieved non-diabetic HbA1c of <6.1% - despite this, 2 patients developed new DR. First post-operative screening showed 80% of patients experienced no change, 8% improved but 13% of patients developed new DR (1 case with sight-threatening maculopathy). 80% of these cases persisted up to 24 months. The proportion of patients developing new or worse DR fluctuated over time, peaking at the 3rd annual screening with 26% (15% regressed, 56% stable). The probability of developing new or worse DR postoperatively was significantly associated with a high pre-operative HbA1c (>8%) and male gender. Conclusions: bariatric surgery does not guarantee long-term improvement or prevention of DR. Asymptomatic changes in DR occurred up to 5 years postoperatively. We therefore consider it prudent to continue screening in this cohort of patients.

Keywords: bariatric surgery, diabetic retinopathy, obesity, type 2 diabetes mellitus

Procedia PDF Downloads 269
805 Unlocking E-commerce: Analyzing User Behavior and Segmenting Customers for Strategic Insights

Authors: Aditya Patil, Arun Patil, Vaishali Patil, Sudhir Chitnis, Anjum Patel

Abstract:

Rapid growth has given e-commerce platforms a lot of client behavior and spending data. To maximize their strategy, businesses must understand how customers utilize online shopping platforms and what influences their purchases. Our research focuses on e-commerce user behavior and purchasing trends. This extensive study examines spending and user behavior. Regression and grouping disclose relevant data from the dataset. We can understand user spending trends via multilevel regression. We can analyze how pricing, user demographics, and product categories affect customer purchase decisions with this technique. Clustering groups consumers by spending. Important information was found. Purchase habits vary by user group. Our analysis illuminates the complex world of e-commerce consumer behavior and purchase trends. Understanding user behavior helps create effective e-commerce marketing strategies. This market can benefit from K-means clustering. This study focuses on tailoring strategies to user groups and improving product and price effectiveness. Customer buying behaviors across categories were shown via K-means clusters. Average spending is highest in Cluster 4 and lowest in Cluster 3. Clothing is less popular than gadgets and appliances around the holidays. Cluster spending distribution is examined using average variables. Our research enhances e-commerce analytics. Companies can improve customer service and decision-making with this data.

Keywords: e-commerce, regression, clustering, k-means

Procedia PDF Downloads 11
804 Graphene Based Materials as Novel Membranes for Water Desalination and Boron Separation

Authors: Francesca Risplendi, Li-Chiang Lin, Jeffrey C. Grossman, Giancarlo Cicero

Abstract:

Desalination is one of the most employed approaches to supply water in the context of a rapidly growing global water shortage. However, the most popular water filtration method available is the reverse osmosis (RO) technique, still suffers from important drawbacks, such as a large energy demands and high process costs. In addition some serious limitations have been recently discovered, among them, the boron problem seems to have a critical meaning. Boron has been found to have a dual effect on the living systems on Earth and the difference between boron deficiency and boron toxicity levels is quite small. The aim of this project is to develop a new generation of RO membranes based on porous graphene or reduced graphene oxide (rGO) able to remove salts from seawater and to reduce boron concentrations in the permeate to the level that meets the drinking or process water requirements, by means of a theoretical approach based on density functional theory and classical molecular dynamics. Computer simulations have been employed to investigate the relationship between the atomic structure of nanoporous graphene or rGO monolayer and its membrane properties in RO applications (i.e. water permeability and resilience at RO pressures). In addition, an emphasis has been given to multilayer nanoporous rGO and rGO flakes based membranes. By means of non-equilibrium MD simulations, we investigated the water transport mechanism permeating through such multilayer membrane focusing on the effect of slit widths and sheet geometries. These simulations allowed us to establish the implications of these graphene based materials as promising membrane properties for desalination plants and as boron filtration.

Keywords: boron filtration, desalination, graphene membrane, reduced graphene oxide membrane

Procedia PDF Downloads 296
803 An Exploration of the Place of Buddhism in the Tham Luang Cave Rescue and Its Aftermath

Authors: Hamish de Nett

Abstract:

On 23rd June 2018, twelve young footballers from the Wild Boar Academy and their coach went to explore the Tham Luang cave in the Doi Nang Non mountain range in Chiang Rai Province, Northern Thailand. Whilst they were inside the cave, monsoon rains hit, and the complex became partially flooded. In the following days, Thai Navy SEALs and an international team of expert divers assembled at the cave complex in order to rescue the boys. Although it was only marginally reported in the Western press, Buddhism and ritual activities played a major role in the rescue and its aftermath. This paper utilises numerous news articles and books written by reporters who covered the cave rescue to uncover what the place of Buddhism was in the Tham Luang cave rescue. This paper initially sets out the development of Thai Buddhism and the Thai nation state, paying particular note to the tension in Thai Buddhism between Buddhism as it is popularly practised and normative, state-favoured Buddhism. Secondly, this paper demonstrates that, during the Tham Luang cave rescue, Buddhism helped people cope with the disaster, provided an explanation for its occurrence, and allowed bystanders some efficacy in the process. Thirdly, this paper discusses how Buddhism helped people to give thanks after the rescue, achieve reconciliation, and gain closure. Finally, this paper analyses how the government and the political sphere utilised Buddhism during the rescue. The conclusion reached is that the Buddhism practiced during the Tham Luang cave rescue and its aftermath is representative of the wider tension between popular Buddhism and normative state-favoured Buddhism that is currently present within Thai Buddhism and has been for centuries.

Keywords: cave rescue, contemporary Buddhism, lived religion, Thai Buddhism, Tham Luang cave rescue

Procedia PDF Downloads 126
802 The Concept of Accounting in Islamic Transactions

Authors: Ahmad Abdulkadir Ibrahim

Abstract:

The Islamic law of transactions laid down the methods and instruments of accounting and analyzed its basic assumptions in the modern world. There is a need to examine the implications of accounting initiatives in the Muslim world and attempt to outline the important characteristics of Islamic accounting and how Islamic accounting resolves the problem of measuring the cost of Murabaha goods in case of exchange rate variation. The research tends to discuss an analytical approach to the Islamic accounting concept as well as elaborating the jurisprudential matter and practical aspects of accounting in Islamic financial transactions. It also aims to alert the practitioners of accounting in the Islamic world to be aware of the concept of accounting in Islamic jurisprudence and its historical development. The methodology adopted in this research is the qualitative method through the consultation of relevant literature, which focuses on the thematic study of the subject matter. This is followed by an analysis and discussion of the contents of the materials used. It is concluded that Islamic accounting is unique in its norms as it has been characterized by fairness, accuracy in measuring tools, truthfulness, mutual trust, moderation in making a profit, and tolerance. It was also qualified by capacity and flexibility in terms of the tools and terminology used and invented by Islamic jurisprudence in the accounting system, which indicates its validity and consistency anytime and anywhere. An important conclusion of the research also lies in the refutation of the popular idea that an Italian writer known as Luca Pacilio was the first writer who developed the basis of double-entry due to the presented proofs by Muslim scholars of critical accounting developments, which cannot be ignored. It concludes further that Islamic jurisprudence draws the accounting system codified in the foundations of a market that is far from usury, fraud, cheating, and unfair competition in all areas.

Keywords: accounting, Islamic accounting, Islamic transactions, Islamic jurisprudence, double entry, murabaha, characteristics

Procedia PDF Downloads 60
801 Study of Expatriation as Countermeasure to Citizenship-Based Taxation

Authors: Gabriele Palumbo

Abstract:

This research empirically examines some of the reasons behind the fact that recently the number of people giving up their American citizenship for tax purposes has recently increased drastically. The United States Jurisdiction represents a unicum in the practice of taxing worldwide income not only to residents of the United States but also to U.S. citizens living abroad. The worldwide income taxation also affects people defined as “Accidental Americans” who are unaware that they are U.S. citizens. Those people are considered Americans even though they have not been to the United States. American residents abroad can rely on United States income tax treaties and some national law provisions, such as the exclusion of foreign income and foreign tax credits, which are designed specifically to avoid double taxation. However, this mechanism may prove unsatisfactory for people who have not been linked anymore or individuals who have never had relations with the United States. U.S. citizens who are determined to cut all of the ties between themselves and the United States, especially those that involve tax implications, can renounce their U.S. citizenship with the expatriation procedure. The expatriation process represents the extrema ratio and implicates several steps which must be followed carefully. This paper shows the complexity of the procedure that a U.S. citizen who is resident in a foreign country would have to follow to relinquish U.S. citizenship for tax purposes. The mechanism is intended to discourage people from renounce. Going beyond the question of whether U.S. tax regulation is fair or not, this principle nowadays characterizes a popular topic that many scholars and lawyers are discussing. The outcome provides interesting implications that could induce the Congress to rethink the definition of citizenship for both fiscal and nationality law purposes. Indeed, even if a sort of checks and balances has the task of mitigating the renunciation of U.S. citizenship, more and more U.S. citizens desire to get rid of their citizenship.

Keywords: double taxation, expatriation tax, international taxation, relinquishment of United States citizenship

Procedia PDF Downloads 105
800 Investigation of Overarching Effects of Artificial Intelligence Implementation into Education Through Research Synthesis

Authors: Justin Bin

Abstract:

Artificial intelligence (AI) has been rapidly rising in usage recently, already active in the daily lives of millions, from distinguished AIs like the popular ChatGPT or Siri to more obscure, inconspicuous AIs like those used in social media or internet search engines. As upcoming generations grow immersed in emerging technology, AI will play a vital role in their development. Namely, the education sector, an influential portion of a person’s early life as a student, faces a vast ocean of possibilities concerning the implementation of AI. The main purpose of this study is to analyze the effect that AI will have on the future of the educational field. More particularly, this study delves deeper into the following three categories: school admissions, the productivity of students, and ethical concerns (role of human teachers, purpose of schooling itself, and significance of diplomas). This study synthesizes research and data on the current effects of AI on education from various published literature sources and journals, as well as estimates on further AI potential, in order to determine the main, overarching effects it will have on the future of education. For this study, a systematic organization of data in terms of type (quantitative vs. qualitative), the magnitude of effect implicated, and other similar factors were implemented within each area of significance. The results of the study suggest that AI stands to change all the beforementioned subgroups. However, its specific effects vary in magnitude and favorability (beneficial or harmful) and will be further discussed. The results discussed will reveal to those affiliated with the education field, such as teachers, counselors, or even parents of students, valuable information on not just the projected possibilities of AI in education but the effects of those changes moving forward.

Keywords: artificial intelligence, education, schools, teachers

Procedia PDF Downloads 516
799 Extending ACOSOG Z0011 to Encompass Mastectomy Patients: A Retrospective Review

Authors: Ruqayya Naheed Khan, Awais Amjad Malik, Awais Naeem, Amina Khan, Asad Parvaiz

Abstract:

Introduction: Axillary nodal status in breast cancer patients is a paramount prognosticator, next to primary tumor size and grade. It has been well established that patients with negative sentinel lymph node biopsy can safely avoid axillary lymph node dissection. A positive sentinel lymph node has traditionally required subsequent axillary dissection. According to ACOSOG Z11 trial, patients who underwent axillary dissection with 3 or more positive sentinel nodes or opted for observation in case of negative sentinel lymph node, did not find any difference in Overall Survival (OS) and Disease Free Survival (DFS). The Z11 trial included patients who underwent breast conserving surgery and excluded patients with mastectomies. The purpose of this study is to determine whether Z0011 can be applied to mastectomy patients as well in 1-3 positive sentinel lymph nodes and avoid unnecessary ALND. Methods: A retrospective review was conducted at Shaukat Khanam Memorial Cancer Hospital Pakistan from Jan 2015 to Dec 2017 including patients who were treated for invasive breast cancer and required upfront mastectomy. They were clinically node negative, so sentinel lymph node biopsy was performed. Patients underwent ALND with positive sentinel lymph node. A total of 156 breast cancer patients with mastectomies were reviewed. Results: 95% of the patients were female while 3% were male. Average age was 44 years. There was no difference in race, comorbidities, histology, T stage, N stage, and overall stage, use of adjuvant chemotherapy and radiation therapy. 64 patients underwent ALND for positive lymph node while 92 patients were spared of axillary dissection due to negative sentinel lymph node biopsy. Out of 64 patients, 38 patients (59%) had only 1 lymph node positive which was the sentinel node. 18 patients (28%) had 2 lymph nodes positive including the sentinel node while only 8 patients (13%) had 3 or more positive nodes. Conclusion: Keeping in mind the complications related to ALND, above results clearly show that ALND could have been avoided in 87% of patients in the setting of adjuvant radiation, possibly avoiding the morbidity associated with axillary lymphadenectomy although a prospective randomized trial needs to confirm these results.

Keywords: mastectomy, sentinel lymph node biopsy, axillary lymph node dissection, breast cancer

Procedia PDF Downloads 192