Search results for: human gathering scheme
8574 Wireless Capsule Endoscope - Antenna and Channel Characterization
Authors: Mona Elhelbawy, Mac Gray
Abstract:
Traditional wired endoscopy is an intrusive process that requires a long flexible tube to be inserted through the patient’s mouth while intravenously sedated. Only images of the upper 4 feet of stomach, colon, and rectum can be captured, leaving the remaining 20 feet of small intestines. Wireless capsule endoscopy offers a painless, non-intrusive, efficient and effective alternative to traditional endoscopy. In wireless capsule endoscopy (WCE), ingestible vitamin-pill-shaped capsules with imaging capabilities, sensors, batteries, and antennas are designed to send images of the gastrointestinal (GI) tract in real time. In this paper, we investigate the radiation performance and specific absorption rate (SAR) of a miniature conformal capsule antenna operating at the Medical Implant Communication Service (MICS) frequency band in the human body. We perform numerical simulations using the finite element method based commercial software, high-frequency structure simulator (HFSS) and the ANSYS human body model (HBM). We also investigate the in-body channel characteristics between the implantable capsule and an external antenna placed on the surface of the human body.Keywords: IEEE 802.15.6, MICS, SAR, WCE
Procedia PDF Downloads 1278573 Measurement of Susceptibility Users Using Email Phishing Attack
Authors: Cindy Sahera, Sarwono Sutikno
Abstract:
Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.Keywords: cybercrime, email phishing, susceptibility, vulnerability
Procedia PDF Downloads 2898572 Factors Motivating Experienced Secondary Teachers to Remain in the Teaching Profession
Authors: Joselito Castro Gutierrez, Herbert Orteza, Jervie Boligon, Kenneth Esteves, Edrick Kevin Ferrer, Mark Kevin Torres, Patrick Vergara
Abstract:
Teaching is a noble profession that involves an effective imparting of holistic learning. Consequently, it requires a driving force called motivation. This research aims to determine the motivating factors, problems encountered, solutions made by experienced secondary school teachers to remain in the teaching profession. A mixed unstructured/structured questionnaire was used for gathering data among public secondary school teachers. The researchers have arrived to a conclusion that the dominant motivating factors of teachers to stay in the profession are altruism, extrinsic factors, and self-efficacy. Meanwhile, the prevalent problems these experienced secondary teachers experienced are mutual dilemma, work overload, and personal issues. Teachers have varied methods on solving the problem which are: a) Direct Solution; b) Indirect Solution; and c) Pseudo-Solutions. Lastly, the factors, problems, and solutions, have influential effects on how long a teacher would sustain in teaching which would manifest as positive, negative and neutral effects.Keywords: motivation, common problems of teachers, strategies in solving problems, teaching profession
Procedia PDF Downloads 4458571 Assessing Performance of Data Augmentation Techniques for a Convolutional Network Trained for Recognizing Humans in Drone Images
Authors: Masood Varshosaz, Kamyar Hasanpour
Abstract:
In recent years, we have seen growing interest in recognizing humans in drone images for post-disaster search and rescue operations. Deep learning algorithms have shown great promise in this area, but they often require large amounts of labeled data to train the models. To keep the data acquisition cost low, augmentation techniques can be used to create additional data from existing images. There are many techniques of such that can help generate variations of an original image to improve the performance of deep learning algorithms. While data augmentation is potentially assumed to improve the accuracy and robustness of the models, it is important to ensure that the performance gains are not outweighed by the additional computational cost or complexity of implementing the techniques. To this end, it is important to evaluate the impact of data augmentation on the performance of the deep learning models. In this paper, we evaluated the most currently available 2D data augmentation techniques on a standard convolutional network which was trained for recognizing humans in drone images. The techniques include rotation, scaling, random cropping, flipping, shifting, and their combination. The results showed that the augmented models perform 1-3% better compared to a base network. However, as the augmented images only contain the human parts already visible in the original images, a new data augmentation approach is needed to include the invisible parts of the human body. Thus, we suggest a new method that employs simulated 3D human models to generate new data for training the network.Keywords: human recognition, deep learning, drones, disaster mitigation
Procedia PDF Downloads 968570 Measures for Limiting Corruption upon Migration Wave in Europe
Authors: Jordan Georgiev Deliversky
Abstract:
Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.Keywords: corruption, influence, human smuggling, legislation, migration
Procedia PDF Downloads 3518569 Counting People Utilizing Space-Time Imagery
Authors: Ahmed Elmarhomy, K. Terada
Abstract:
An automated method for counting passerby has been proposed using virtual-vertical measurement lines. Space-time image is representing the human regions which are treated using the segmentation process. Different color space has been used to perform the template matching. A proper template matching has been achieved to determine direction and speed of passing people. Distinguish one or two passersby has been investigated using a correlation between passerby speed and the human-pixel area. Finally, the effectiveness of the presented method has been experimentally verified.Keywords: counting people, measurement line, space-time image, segmentation, template matching
Procedia PDF Downloads 4528568 Determination of Concentrated State Using Multiple EEG Channels
Authors: Tae Jin Choi, Jong Ok Kim, Sang Min Jin, Gilwon Yoon
Abstract:
Analysis of EEG brainwave provides information on mental or emotional states. One of the particular states that can have various applications in human machine interface (HMI) is concentration. 8-channel EEG signals were measured and analyzed. The concentration index was compared during resting and concentrating periods. Among eight channels, locations the frontal lobe (Fp1 and Fp2) showed a clear increase of the concentration index during concentration regardless of subjects. The rest six channels produced conflicting observations depending on subjects. At this time, it is not clear whether individual difference or how to concentrate made these results for the rest six channels. Nevertheless, it is expected that Fp1 and Fp2 are promising locations for extracting control signal for HMI applications.Keywords: concentration, EEG, human machine interface, biophysical
Procedia PDF Downloads 4838567 Anti-Inflammatory Studies on Chungpye-Tang in Asthmatic Human Lung Tissue
Authors: J. H. Bang, H. J. Baek, K. I. Kim, B. J. Lee, H. J. Jung, H. J. Jang, S. K. Jung
Abstract:
Asthma is a chronic inflammatory lung disease characterized by airway hyper responsiveness (AHR), airway obstruction and airway wall remodeling responsible for significant morbidity and mortality worldwide. Genetic and environment factors may result in asthma, but there are no the exact causes of asthma. Chungpye-tang (CPT) has been prescribed as a representative aerosol agent for patients with dyspnea, cough and phlegm in the respiratory clinic at Kyung Hee Korean Medicine Hospital. This Korean herbal medicines have the effect of dispelling external pathogen and dampness pattern. CPT is composed of 4 species of herbal medicines. The 4 species of herbal medicines are Ephedrae herba, Pogostemonis(Agatachis) herba, Caryophylli flos and Zingiberis rhizoma crudus. CPT suppresses neutrophil infiltration and the production of pro-inflammatory cytokines in lipopolysaccharide (LPS)-induced acute lung injury (ALI) mouse model. Moreover, the anti-inflammatory effects of CPT on a mouse model of Chronic Obstructive Pulmonary Disease (COPD) was proved. Activation of the NF-κB has been proven that it plays an important role in inflammation via inducing transcription of pro-inflammatory genes. Over-expression of NF-κB has been believed be related to many inflammatory diseases such as arthritis, gastritis, asthma and COPD. So we firstly hypothesize whether CPT has an anti-inflammatory effect on asthmatic human airway epithelial tissue via inhibiting NF-κB pathway. In this study, CPT was extracted with distilled water for 3 hours at 100°C. After process of filtration and evaporation, it was freeze dried. And asthmatic human lung tissues were provided by MatTek Corp. We investigated the precise mechanism of the anti-inflammatory effect of CPT by western blotting analysis. We observed whether the decoction extracts could reduce NF-κB activation, COX-2 protein expression and NF-κB-mediated pro-inflammatory cytokines such as TNF-α, eotaxin, IL-4, IL-9 and IL-13 in asthmatic human lung tissue. As results of this study, there was a trend toward decreased NF-κB expression in asthmatic human airway epithelial tissue. We found that the inhibition effects of CPT on COX-2 expression was not determined. IL-9 and IL-13 secretion was significantly reduced in the asthmatic human lung tissue treated with CPT. Overall, our results indicate that CPT has an anti-inflammatory effect through blocking the signaling pathway of NF-κB, thereby CPT may be a potential remedial agent for allergic asthma.Keywords: Chungpye-tang, allergic asthma, asthmatic human airway epithelial tissue, nuclear factor kappa B (NF-κB) pathway, COX-2
Procedia PDF Downloads 3358566 A Study of Blockchain Oracles
Authors: Abdeljalil Beniiche
Abstract:
The limitation with smart contracts is that they cannot access external data that might be required to control the execution of business logic. Oracles can be used to provide external data to smart contracts. An oracle is an interface that delivers data from external data outside the blockchain to a smart contract to consume. Oracle can deliver different types of data depending on the industry and requirements. In this paper, we study and describe the widely used blockchain oracles. Then, we elaborate on his potential role, technical architecture, and design patterns. Finally, we discuss the human oracle and its key role in solving the truth problem by reaching a consensus about a certain inquiry and tasks.Keywords: blockchain, oracles, oracles design, human oracles
Procedia PDF Downloads 1368565 The International Prohibition of Religiously-Motivated 'Incitement' to Violence
Authors: J. D. Temperman
Abstract:
Introduction: In particular, in relation to religion, the meaning and scope of freedom of expression have been tested in recent times. This paper investigates the legal justifications for restrictions that have been suggested in this area and asks whether they are sustainable from an international human rights perspective. The universal human rights instruments, particularly the UN International Covenant on Civil and Political Rights (ICCPR), are increasingly geared towards eradicating ‘incitement’ to contingent harms like violence or discrimination, whilst forms of extreme speech that fall short of such incitement are to be protected rather than countered by states. Human Rights Committee’s draft-General Comment on freedom of expression, adopted in 2011, provides another strong indication that this is the envisaged way forward: repealing anti-blasphemy and anti-religious defamation laws, whilst simultaneously increasing efforts to combat ‘incitement’. Within regional human rights frameworks, notably the European Convention system, judgments have in fact supported legal restrictions on both hate speech, holocaust denial, and blasphemy or religious defamation. Major contributions to scholarship: This paper proposes an actus reus for the offense of ‘advocacy of religious hatred that constitutes incitement to discrimination or violence’, as enshrined in Article 20(2) of the UN ICCPR. In underscoring the high threshold of ‘incitement’, the author distinguishes this offense from such notions as ‘blasphemy’ or ‘defamation of religions’. In addition to treating the said provision as a sui generis prohibition, the question is addresses whether a ‘right to be protected against incitement’ may be distilled from the ICCPR. Furthermore, the author will discuss the question of how to judge incitement; notably, is mens rea required to convict someone of incitement, and if so, what degree of mens rea? This analysis also includes the question how to balance content and context factors when addressing alleged instances of incitement, notably what factors make provide for a likelihood that imminent acts of violence or discrimination will ensue from an inciteful speech act? Methodology: This paper takes a double comparative approach: (i) it endeavours to compare and contrast monitoring bodies’ approach to incitement (notably, the UN Human Rights Committee, but also the UN Committee on the Elimination of Racial Discrimination which monitors states’ compliance with Article 4 of ICERD on incitement); and (ii) it endeavours to chart and compare and analyse from an international human rights perspective recent forms of state practice in the field of dealing with incitement (i.e. a comparative legal analysis and vertical human rights analysis of newly emerging incitement legislation in the light of the said international standards). Conclusion: This paper conceptualizes a legal notion – ‘incitement’ – encapsulated in international human rights law that may have a profound bearing on contemporary challenges of radicalization and religious strife.Keywords: incitement, international human rights law, religious hatred, violence
Procedia PDF Downloads 3088564 Cytotoxicity of a Short Chain Fatty Acid Histone Deactylase Inhibitor on HCT116 Human Colorectal Carcinoma Cell Line
Authors: N. A. Kazemi Sefat, M. M. Mohammadi, J. Hadjati, S. Talebi, M. Ajami, H. Daneshvar
Abstract:
Colorectal cancer metastases result in a significant number of cancer related deaths. Histone deacetylase (HDAC) inhibitors induce growth arrest and apoptosis in a variety of human cancer cells. Sodium butyrate (SB) is a short chain fatty acid, belongs to HDAC inhibitors which is released in the colonic lumen as a consequence of fiber fermentation. In this study, we are about to assess the effect of sodium butyrate on HCT116 human colorectal carcinoma cell line. The viability of cells was measured by microscopic morphologic study and MTT assay. After 48 hours, treatments more than 10 mM lead to cell injury in HCT116 by increasing cell granulation and decreasing cell adhesion (p>0.05). After 72 hours, treatments at 10 mM and more lead to significant cell injury (p<0.05). Our results may suggest that the gene expression which is contributed in cell proliferation and apoptosis has been changed under pressure of HDAC inhibition.Keywords: colorectal cancer, sodium butyrate, cytotoxicity, MTT
Procedia PDF Downloads 3618563 Drugstore Control System Design and Realization Based on Programmable Logic Controller (PLC)
Authors: Muhammad Faheem Khakhi, Jian Yu Wang, Salman Muhammad, Muhammad Faisal Shabir
Abstract:
Population growth and Chinese two-child policy will boost pharmaceutical market, and it will continue to maintain the growth for a period of time in the future, the traditional pharmacy dispensary has been unable to meet the growing medical needs of the peoples. Under the strong support of the national policy, the automatic transformation of traditional pharmacies is the inclination of the Times, the new type of intelligent pharmacy system will continue to promote the development of the pharmaceutical industry. Under this background, based on PLC control, the paper proposed an intelligent storage and automatic drug delivery system; complete design of the lower computer's control system and the host computer's software system has been present. The system can be applied to dispensing work for Chinese herbal medicinal and Western medicines. Firstly, the essential of intelligent control system for pharmacy is discussed. After the analysis of the requirements, the overall scheme of the system design is presented. Secondly, introduces the software and hardware design of the lower computer's control system, including the selection of PLC and the selection of motion control system, the problem of the human-computer interaction module and the communication between PC and PLC solves, the program design and development of the PLC control system is completed. The design of the upper computer software management system is described in detail. By analyzing of E-R diagram, built the establish data, the communication protocol between systems is customize, C++ Builder is adopted to realize interface module, supply module, main control module, etc. The paper also gives the implementations of the multi-threaded system and communication method. Lastly, each module of the lower computer control system is tested. Then, after building a test environment, the function test of the upper computer software management system is completed. On this basis, the entire control system accepts the overall test.Keywords: automatic pharmacy, PLC, control system, management system, communication
Procedia PDF Downloads 3108562 Technology for Good: Deploying Artificial Intelligence to Analyze Participant Response to Anti-Trafficking Education
Authors: Ray Bryant
Abstract:
3Strands Global Foundation (3SGF), a non-profit with a mission to mobilize communities to combat human trafficking through prevention education and reintegration programs, launched a groundbreaking study that calls out the usage and benefits of artificial intelligence in the war against human trafficking. Having gathered more than 30,000 stories from counselors and school staff who have gone through its PROTECT Prevention Education program, 3SGF sought to develop a methodology to measure the effectiveness of the training, which helps educators and school staff identify physical signs and behaviors indicating a student is being victimized. The program further illustrates how to recognize and respond to trauma and teaches the steps to take to report human trafficking, as well as how to connect victims with the proper professionals. 3SGF partnered with Levity, a leader in no-code Artificial Intelligence (AI) automation, to create the research study utilizing natural language processing, a branch of artificial intelligence, to measure the effectiveness of their prevention education program. By applying the logic created for the study, the platform analyzed and categorized each story. If the story, directly from the educator, demonstrated one or more of the desired outcomes; Increased Awareness, Increased Knowledge, or Intended Behavior Change, a label was applied. The system then added a confidence level for each identified label. The study results were generated with a 99% confidence level. Preliminary results show that of the 30,000 stories gathered, it became overwhelmingly clear that a significant majority of the participants now have increased awareness of the issue, demonstrated better knowledge of how to help prevent the crime, and expressed an intention to change how they approach what they do daily. In addition, it was observed that approximately 30% of the stories involved comments by educators expressing they wish they’d had this knowledge sooner as they can think of many students they would have been able to help. Objectives Of Research: To solve the problem of needing to analyze and accurately categorize more than 30,000 data points of participant feedback in order to evaluate the success of a human trafficking prevention program by using AI and Natural Language Processing. Methodologies Used: In conjunction with our strategic partner, Levity, we have created our own NLP analysis engine specific to our problem. Contributions To Research: The intersection of AI and human rights and how to utilize technology to combat human trafficking.Keywords: AI, technology, human trafficking, prevention
Procedia PDF Downloads 598561 The Origins of Representations: Cognitive and Brain Development
Authors: Athanasios Raftopoulos
Abstract:
In this paper, an attempt is made to explain the evolution or development of human’s representational arsenal from its humble beginnings to its modern abstract symbols. Representations are physical entities that represent something else. To represent a thing (in a general sense of “thing”) means to use in the mind or in an external medium a sign that stands for it. The sign can be used as a proxy of the represented thing when the thing is absent. Representations come in many varieties, from signs that perceptually resemble their representative to abstract symbols that are related to their representata through conventions. Relying the distinction among indices, icons, and symbols, it is explained how symbolic representations gradually emerged from indices and icons. To understand the development or evolution of our representational arsenal, the development of the cognitive capacities that enabled the gradual emergence of representations of increasing complexity and expressive capability should be examined. The examination of these factors should rely on a careful assessment of the available empirical neuroscientific and paleo-anthropological evidence. These pieces of evidence should be synthesized to produce arguments whose conclusions provide clues concerning the developmental process of our representational capabilities. The analysis of the empirical findings in this paper shows that Homo Erectus was able to use both icons and symbols. Icons were used as external representations, while symbols were used in language. The first step in the emergence of representations is that a sensory-motor purely causal schema involved in indices is decoupled from its normal causal sensory-motor functions and serves as a representation of the object that initially called it into play. Sensory-motor schemes are tied to specific contexts of the organism-environment interactions and are activated only within these contexts. For a representation of an object to be possible, this scheme must be de-contextualized so that the same object can be represented in different contexts; a decoupled schema loses its direct ties to reality and becomes mental content. The analysis suggests that symbols emerged due to selection pressures of the social environment. The need to establish and maintain social relationships in ever-enlarging groups that would benefit the group was a sufficient environmental pressure to lead to the appearance of the symbolic capacity. Symbols could serve this need because they can express abstract relationships, such as marriage or monogamy. Icons, by being firmly attached to what can be observed, could not go beyond surface properties to express abstract relations. The cognitive capacities that are required for having iconic and then symbolic representations were present in Homo Erectus, which had a language that started without syntactic rules but was structured so as to mirror the structure of the world. This language became increasingly complex, and grammatical rules started to appear to allow for the construction of more complex expressions required to keep up with the increasing complexity of social niches. This created evolutionary pressures that eventually led to increasing cranial size and restructuring of the brain that allowed more complex representational systems to emerge.Keywords: mental representations, iconic representations, symbols, human evolution
Procedia PDF Downloads 578560 Genetic Association of SIX6 Gene with Pathogenesis of Glaucoma
Authors: Riffat Iqbal, Sidra Ihsan, Andleeb Batool, Maryam Mukhtar
Abstract:
Glaucoma is a gathering of optic neuropathies described by dynamic degeneration of retinal ganglionic cells. It is clinically and innately heterogenous illness containing a couple of particular forms each with various causes and severities. Primary open-angle glaucoma (POAG) is the most generally perceived kind of glaucoma. This study investigated the genetic association of single nucleotide polymorphisms (SNPs; rs10483727 and rs33912345) at the SIX1/SIX6 locus with primary open-angle glaucoma (POAG) in the Pakistani population. The SIX6 gene plays an important role in ocular development and has been associated with morphology of the optic nerve. A total of 100 patients clinically diagnosed with glaucoma and 100 control individuals of age over 40 were enrolled in the study. Genomic DNA was extracted by organic extraction method. The SNP genotyping was done by (i) PCR based restriction fragment length polymorphism (RFLP) and sequencing method. Significant genetic associations were observed for rs10483727 (risk allele T) and rs33912345 (risk allele C) with POAG. Hence, it was concluded that Six6 gene is genetically associated with pathogenesis of Glaucoma in Pakistan.Keywords: genotyping, Pakistani population, primary open-angle glaucoma, SIX6 gene
Procedia PDF Downloads 1848559 [Keynote Speech]: An Overview on the Effectiveness of Critical Thinking on Knowledge
Authors: Solehah Yaacob
Abstract:
The study focuses on revisiting the effectiveness of Critical Thinking in human mind capability as a major faculty in human life. The tool used as a measurement of this knowledge ability consists of several processes including experience and education background. To emphasize the `Overview` concept, the researcher highlights two major aspects of philosophical approach, they are; Divine Revelation Concept and Modern Scientific Theory. The research compares between the both parties to introduce the Divine Revelation into Modern Scientific theory. An analytical and critical study of the both concepts become the methodology of the discussion.Keywords: critical thinking, knowledge, intellectual, language
Procedia PDF Downloads 4388558 Mobile Cloud Computing: How to Improve
Authors: Abdullah Aljumah, Tariq Ahamad
Abstract:
The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.Keywords: Cloud Computing, MCC, SAAS, computer interaction
Procedia PDF Downloads 3818557 Implementation of Human Resource Management in Greek Law Enforcement Agencies
Authors: Konstantinos G. Papaioannou, Panagiotis K. Serdaris
Abstract:
This study, examines the level of implementation of Human Resource Management (HRM) activities in law enforcement agencies in Greece. Recognizing that HRM is crucial for maximizing organizational performance, the study aims to evaluate its application within Greek law enforcement. A quantitative-descriptive survey was conducted, involving 996 executives from Greek Law Enforcement Agencies (477 from the Hellenic Police and 519 from the Hellenic Coast Guard), through random sampling. The survey, revealed significant concerns regarding the minimal implementation of HRM practices, in both agencies. The findings indicate that HRM practices, such as HR planning, recruitment, job position, selection, training and development, personnel management, compensation, labor relations and health and safety, are minimally applied. Neither the Hellenic Police nor the Hellenic Coast Guard appears to follow a comprehensive HRM plan. The study, contributes both theoretically and practically by highlighting the lack of HRM implementation in these agencies. The data suggest that by adopting strategic HRM practices, these organizations can enhance personnel performance and better fulfill their societal roles. Future research should extend to law enforcement agencies in other countries to draw more representative conclusion.Keywords: coastguard, human resources management, law enforcement agencies, performance management, police
Procedia PDF Downloads 458556 Human Trafficking in Your Backyard: Know the Signs and How to Help
Authors: Jessie Fazel, Kristen Smith
Abstract:
Human trafficking is a multi-billion-dollar criminal industry that affects 24.9 million people around the world. There are several different types of trafficking, the most common being sex trafficking, labor trafficking, and domestic servitude. Survival sex is common in the pediatric population, as they engage in sex for food, a place to sleep, or other basic needs. Statistics show that health care workers are at a unique advantage to help identify victims and get them the help they need, as 88% of trafficked victims encounter a health care worker while being trafficked. Unfortunately, victims don’t usually self-identify that they are being trafficked and the situations they face can vary dramatically. It is imperative to remember that traditional red flags are not always present in the pediatric population. Risk factors and red flags with their history and physical exam are one of the best indicators that health care providers need to be vigilant in looking at. There are numerous barriers for disclosure in the healthcare setting. Periods of time before and after disclosure are often emotionally difficult and could be dangerous for the victim. It is extremely important to have a plan in place for intervention if the victim does disclose trafficking. A trauma informed approach to medical and mental health interventions, that focus on safety, are vital in this population. This is happening where you live and you can make a difference in their lives.Keywords: human trafficking, public health, emergency medicine, sexual health
Procedia PDF Downloads 328555 Intrabody Communication Using Different Ground Configurations in Digital Door Lock
Authors: Daewook Kim, Gilwon Yoon
Abstract:
Intrabody communication (IBC) is a new way of transferring data using human body as a medium. Minute current can travel though human body without any harm. IBC can remove electrical wires for human area network. IBC can be also a secure communication network system unlike wireless networks which can be accessed by anyone with bad intentions. One of the IBC systems is based on frequency shift keying modulation where individual data are transmitted to the external devices for the purpose of secure access such as digital door lock. It was found that the quality of IBC data transmission was heavily dependent on ground configurations of electronic circuits. Reliable IBC transmissions were not possible when both of the transmitter and receiver used batteries as circuit power source. Transmission was reliable when power supplies were used as power source for both transmitting and receiving sites because the common ground was established through the grounds of instruments such as power supply and oscilloscope. This was due to transmission dipole size and the ground effects of floor and AC power line. If one site used battery as power source and the other site used the AC power as circuit power source, transmission was possible.Keywords: frequency shift keying, ground, intrabody, communication, door lock
Procedia PDF Downloads 4188554 Chaos in a Stadium-Shaped 2-D Quantum Dot
Authors: Roger Yu
Abstract:
A numerical scheme has been developed to solve wave equations for chaotic systems such as stadium-shaped cavity. The same numerical method can also be used for finding wave properties of rectangle cavities with randomly placed obstacles. About 30k eigenvalues have been obtained accurately on a normal circumstance. For comparison, we also initiated an experimental study which determines both eigenfrequencies and eigenfunctions of a stadium-shaped cavity using pulse and normal mode analyzing techniques. The acoustic cavity was made adjustable so that the transition from nonchaotic (circle) to chaotic (stadium) waves can be investigated.Keywords: quantum dot, chaos, numerical method, eigenvalues
Procedia PDF Downloads 1178553 Clinch Process Simulation Using Diffuse Elements
Authors: Benzegaou Ali, Brani Benabderrahmane
Abstract:
This work describes a numerical study of the TOX–clinching process using diffuse elements. A computer code baptized SEMA "Static Explicit Method Analysis" is developed to simulate the clinch joining process. The FE code is based on an Updated Lagrangian scheme. The used resolution method is based on an explicit static approach. The integration of the elasto-plastic behavior law is realized with an algorithm of Simo and Taylor. The tools are represented by plane facets.Keywords: diffuse elements, numerical simulation, clinching, contact, large deformation
Procedia PDF Downloads 3638552 Human Action Retrieval System Using Features Weight Updating Based Relevance Feedback Approach
Authors: Munaf Rashid
Abstract:
For content-based human action retrieval systems, search accuracy is often inferior because of the following two reasons 1) global information pertaining to videos is totally ignored, only low level motion descriptors are considered as a significant feature to match the similarity between query and database videos, and 2) the semantic gap between the high level user concept and low level visual features. Hence, in this paper, we propose a method that will address these two issues and in doing so, this paper contributes in two ways. Firstly, we introduce a method that uses both global and local information in one framework for an action retrieval task. Secondly, to minimize the semantic gap, a user concept is involved by incorporating features weight updating (FWU) Relevance Feedback (RF) approach. We use statistical characteristics to dynamically update weights of the feature descriptors so that after every RF iteration feature space is modified accordingly. For testing and validation purpose two human action recognition datasets have been utilized, namely Weizmann and UCF. Results show that even with a number of visual challenges the proposed approach performs well.Keywords: relevance feedback (RF), action retrieval, semantic gap, feature descriptor, codebook
Procedia PDF Downloads 4758551 Regulating Transnational Corporations and Protecting Human Rights: Analyzing the Efficiency of International Legal Framework
Authors: Stellina Jolly
Abstract:
July 18th to August 19th 2013 has gone down in the history of India for undertaking the country’s first environment referendum. The Supreme Court had ruled that the Vedanta Group's bauxite mining project in the Niyamgiri Hills of Orissa will have to get clearance from the gram sabha, which will consider the cultural and religious rights of the tribals and forest dwellers living in Rayagada and Kalahandi districts. In the Niyamgiri hills, people of small tribal hamlets were asked to voice their opinion on bauxite mining in their habitat. The ministry has reiterated its stand that mining cannot be allowed on the Niyamgiri hills because it will affect the rights of the Dongria Kondhs. The tribal person who occupies the Niyamgiri Hills in Eastern India accomplished their first success in 2010 in their struggle to protect and preserve their existence, culture and land against Vedanta a London-based mining giant. In August, 2010 Government of India revoked permission for Vedanta Resources to mine bauxite from hills in Orissa State where the Dongria Kondh live as forest dwellers. This came after various protests and reports including amnesty report wherein it highlighted that an alumina refinery in eastern India operated by a subsidiary of mining company. Vedanta was accused of causing air and water pollution that threatens the health of local people and their access to water. The abuse of human rights by corporate is not a new issue it has occurred in Africa, Asia and other parts of the world. Paper focuses on the instances and extent of human right especially in terms of environment violations by corporations. Further Paper details on corporations and sustainable development. Paper finally comes up with certain recommendation including call for a declaration by United Nations on Corporate environment Human Rights Liability.Keywords: environment, corporate, human rights, sustainable development
Procedia PDF Downloads 4768550 Authoring Tactile Gestures: Case Study for Emotion Stimulation
Authors: Rodrigo Lentini, Beatrice Ionascu, Friederike A. Eyssel, Scandar Copti, Mohamad Eid
Abstract:
The haptic modality has brought a new dimension to human computer interaction by engaging the human sense of touch. However, designing appropriate haptic stimuli, and in particular tactile stimuli, for various applications is still challenging. To tackle this issue, we present an intuitive system that facilitates the authoring of tactile gestures for various applications. The system transforms a hand gesture into a tactile gesture that can be rendering using a home-made haptic jacket. A case study is presented to demonstrate the ability of the system to develop tactile gestures that are recognizable by human subjects. Four tactile gestures are identified and tested to intensify the following four emotional responses: high valence – high arousal, high valence – low arousal, low valence – high arousal, and low valence – low arousal. A usability study with 20 participants demonstrated high correlation between the selected tactile gestures and the intended emotional reaction. Results from this study can be used in a wide spectrum of applications ranging from gaming to interpersonal communication and multimodal simulations.Keywords: tactile stimulation, tactile gesture, emotion reactions, arousal, valence
Procedia PDF Downloads 3718549 The OQAM-OFDM System Using WPT/IWPT Replaced FFT/IFFT
Authors: Alaa H. Thabet, Ehab F. Badran, Moustafa H. Aly
Abstract:
With the rapid expand of wireless digital communications, demand for wireless systems that are reliable and have a high spectral efficiency have increased too. FBMC scheme based on the OFDM/OQAM has been recognized for its good performance to achieve high data rates. Fast Fourier Transforms (FFT) has been used to produce the orthogonal sub-carriers. Due to the drawbacks of OFDM -FFT based system which are the high peak-to-average ratio (PAR) and the synchronization. In this paper, Wavelet Packet Transform (WPT) is used in the place of FFT, and show better performance.Keywords: OQAM-OFDM, wavelet packet transform, PAPR, FFT
Procedia PDF Downloads 4608548 Problems and Prospects of an Intelligent Investment in Kazakh Society
Authors: Sultanbayeva Gulmira Serikbayevna, Golovchun Aleftina Anatolyevna
Abstract:
The development of any nation is directly related to the development of human capital in it. A human development is an increase its intellectual potential, its compliance with the requirements of time, present and future society. Demands of globalization cannot limit the processes of national traditions. The education system must be formed on the basis of international practice of cultural development. In Kazakhstan, where modernization changes are rapidly developing, the education system should be formed in two ways: first, on a national basis, and secondly, based on global best practices. There is the need to recognize and promote the importance of education as a value. The world community considers the problem of spiritual values. Along with individual values, spiritual values are also universal values. Formation of values such as the presence in young people a sense of respect for their homeland, social responsibility, respect the culture and traditions of its people is the most important task than the possession of material goods. When forming the intellectual nation, values in the field of education and science become investments for the development of the society, as well as education and science today transformed into the most important capital.Keywords: human capital, humanitarian technology, intangible assets, intelligent nation, society of knowledge
Procedia PDF Downloads 3188547 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union
Authors: María Elena Menéndez Ibáñez
Abstract:
After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.Keywords: border control, immigration, international cooperation, national security
Procedia PDF Downloads 1388546 Jurisprudencial Analysis of Torture in Spain and in the European Human Rights System
Authors: María José Benítez Jiménez
Abstract:
Article 3 of the European Convention for the Protection of Human Rights and Fundamental Freedoms (E.C.H.R.) proclaims that no one may be subjected to torture, punishment or degrading treatment. The legislative correlate in Spain is embodied in Article 15 of the Spanish Constitution, and there must be an overlapping interpretation of both precepts on the ideal plane. While it is true that there are not many cases in which the European Court of Human Rights (E.C.t.H.R. (The Strasbourg Court)) has sanctioned Spain for its failure to investigate complaints of torture, it must be emphasized that the tendency to violate Article 3 of the Convention appears to be on the rise, being necessary to know possible factors that may be affecting it. This paper addresses the analysis of sentences that directly or indirectly reveal the violation of Article 3 of the European Convention. To carry out the analysis, sentences of the Strasbourg Court have been consulted from 2012 to 2016, being able to address any previous sentences to this period if it provided justified information necessary for the study. After the review it becomes clear that there are two key groups of subjects that request a response to the Strasbourg Court on the understanding that they have been tortured or degradingly treated. These are: immigrants and terrorists. Both phenomena, immigration and terrorism, respond to patterns that have mutated in recent years, and it is important for this study to know if national regulations begin to be dysfunctional.Keywords: E.C.H.R., E.C.t.H.R. sentences, Spanish Constitution, torture
Procedia PDF Downloads 1608545 Conjugated Linoleic Acid (CLA) Health Benefits and Sources
Authors: Hilal Ahmad Punoo
Abstract:
Conjugated linoleic acid (CLA) is a mixture of positional and geometric isomers of octadecadienoic acid with two conjugated double bonds. Of more than a dozen isomers of CLA found naturally in dairy and meat products from ruminants, c-9, t-11 and t-10, c-12 are the two isomers with known physiological importance, including anticarcinogenic, antidiabetic, antilipogenic, and antiatherosclerotic effects. Conjugated linoleic acids (CLA) may influence the onset and severity of several chronic diseases, including various cancers, atherosclerosis, obesity, bone density loss, and diabetes. These findings are of special interest to the agriculture community, because dietary sources of CLA are almost exclusively beef and dairy products. Thus, a better understanding of the specific isomers and mechanisms responsible for these positive effects of CLA on human health would be both prudent and economically beneficial. To date, research related to the advantages of CLA consumption on human health has been conducted using experimental laboratory animals and cell culture systems. These data consistently show that relatively low levels of CLA can influence risk of cancer. Further, very recent investigations suggest that the predominate CLA isoform (cis-9, trans-11 CLA or rumenic acid) found in beef and milk fat possesses anticarcinogenic effects but does not alter body composition; the trans-10, cis-12 CLA has been shown to inhibit lipogenesis. Clearly, further work, especially using human subjects, will be required to characterize the potential benefits of CLA consumption on human health. Moreover, we suggest that foods naturally containing high amounts of CLA (e.g., beef and dairy products) be considered as meeting the definition of functional foods.Keywords: conjugated linoleic acid, potential health benefits, fats, animals, humans
Procedia PDF Downloads 308