Search results for: text presentation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2537

Search results for: text presentation

977 Instructional Immediacy Practices in Asynchronous Learning Environment: Tutors' Perspectives

Authors: Samar Alharbi, Yota Dimitriadi

Abstract:

With the exponential growth of information and communication technologies in higher education, new online teaching strategies have become increasingly important for student engagement and learning. In particular, some institutions depend solely on asynchronous e-learning to provide courses for their students. The major challenge facing these institutions is how to improve the quality of teaching and learning in their asynchronous tools. One of the most important methods that can help e-learner to enhance their social learning and social presence in asynchronous learning setting is immediacy. This study explores tutors perceptions of their instructional immediacy practices as part of their communication actions in online learning environments. It was used a mixed-methods design under the umbrella of pragmatic philosophical assumption. The participants included tutors at an educational institution in a Saudi university. The participants were selected with a purposive sampling approach and chose an institution that offered fully online courses to students. The findings of the quantitative data show the importance of teachers’ immediacy practices in an online text-based learning environment. The qualitative data contained three main themes: the tutors’ encouragement of student interaction; their promotion of class participation; and their addressing of the needs of the students. The findings from these mixed methods can provide teachers with insights into instructional designs and strategies that they can adopt in order to use e-immediacy in effective ways, thus improving their students’ online learning experiences.

Keywords: asynchronous e-learning, higher education, immediacy, tutor

Procedia PDF Downloads 190
976 Deaf Inmates in Canadian Prisons: Addressing Discrimination through Staff Training Videos with Deaf Actors

Authors: Tracey Bone

Abstract:

Deaf inmates, whose first or preferred language is a Signed Language, experience barriers to accessing the necessary two-way communication with correctional staff, and the educational and social programs that will enhance their eligibility for conditional release from the federal prison system in Canada. The development of visual content to enhance the knowledge and skill development of correctional staff is a contemporary strategy intended to significantly improve the correctional experience for deaf inmates. This presentation reports on the development of two distinct training videos created to enhance staff’s understanding of the needs of deaf inmates; one a two-part simulation of an interaction with a deaf inmate, the second an interview with a deaf academic. Part one of video one demonstrates the challenges and misunderstandings inherent in communicating across languages without a qualified sign language interpreter; the second part demonstrates the ease of communication when communication needs are met. Video two incorporates the experiences of a deaf academic to provide the cultural grounding necessary to educate staff in the unique experiences associated with being a visual language user. Lack of staff understanding or awareness of deaf culture and language must not be acceptable reasons for the inadequate treatment of deaf visual language users in federal prisons. This paper demonstrates a contemporary approach to meeting the human rights and needs of this unique and often ignored inmate subpopulation. The deaf community supports this visual approach to enhancing staff understanding of the unique needs of this population. A study of its effectiveness is currently underway.

Keywords: accommodations, American Sign Language (ASL), deaf inmates, sensory deprivation

Procedia PDF Downloads 139
975 Identifying Enablers and Barriers of Healthcare Knowledge Transfer: A Systematic Review

Authors: Yousuf Nasser Al Khamisi

Abstract:

Purpose: This paper presents a Knowledge Transfer (KT) Framework in healthcare sectors by applying a systematic literature review process to the healthcare organizations domain to identify enablers and barriers of KT in Healthcare. Methods: The paper conducted a systematic literature search of peer-reviewed papers that described key elements of KT using four databases (Medline, Cinahl, Scopus, and Proquest) for a 10-year period (1/1/2008–16/10/2017). The results of the literature review were used to build a conceptual framework of KT in healthcare organizations. The author used a systematic review of the literature, as described by Barbara Kitchenham in Procedures for Performing Systematic Reviews. Findings: The paper highlighted the impacts of using Knowledge Management (KM) concept at a healthcare organization in controlling infectious diseases in hospitals, improving family medicine performance and enhancing quality improvement practices. Moreover, it found that good-coding performance is analytically linked with a knowledge sharing network structure rich in brokerage and hierarchy rather than in density. The unavailability or ignored of the latest evidence on more cost-effective or more efficient delivery approaches leads to increase the healthcare costs and may lead to unintended results. Originality: Search procedure produced 12,093 results, of which 3523 were general articles about KM and KT. The titles and abstracts of these articles had been screened to segregate what is related and what is not. 94 articles identified by the researchers for full-text assessment. The total number of eligible articles after removing un-related articles was 22 articles.

Keywords: healthcare organisation, knowledge management, knowledge transfer, KT framework

Procedia PDF Downloads 128
974 Digital Forensic Exploration Framework for Email and Instant Messaging Applications

Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed

Abstract:

Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.

Keywords: forensics, network sessions, packet reconstruction, packet reordering

Procedia PDF Downloads 329
973 Driver Take-Over Time When Resuming Control from Highly Automated Driving in Truck Platooning Scenarios

Authors: Bo Zhang, Ellen S. Wilschut, Dehlia M. C. Willemsen, Marieke H. Martens

Abstract:

With the rapid development of intelligent transportation systems, automated platooning of trucks is drawing increasing interest for its beneficial effects on safety, energy consumption and traffic flow efficiency. Nevertheless, one major challenge lies in the safe transition of control from the automated system back to the human drivers, especially when they have been inattentive after a long period of highly automated driving. In this study, we investigated driver take-over time after a system initiated request to leave the platooning system Virtual Tow Bar in a non-critical scenario. 22 professional truck drivers participated in the truck driving simulator experiment, and each was instructed to drive under three experimental conditions before the presentation of the take-over request (TOR): driver ready (drivers were instructed to monitor the road constantly), driver not-ready (drivers were provided with a tablet) and eye-shut. The results showed significantly longer take-over time in both driver not-ready and eye-shut conditions compared with the driver ready condition. Further analysis revealed hand movement time as the main factor causing long response time in the driver not-ready condition, while in the eye-shut condition, gaze reaction time also influenced the total take-over time largely. In addition to comparing the means, large individual differences can be found especially in two driver, not attentive conditions. The importance of a personalized driver readiness predictor for a safe transition is concluded.

Keywords: driving simulation, highly automated driving, take-over time, transition of control, truck platooning

Procedia PDF Downloads 241
972 Writing Hybridized Narratives to Enact Scientific Literacy and the Myth of the Scientific Method

Authors: Ajaz Shaheen, Jawaid Ahmed Siddqui

Abstract:

This world has purely become scientific and technological, and therefore it demands more from our young learners to be more intellectual in learning sciences. A point of concern that is dragging the attention of educationists is that young learners are gradually detaching from science and scientific theory. To deal with this matter, we must arrange such engaging activities that may improve the imaginative skills of our young learners. Our ongoing research program highlights the effects of such activities that demand the learners to interpret scientific information in the form of text they possess. These mixed stories are also known as what we call BioStories. Learners upload their narratives on different websites to let their peers go through their manuscripts. That, as a result, brings more refinement to their works. Moreover, stories allow the learners to read, understand and learn on a broader spectrum. We have conducted separate studies with learners from Grades 6, 9, and 12 that involve case studies and quasi-experimental designs. The conclusion we drew from the analysis of Grade 6 learners was that the alignment of stories helped them become more familiar with the scientific issue. Not only this but also the learners of the respective grade built up their interest in the subject and also developed a clear understanding of related subject topics. On the other hand, results from the 8th and 9th grades study support the argument that learners reflected a positive attitude toward writing scientific information. Lastly, we concluded from the 12th-grade learners that they took pride in their writing skills and built up their strength, determination, and interest. The students became self-conscious as they wrote hybridized scientific narratives in science.

Keywords: BioStories, hybridized writing, scientific literacy, scientific method

Procedia PDF Downloads 67
971 Diversity and Distribution of Butterflies (Lepidoptera-Rhopalocera) along with Altitudinal Gradient and Vegetation Types at Lahoul Valley, Trans-Himalaya Region, India

Authors: Saveena Bogtapa, Jagbir Singh Kirti

Abstract:

Himalaya is one of the most fascinating ranges in the world. In India, it comprises 18 percent of the land area. Lahoul valley which is a part of Trans-Himalaya region is well known for its unique, diverse flora and fauna. It lies in the North-Eastern corner of the state Himachal Pradesh where its altitude ranges between 2500m to 5000m. Vegetation of this region is dry-temperate to alpine type. The diversity of the area is very less, rare, unique and highly endemic. But today, as a lot of environmental degradation has taken place in this hot spot of biodiversity because of frequent developmental and commercial activities which lead to the diversity of this area comes under a real threat. Therefore, as part of the research, butterflies which are known for their attractiveness as well as usefulness to the ecosystem, are used for the study. The diversity of butterflies of a particular area not only provides a healthy environment but also serves as the first step of conservation to the biodiversity. Their distribution in different habitats and altitude type helps us to understand the species richness and abundance in an area. Moreover, different environmental parameters which affect the butterfly community has also recorded. Hence, the present study documents the butterfly diversity in an unexplored habitat and altitude types at Lahoul valley. The valley has been surveyed along with altitudinal gradients (from 2500m to 4500m) and in various habitats like agriculture land, grassland, scrubland, riverine and in different types of forests. Very rare species of butterflies have been explored, and these will be discussed along with different parameters during the presentation.

Keywords: butterflies, diversity, Lahoul valley, altitude, vegetation

Procedia PDF Downloads 237
970 Implementation of Lean Production in Business Enterprises: A Literature-Based Content Analysis of Implementation Procedures

Authors: P. Pötters, A. Marquet, B. Leyendecker

Abstract:

The objective of this paper is to investigate different implementation approaches for the implementation of Lean production in companies. Furthermore, a structured overview of those different approaches is to be made. Therefore, the present work is intended to answer the following research question: What differences and similarities exist between the various systematic approaches and phase models for the implementation of Lean Production? To present various approaches for the implementation of Lean Production discussed in the literature, a qualitative content analysis was conducted. Within the framework of a qualitative survey, a selection of texts dealing with lean production and its introduction was examined. The analysis presents different implementation approaches from the literature, covering the descriptive aspect of the study. The study also provides insights into similarities and differences among the implementation approaches, which are drawn from the analysis of latent text contents and author interpretations. In this study, the focus is on identifying differences and similarities among systemic approaches for implementing Lean Production. The research question takes into account the main object of consideration, objectives pursued, starting point, procedure, and endpoint of the implementation approach. The study defines the concept of Lean Production and presents various approaches described in literature that companies can use to implement Lean Production successfully. The study distinguishes between five systemic implementation approaches and seven phase models to help companies choose the most suitable approach for their implementation project. The findings of this study can contribute to enhancing transparency regarding the existing approaches for implementing Lean Production. This can enable companies to compare and contrast the available implementation approaches and choose the most suitable one for their specific project.

Keywords: implementation, lean production, phase models, systematic approaches

Procedia PDF Downloads 83
969 Identification of Flooding Attack (Zero Day Attack) at Application Layer Using Mathematical Model and Detection Using Correlations

Authors: Hamsini Pulugurtha, V.S. Lakshmi Jagadmaba Paluri

Abstract:

Distributed denial of service attack (DDoS) is one altogether the top-rated cyber threats presently. It runs down the victim server resources like a system of measurement and buffer size by obstructing the server to supply resources to legitimate shoppers. Throughout this text, we tend to tend to propose a mathematical model of DDoS attack; we discuss its relevancy to the choices like inter-arrival time or rate of arrival of the assault customers accessing the server. We tend to tend to further analyze the attack model in context to the exhausting system of measurement and buffer size of the victim server. The projected technique uses an associate in nursing unattended learning technique, self-organizing map, to make the clusters of identical choices. Lastly, the abstract applies mathematical correlation and so the standard likelihood distribution on the clusters and analyses their behaviors to look at a DDoS attack. These systems not exclusively interconnect very little devices exchanging personal data, but to boot essential infrastructures news standing of nuclear facilities. Although this interconnection brings many edges and blessings, it to boot creates new vulnerabilities and threats which might be conversant in mount attacks. In such sophisticated interconnected systems, the power to look at attacks as early as accomplishable is of paramount importance.

Keywords: application attack, bandwidth, buffer correlation, DDoS distribution flooding intrusion layer, normal prevention probability size

Procedia PDF Downloads 208
968 The Issue of Online Fake News and Disinformation: Criminal and Criminological Aspects of Prevention

Authors: Fotios Spyropoulos, Evangelia Androulaki, Vasileios Karagiannopoulos, Aristotelis Kompothrekas, Nikolaos Karagiannis

Abstract:

The problem of 'fake news' and 'hoaxes' has dominated in recent years the field of news, politics, economy, safety, and security as dissemination of false information can intensively affect and mislead public discourse and public opinion. The widespread use of internet and social media platforms can substantially intensify these effects, which often include public fear and insecurity. Misinformation, malinformation, and disinformation have also been blamed for affecting election results in multiple countries, and since then, there have been efforts to tackle the phenomenon both on national and international level. The presentation will focus on methods of prevention of disseminating false information on social media and on the internet and will discuss relevant criminological views. The challenges that have arisen for criminal law will be covered, taking into account the potential need for a multi-national approach required in order to mitigate the extent and negative impact of the fake news phenomenon. Finally, the analysis will include a discussion on the potential usefulness of non-legal modalities of regulation and crime prevention, especially situational and social measures of prevention and the possibility of combining an array of methods to achieve better results on national and international level. This project has received funding from the Hellenic Foundation for Research and Innovation (HFRI) and the General Secretariat for Research and Technology (GSRT), under grant agreement No 80529.

Keywords: cybercrime, disinformation, fake news, prevention

Procedia PDF Downloads 134
967 Deposition of Size Segregated Particulate Matter in Human Respiratory Tract and Their Health Effects in Glass City Residents

Authors: Kalpana Rajouriya, Ajay Taneja

Abstract:

Particulates are ubiquitous in the air environment and cause serious threats to human beings, such as lung cancer, COPD, and Asthma. Particulates mainly arise from industrial effluent, vehicular emission, and other anthropogenic activities. In the glass industrial city Firozabad, real-time monitoring of size segregated Particulate Matter (PM) and black carbon was done by Aerosol Black Carbon Detector (ABCD) and GRIMM portable aerosol Spectrometer at two different sites in which one site is urban and another is rural. The average mass concentration of size segregated PM during the study period (March & April 2022) was recorded as PM10 (223.73 g/m⁻³), PM5.0 (44.955 g/m⁻³), PM2.5 (59.275 g/m⁻³), PM1.0 (33.02 g/m⁻³), PM0.5 (2.05 g/m⁻³), and PM0.25 (2.99 g/m⁻³). The highest concentration of BC was found in Urban due to the emissions from diesel engines and wood burning, while NO2 was highest at the rural sites. The average concentrations of PM10 (6.08 and 2.73 times) PM2.5 exceeded the NAAQS and WHO guidelines. Particulate Matter deposition and health risk assessment was done by MPPD and USEPA model to know about the particulate matter toxicity in industrial residents. Health risk assessment results showed that Children are most likely to be affected by exposure of PM10 and PM2.5 and may have various non-carcinogenic and carcinogenic diseases. Deposition results inferred that the sensitive exposed population, especially 9 years old children, have high PM deposition as well as visualization and may be at risk of developing health-related problems from exposure to size-segregated PM. They will be discussed during presentation.

Keywords: particulate matter, black carbon, NO2, deposition of PM, health risk

Procedia PDF Downloads 55
966 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools

Authors: M. Kaya, M. Eris

Abstract:

Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.

Keywords: block matching, digital evidence, hash list, evaluation of digital evidence

Procedia PDF Downloads 243
965 Functionality of Promotional and Advertising Texts: Pragmatic Implications for English-Arabic Translation

Authors: Jamal Gaber Abdalla

Abstract:

In business promotion and advertising, language is used intentionally to create a powerful influence over people and their behavior. In commercial and marketing activities, the choice of language to convey specific messages with the intention of influencing people is pragmatically important. Design and visual content in promotional and advertising texts also have a great persuasive impact on consumers. It is the functional combination of design, language and visual content that helps people to identify a product or service and remember it. Translating promotional and advertising texts between structurally and culturally different languages, such as English and Arabic, usually involves pragmatic/functional shifts that decide the quality of translation. This study explores some of these shifts in translating promotional and advertising texts between English and Arabic and their implications for translation quality. The study is based on a contrastive analysis of data collected from real samples of English-Arabic translations of promotional and advertising texts. The samples cover different promotional and advertising text types and different business domains. The aim is to identify the most recurrent translation shifts and most used translation approaches/strategies that achieve quality in view of the functional nature of promotional and advertising texts and target language culture conventions. The study shows that linguistic shifts and visual shifts are recurrent in English-Arabic translations of promotional and advertising texts. The study also shows that the most commonly used translation approaches/strategies are functional translation, domestication, communicative translation.

Keywords: advertising, Arabic, English, functional translation, promotion

Procedia PDF Downloads 342
964 The Impact of Online Advertising on Generation Y’s Purchase Decision in Malaysia

Authors: Mui Joo Tang, Eang Teng Chan

Abstract:

Advertising is commonly used to foster sales and reputation of an institution. It is at first the growth of print advertising that has increased the population and number of periodicals of newspaper and its circulation. The rise of Internet and online media has somehow blurred the role of media and advertising though the intention is still to reach out to audience and to increase sales. The relationship between advertising and audience on a product purchase through persuasion has been developing from print media to online media. From the changing media environment and audience, it is the concern of this research to study the impact of online advertising to such a relationship cycle. The content of online advertisements is much of text, multimedia, photo, audio and video. The messages of such content format may indeed bring impacts to its audience and its credibility. This study is therefore reflecting the effectiveness of online advertisement and its influences on generation Y in their purchasing behavior. This study uses Media Dependency Theory to analyze the relationship between the impact of online advertisement and media usage pattern of generation Y. Hierarchy of Effectiveness Model is used as a marketing communication model to study the effectiveness of advertising and further to determine the impact of online advertisement on generation Y in their purchasing decision making. This research uses online survey to reach out the sample of generation Y. The results have shown that online advertisements do not affect much on purchase decision making even though generation Y relies much on the media content including online advertisement for its information and believing in its credibility. There are few other external factors that may interrupt the effectiveness of online advertising. The very obvious influence of purchasing behavior is actually derived from the peers.

Keywords: generation Y, purchase decision, print media, online advertising, persuasion

Procedia PDF Downloads 513
963 Identifying E-Learning Components at North-West University, Mafikeng Campus

Authors: Sylvia Tumelo Nthutang, Nehemiah Mavetera

Abstract:

Educational institutions are under pressure from their competitors. Regulators and community groups need educational institutions to adopt appropriate business and organizational practices. Globally, educational institutions are now using e-learning as the best teaching and learning approach. E-learning is becoming the center of attention to the learning institutions, educational systems and software inventors. North-West University (NWU) is currently using eFundi, a Learning Management System (LMS). LMS are all information systems and procedures that adds value to students learning and support the learning material in text or any multimedia files. With various e-learning tools, students would be able to access all the materials related to the course in electronic copies. The study was tasked with identifying the e-learning components at the NWU, Mafikeng campus. Quantitative research methodology was considered in data collection and descriptive statistics for data analysis. The Activity Theory (AT) was used as a theory to guide the study. AT outlines the limitations amongst e-learning at the macro-organizational level (plan, guiding principle, campus-wide solutions) and micro-organization (daily functioning practice, collaborative transformation, specific adaptation). On a technological environment, AT gives people an opportunity to change from concentrating on computers as an area of concern but also understand that technology is part of human activities. The findings have identified the university’s current IT tools and knowledge on e-learning elements. It was recommended that university should consider buying computer resources that consumes less power and practice e-learning effectively.

Keywords: e-learning, information and communication technology (ICT), teaching, virtual learning environment

Procedia PDF Downloads 267
962 The Impact of Diabetes Mellitus on Skin and Soft Tissue Infections

Authors: Stephanie Cheng, Benjamin Poh, Vivyan Tay, Sachin Mathur

Abstract:

Aim: Diabetes mellitus (DM) is a worldwide pandemic affecting 500 million people. It is known to be associated with increased susceptibility to soft tissue infections (STI). Despite being a major public health burden, the literature relating the effects of DM and the presentation, severity and healing of STIs in general surgical patients remain limited. Methods: We conducted a retrospective review of all patients admitted with STI in a tertiary teaching hospital over a 12-month period. Patient demographics and surgical outcomes were collected and analyzed. Results: During the study period, 1059 patients were admitted for STIs, of which 936 (88%) required surgical intervention. Diabetic patients were presented with a higher body-mass index (BMI) (28 vs 26), larger abscess size (24 vs 14 cm²) and a longer length of stay (LOS)(4.4 days vs 2.9 days). They also underwent a higher proportion of wide debridement as well as application of negative pressure wound therapy (NPWT) (42% vs 35%). More diabetic patients underwent subsequent re-operation within the same sitting (8 vs 4). There were no differences in re-admission rates within 30 days nor subsequent abscess formation in those followed for 6 months. Conclusion: The incidence of STIs among DM patients represents a significant disease burden; surgeons should consider intensive patient counseling and partnering with primary care providers in order to help reduce the incidence of future STI admissions based on lifestyle modification and glucose control.

Keywords: general surgery, emergency general surgery, acute care surgery, soft tissue infections, diabetes mellitus

Procedia PDF Downloads 35
961 Changes in Knowledge and Awareness for a Community-Based Cancer Screening Educational Program

Authors: Shenghui Wu, Patricia Chalela, Amelie G. Ramirez

Abstract:

Background: Cervical cancer (CC), colorectal cancer (CRC), and breast cancer (BC) are diseases that can be prevented/detected through early test. Through educational programs, individuals can become better informed about these cancers and understand the importance of screening and early detection. A community-based educational program was developed to improve knowledge and awareness toward the screening of the three cancer types in a South Texas underserved population. Methods: Residents living in Laredo, Texas were invited to participate in the present study. From January 2020 to April 2021, participants were recruited using social media and flyer distributions in general community. Participants received a free live web cancer education presentation delivered by bilingual community health educators, and online pre- and post-education surveys for CC, CRC, and BC separately. Pre-post changes in knowledge for individual items were compared using McNemar’s chi-squared tests. Results: Overall, participants demonstrated increases in CC (n=237), CRC (n=59), and BC (n=56) screening knowledge and awareness after receiving the cancer screening education (Ps<0.05). After receiving the cancer screening education, 85-97% of participants had an intent to talk to a healthcare provider about CC/CRC/BC screening, 88-97% had an intent to get a CC/CRC/BC screening test in the next 12 months or at the next routine appointment, and 90-97% had an intent to talk about CC/CRC/BC with their family members or friends. Conclusion: A community-based educational program can help increase knowledge and awareness about cervical, colorectal, and breast cancer screening, promote positive changes in population's knowledge and awareness about the benefits of cancer screening.

Keywords: cervical cancer, colorectal cancer, breast cancer, educational program, health knowledge, awareness, Hispanics, screening, health education

Procedia PDF Downloads 94
960 Maternal, Fetal and Neonatal Outcomes of Elective Versus Emergency Cesarean Deliveries

Authors: Poonam Chouhan, Rama Thakur, R. J. Mahajan, Kushla Pathania, Mehnaz Kumar

Abstract:

Background: Cesarean sections are associated with short- and long-term risks and affect the health of the woman, her child, and future pregnancies. We conducted a study to compare Maternal, fetal, and neonatal elective versus emergency cesarean deliveries in a tertiary care center. Material & Methods: This was a cross-sectional comparative hospital-based study conducted at Kamla Nehru State Hospital for the mother and Child, Department of Obstetrics and Gynecology, Indira Gandhi Medical College, Shimla, from June 1, 2020, to May 31ˢᵗ, 2021). A total of 200 consenting participants (100 participants undergoing elective cesarean section & 100 participants undergoing emergency cesarean section) were enrolled. The analysis was performed using the statistical package for social sciences (SPSS) version 21. Results: Antenatal complications were more in women who had an emergency cesarean section (95%) as compared to those who had an elective cesarean section (46%) (p=0.0076). 26.5% of women had fetal complications, and out of them, 92.4% (49/53) underwent emergency cesarean section. IUGR was diagnosed in 8% of women, out of them, 56.2% had elective cesarean section & 43.8% had an emergency cesarean section. Malpresentation other than breech presentation were present in 3.5% (7/200) of women. Six (3%) women had cesarean section for macrosomia. Of these, 66.7% (4/6) had elective cesarean section & 33.3% had emergency cesarean section. 23% (46/200) neonates required NICU admission, and 5% (10/200) had transient tachypnoea of new-born (TTNB). Conclusion: Our study concluded that maternal and fetal Complications of an emergency cesarean are more as compared to a planned elective cesarean. An elective cesarean conducted well in time will prevent an emergency cesarean delivery and its related complications.

Keywords: maternal, fetal, neonatal, complications, cesareans

Procedia PDF Downloads 75
959 Meanings and Construction: Evolution of Inheriting the Traditions in Chinese Modern Architecture in the 1980s

Authors: Wei Wang

Abstract:

Queli Hotel, Xixi Scenery Spot Reception and Square Pagoda Garden are three important landmarks of localized Chinese modern architecture (LCMA) in the architectural design context of "Inheriting the Traditions in Modern Architecture" in the 1980s. As the most representative cases of LCMA in the 1980s, they interpret the traditions of Chinese garden and imperial roof from different perspectives. Based on the research text, conceptual drawings, construction drawings and site investigation, this paper extracts two groups of prominent contradictions in practice ("Pattern-Material-Structure" and "Type-Topography-Body") for keyword-based analysis to compare and examine different choices and balances by architects. Based on this, this paper attempts to indicate that the ideographic form derived from macro-narrative and the innovative investigation in construction is a pair of inevitable contradictions that must be handled and coordinated in these practices. The collision of the contradictions under specific conditions results in three cognitive attitudes and practical strategies towards traditions: Formal symbolism, spatial abstraction and construction-based narrative. These differentiated thoughts about Localization and Chineseness reflect various professional ideologies and value standpoints in the transition of Chinese Architecture discipline in the 1980s. The great variety in this particular circumstance suggests tremendous potential and possibilities of the future LCMA.

Keywords: construction, meaning, Queli Hotel, square pagoda garden, tradition, Xixi scenery spot reception

Procedia PDF Downloads 137
958 From Medusa to #MeToo: Different Discourses on Sexual Violence with Particular Reference to the Situation in Serbia

Authors: Jelena Riznić

Abstract:

Sexual violence is a social fact that is both ubiquitous and invisible. From the myth of Medusa and Lucretia, through legends about sexual violence in war conflicts, to Hollywood films and other productions — sexual violence exists as a motive, implicitly or explicitly. Many Hollywood films contain a scene of rape, and the media is increasingly reporting on cases of sexual violence, often not following the guidelines for sensitized and ethical reporting. On the other hand, sexual violence remains an invisible phenomenon if we are talking from the perspective of the survivors. Only the wave of women's testimonies that flooded social networks after the #MeToo campaign in 2017 pointed to the prevalence and to the existing ideas about sexual violence that persist at the level of myths in society, but also through formal norms in the hearing of justice systems. The problem is also in the way rape is defined in the criminal codes of different countries, and all of this affects the reproduction of sexual violence. Precisely because it is a deeply intimate experience of violence, but also a structural problem; on the other hand, understanding sexual violence requires sociological imagination. Accordingly, the subject of this paper is the presentation and analysis of various discourses on sexual violence throughout history — pre/anti-feminist, feminist and criminal law, with particular reference to the situation in Serbia. The paper uses a critical review and comparative analysis of various sources on sexual violence, as well as an analysis of the impact of these sources on the modern legal framework that regulates sexual violence. Research has shown that despite feminist contributions, myths about sexual violence persist and influence the treatment of women who have survived violence in criminal systems and society in general.

Keywords: sexual violence, gender-based violence, MeToo campaign, feminism, Serbia

Procedia PDF Downloads 72
957 Visualisation in Health Communication: Taking Weibo Interaction in COVD19 as the Example

Authors: Zicheng Zhang, Linli Zhang

Abstract:

As China's biggest social media platform, Weibo has taken on essential health communication responsibilities during the pandemic. This research takes 105 posters in 15 health-related official Weibo accounts as the analysis objects to explore COVID19 health information communication and visualisation. First, the interaction between the audiences and Weibo, including forwarding, comments, and likes, is statistically analysed. The comments about the information design are extracted manually, and then the sentiment analysis is carried out to verdict audiences' views about the poster's design. The forwarding and comments are quantified as the attention index for a reference to the degree of likes. In addition, this study also designed an evaluation scale based on the standards of Health Literacy Resource by the Centers for Medicare& Medicaid Services (US). Then designers scored all selected posters one by one. Finally, combining the data of the two parts, concluded that: 1. To a certain extent, people think that the posters do not deliver substantive and practical information; 2. Non-knowledge posters(i.e., cartoon posters) gained more Forwarding and Likes, such as Go, Wuhan poster; 3. The analysis of COVID posters is still mainly picture-oriented, mainly about encouraging people to overcome difficulties; 4. Posters for pandemic prevention usually contain more text and fewer illustrations and do not clearly show cultural differences. In conclusion, health communication usually involves a lot of professional knowledge, so visualising that knowledge in an accessible way for the general public is challenging. The relevant posters still have the problems of lack of effective communication, superficial design, and insufficient content accessibility.

Keywords: weibo, visualisation, covid posters, poster design

Procedia PDF Downloads 115
956 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 225
955 Extra Skeletal Manifestations of Histocytosis in Pediatrics

Authors: Ayda Youssef, Mohammed Ali Khalaf, Tarek Rafaat

Abstract:

Background: Langerhans cell histiocytosis (LCH) is a rare multi-systemic disease that shows an abnormal proliferation of these kinds of cells associated with a granular infiltration that affects different structures of the human body, including the lung, liver, spleen, lymph nodes, brain, mucocutaneous, soft tissue (head and neck), and salivary glands. Evaluation of the extent of disease is one of the major predictors of patient outcome. Objectives: To recognize the pathogenesis of Langerhans cell histiocytosis (LCH), describe the radiologic criteria that are suggestive of LCH in different organs rather than the bones and to illustrate the appropriate differential diagnoses for LCH in each of the common extra-osseous sites. Material and methods: A retrospective study was done on 150 biopsy-proven LCH patients from 2007 to 2012. All patients underwent imaging studies, mostly US, CT, and MRI. These patients were reviewed to assess the extra-skeletal manifestations of LCH. Results: In 150 patients with biopsy-proven LCH, There were 33 patients with liver affection, 5 patients with splenic lesions, 55 patients with enlarged lymph nodes, 9 patient with CNS disease and 11 patients with lung involvement. Conclusions: Because of the frequent LCH children and evaluation of the extent of disease is one of the major predictors of patient outcome. Radiologist need to be familiar with its presentation in different organs and regions of body outside the commonest site of affection (bones). A high-index suspicion should be raised a biopsy is recommended in the presence of radiological suspicion. Chemotherapy is the preferred therapeutic modality.

Keywords: langerhans cell histiocytosis, extra-skeletal, pediatrics, radiology

Procedia PDF Downloads 428
954 The Reception of Disclosure of Sexual Teens in Media

Authors: Rizky Kertanegara

Abstract:

Reception studies is one of the cultural studies lately evolved in the realm of communication science. This qualitative study was pioneered by Stuart Hall who initiated the dominant, negotiation, and opposition of audience reading to the text of the media. In its development, this reception studies is developed by Kim Christian Schroder become multidimensional reception studies. In this update, Schroder aware that there has been a bias between readings made by the informant with readings conducted by researchers over the informant. Therefore, he classifies the reception into two dimensions, namely the dimension of reading by informants and implications dimensions conducted by researcher. Using Schroder approach, these studies seek to describe the reception of adolescent girls, as research subjects, to the elements contained sexual openness in the music video Cinta Laura as the object of research. Researcher wanted to see how they interpret the values of Western culture based on the values of their culture as a teenager. Researchers used a descriptive qualitative research method by conducting in-depth interviews to the informants who comes from a religious school. The selection of informants was done by using purposeful sampling. Collaboration with the school, the researchers were able to select informants who could provide rich data related to the topic. The analysis showed that there is permissiveness informants in addressing sexual openness in the music video. In addition, informants from Catholic schools were more open than the informant derived from Islamic schools in accepting the values of sexual openness. This permisiveness is regarded as a form of self-actualization and gender equality.

Keywords: cultural studies, multidimensional reception model, sexual openness, youth audience

Procedia PDF Downloads 400
953 Literature Review of the Management of Parry Romberg Syndrome with Fillers

Authors: Sana Ilyas

Abstract:

Parry-Romberg syndrome is a rare condition clinically defined by slowly progressive atrophy of the skin and soft tissues. This usually effects one side of the face, although a few cases have been documented of bilateral presentation. It is more prevalent in females and usually affects the left side of the face. The syndrome can also be accompanied by neurological abnormalities. It usually occurs in the first two decades of life with a variable rate of progression. The aetiology is unknown, and the disease eventually stabilises. The treatment options usually involve surgical management. The least invasive of these options is the management of facial asymmetry, associated with Parry Romberg syndrome, through the use of tissue fillers. This paper will review the existing literature on the management of Parry Romberg syndrome with tissue filler. Aim: The aim of the study is to explore the current published literature for the management of Parry Romberg syndrome with fillers. It is to assess the development that has been made in this method of management, its benefits and limitations, and its effectiveness for the management of Parry Romberg syndrome. Methodology: There was a thorough assessment of the current literature published on this topic. PubMed database was used for search of the published literature on this method of the management. Papers were analysed and compared with one another to assess the success and limitation of the management of Parry Romberg with dermal fillers Results and Conclusion: Case reports of the use of tissue fillers discuss the varying degrees of success with the treatment. However, this procedure has it’s limitation, which are discussed in the paper in detail. However, it is still the least invasive of all the surgical options for the management of Parry Romberg Syndrome, and therefore, it is important to explore this option with patients, as they may be more comfortable with pursuingtreatment that is less invasive and can still improve their facial asymmetry

Keywords: dermal fillers, facial asymmetry, parry romberg syndrome, tissue fillers

Procedia PDF Downloads 77
952 Disassociating Preferences from Evaluations Towards Pseudo Drink Brands

Authors: Micah Amd

Abstract:

Preferences towards unfamiliar drink brands can be predictably influenced following correlations of subliminally-presented brands (CS) with positively valenced attributes (US). Alternatively, evaluations towards subliminally-presented CS may be more variable, suggesting that CS-evoked evaluations may disassociate from CS-associated preferences following subliminal CS-US conditioning. We assessed this hypothesis over three experiments (Ex1, Ex2, Ex3). Across each experiment, participants first provided preferences and evaluations towards meaningless trigrams (CS) as a baseline, followed by conditioning and a final round of preference and evaluation measurements. During conditioning, four pairs of subliminal and supraliminal/visible CS were respectively correlated with four US categories varying along aggregate valence (e.g., 100% positive, 80% positive, 40% positive, 0% positive – for Ex1 and Ex2). Across Ex1 and Ex2, presentation durations for subliminal CS were 34 and 17 milliseconds, respectively. Across Ex3, aggregate valences of the four US categories were altered (75% positive, 55% positive, 45% positive, 25% positive). Valence across US categories was manipulated to address a supplemental query of whether US-to-CS valence transfer was summative or integrative. During analysis, we computed two sets of difference scores reflecting pre-post preference and evaluation performances, respectively. These were subjected to Bayes tests. Across all experiments, results illustrated US-to-CS valence transfer was most likely to shift evaluations for visible CS, but least likely to shift evaluations for subliminal CS. Alternatively, preferences were likely to shift following correlations with single-valence categories (e.g., 100% positive, 100% negative) across both visible and subliminal CS. Our results suggest that CS preferences can be influenced through subliminal conditioning even as CS evaluations remain unchanged, supporting our central hypothesis. As for whether transfer effects are summative/integrative, our results were more mixed; a comparison of relative likelihoods revealed that preferences are more likely to reflect summative effects whereas evaluations reflect integration, independent of visibility condition.

Keywords: subliminal conditioning, evaluations, preferences, valence transfer

Procedia PDF Downloads 143
951 Processing and Modeling of High-Resolution Geophysical Data for Archaeological Prospection, Nuri Area, Northern Sudan

Authors: M. Ibrahim Ali, M. El Dawi, M. A. Mohamed Ali

Abstract:

In this study, the use of magnetic gradient survey, and the geoelectrical ground methods used together to explore archaeological features in Nuri’s pyramids area. Research methods used and the procedures and methodologies have taken full right during the study. The magnetic survey method was used to search for archaeological features using (Geoscan Fluxgate Gradiometer (FM36)). The study area was divided into a number of squares (networks) exactly equal (20 * 20 meters). These squares were collected at the end of the study to give a major network for each region. Networks also divided to take the sample using nets typically equal to (0.25 * 0.50 meter), in order to give a more specific archaeological features with some small bipolar anomalies that caused by buildings built from fired bricks. This definition is important to monitor many of the archaeological features such as rooms and others. This main network gives us an integrated map displayed for easy presentation, and it also allows for all the operations required using (Geoscan Geoplot software). The parallel traverse is the main way to take readings of the magnetic survey, to get out the high-quality data. The study area is very rich in old buildings that vary from small to very large. According to the proportion of the sand dunes and the loose soil, most of these buildings are not visible from the surface. Because of the proportion of the sandy dry soil, there is no connection between the ground surface and the electrodes. We tried to get electrical readings by adding salty water to the soil, but, unfortunately, we failed to confirm the magnetic readings with electrical readings as previously planned.

Keywords: archaeological features, independent grids, magnetic gradient, Nuri pyramid

Procedia PDF Downloads 471
950 International Humanitarian Law and the Challenges of New Technologies of Warfare

Authors: Uche A. Nnawulezi

Abstract:

Undoubtedly, despite all efforts made to achieve overall peace through the application of the principles of international humanitarian law, crimes against mankind which are of unprecedented concern to the whole world have remained unabated. The fall back on war as a technique for settling disputes between nations, individuals, countries and ethnic groups with accompanying toll of deaths and destruction of properties have remained a conspicuous component of human history. Indeed, to control this conduct of warfare and the dehumanization of individuals, a body of law aimed at regulating the impacts of conflicts and hostilities in the theater of war has become necessary. Thus, it is to examine the conditions in which international humanitarian law will apply and also to determine the extent of the challenges of new progressions of warfare that this study is undertaken. All through this examination, we grasped doctrinal approach wherein we used text books, journals, international materials and supposition of law specialists in the field of international humanitarian law. This paper shall examine the distinctive factors responsible for the rebelliousness to the rules of International Humanitarian Law and furthermore, shall proffer possible courses of action that will address the challenges of new technologies of warfare all over the world. Essentially, the basic proposals made in this paper if totally utilized may go far in ensuring a sufficient standard in the application of the rules of international humanitarian law as it relates to an increasingly frequent phenomenon of contemporary developments in technologies of warfare which has in recent past, made it more difficult for the most ideal application of the rules of international humanitarian law. This paper deduces that for a sustainable global peace to be achieved, the rules of International Humanitarian Law as it relates to the utilization of new technologies of warfare should be completely clung to and should be made a strict liability offense. Likewise, this paper further recommends the introduction of domestic criminal law punishment of serious contraventions of the rules of international humanitarian law.

Keywords: international, humanitarian law, new technologies, warfare

Procedia PDF Downloads 281
949 The Construction of the Bridge between Mrs Dalloway and to the Lighthouse: The Combination of Codes and Metaphors in the Structuring of the Plot in the Work of Virginia Woolf

Authors: María Rosa Mucci

Abstract:

Tzvetan Todorov (1971) designs a model of narrative transformation where the plot is constituted by difference and resemblance. This binary opposition is a synthesis of a central figure within narrative discourse: metaphor. Narrative operates as a metaphor since it combines different actions through similarities within a common plot. However, it sounds paradoxical that metonymy and not metaphor should be the key figure within the narrative. It is a metonymy that keeps the movement of actions within the story through syntagmatic relations. By the same token, this articulation of verbs makes it possible for the reader to engage in a dynamic interaction with the text, responding to the plot and mediating meanings with the contradictory external world. As Roland Barthes (1957) points out, there are two codes that are irreversible within the process: the codes of actions and the codes of enigmas. Virginia Woolf constructs her plots through a process of symbolism; a scene is always enduring, not only because it stands for something else but also because it connotes it. The reader is forced to elaborate the meaning at a mythological level beyond the lines. In this research, we follow a qualitative content analysis to code language through the proairetic (actions) and hermeneutic (enigmas) codes in terms of Barthes. There are two novels in particular that engage the reader in this process of construction: Mrs Dalloway (1925) and To the Lighthouse (1927). The bridge from the first to the second brings memories of childhood, allowing for the discovery of these enigmas hidden between the lines. What survives? Who survives? It is the reader's task to unravel these codes and rethink this dialogue between plot and reader to contribute to the predominance of texts and the textuality of narratives.

Keywords: metonymy, code, metaphor, myth, textuality

Procedia PDF Downloads 37
948 Hagios Spyridon Church in Selymbria and Its Particular Standing in Middle Byzantine Architecture

Authors: Görkem Günay, Bilge Ar

Abstract:

Selymbria is an ancient maritime city, approximately 60 km west to Constantinople. Although it was a particularly important settlement during the Byzantine period, our knowledge about its Byzantine layer is rather sketchy. On the other hand, one of the Byzantine churches of Selymbria, namely Hagios Spyridon which had been survived until the beginning of 20th century, deserves special attention. The church is mainly known via textual and visual data from the end of 19th and the beginning of 20th century. These documents, together with some architectural pieces which most probably were belonging to the church, indicate that Hagios Spyridon Church was built in ‘simple domed octagon’ plan-scheme. Nothing from the building is preserved in-situ today. However, this small church helps to fill a very important gap in the history of Middle Byzantine architecture and occupies a notable place in the on-going discussion of the origins of ‘domed octagon’ churches of Helladic paradigm and their link with the capital. This study aims to reexamine the now lost church of Hagios Spyridon in the context of architectural developments of Middle Byzantine period. In the presentation, the exact location and the architecture of the church will be tried to be clarified using the existing documents and the publications of previous scholars. Some new architectural pieces which possibly belonged to the church, will be introduced and interpretations on existing restitution drawings will be made. The church will be architecturally compared with the oldest known example of the plan-scheme, Nea Moni on Chios and its later local copies. The study of Hagios Spyridon Church of Selymbria, hopefully, will contribute to the discussion of the possible influence of the capital on the plan-scheme and will help us to ask further questions about the close relations between Constantinopolitan and provincial architecture.

Keywords: Hagios Spyridon church, insular domed octagon, middle Byzantine architecture, silymarin

Procedia PDF Downloads 192