Search results for: common bile duct
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5754

Search results for: common bile duct

3744 Characterization and Predictors of Paranoid Ideation in Youths

Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto

Abstract:

Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.

Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness

Procedia PDF Downloads 500
3743 Estimation of Missing Values in Aggregate Level Spatial Data

Authors: Amitha Puranik, V. S. Binu, Seena Biju

Abstract:

Missing data is a common problem in spatial analysis especially at the aggregate level. Missing can either occur in covariate or in response variable or in both in a given location. Many missing data techniques are available to estimate the missing data values but not all of these methods can be applied on spatial data since the data are autocorrelated. Hence there is a need to develop a method that estimates the missing values in both response variable and covariates in spatial data by taking account of the spatial autocorrelation. The present study aims to develop a model to estimate the missing data points at the aggregate level in spatial data by accounting for (a) Spatial autocorrelation of the response variable (b) Spatial autocorrelation of covariates and (c) Correlation between covariates and the response variable. Estimating the missing values of spatial data requires a model that explicitly account for the spatial autocorrelation. The proposed model not only accounts for spatial autocorrelation but also utilizes the correlation that exists between covariates, within covariates and between a response variable and covariates. The precise estimation of the missing data points in spatial data will result in an increased precision of the estimated effects of independent variables on the response variable in spatial regression analysis.

Keywords: spatial regression, missing data estimation, spatial autocorrelation, simulation analysis

Procedia PDF Downloads 382
3742 Factors Motivating Experienced Secondary Teachers to Remain in the Teaching Profession

Authors: Joselito Castro Gutierrez, Herbert Orteza, Jervie Boligon, Kenneth Esteves, Edrick Kevin Ferrer, Mark Kevin Torres, Patrick Vergara

Abstract:

Teaching is a noble profession that involves an effective imparting of holistic learning. Consequently, it requires a driving force called motivation. This research aims to determine the motivating factors, problems encountered, solutions made by experienced secondary school teachers to remain in the teaching profession. A mixed unstructured/structured questionnaire was used for gathering data among public secondary school teachers. The researchers have arrived to a conclusion that the dominant motivating factors of teachers to stay in the profession are altruism, extrinsic factors, and self-efficacy. Meanwhile, the prevalent problems these experienced secondary teachers experienced are mutual dilemma, work overload, and personal issues. Teachers have varied methods on solving the problem which are: a) Direct Solution; b) Indirect Solution; and c) Pseudo-Solutions. Lastly, the factors, problems, and solutions, have influential effects on how long a teacher would sustain in teaching which would manifest as positive, negative and neutral effects.

Keywords: motivation, common problems of teachers, strategies in solving problems, teaching profession

Procedia PDF Downloads 445
3741 Investigation of Suicide by Poison as a Result of Domestic Violence

Authors: Nazih Ramadan, Ghada Hassabo

Abstract:

Background and Aims: Domestic violence and other forms of violence against women and other family members are known to be substantial and widespread, with women more likely than men to be abused mostly by their partner, which is known as gender-based violence. Domestic violence is a major precipitating factor for suicide in many communities especially in our Middle East area. The aim of the study is to show the real relation between suicidal attempts and domestic violence especially in female victims. We tried also through this study to know the most common age at which the abused person attempt suicide, the perpetrator, the educational level of the abused person, and the social level of them. Materials and Methods: In this study, we collect data from 150 victims of suicidal attempts who came to seek medical help at National Poisoning Center. They were asked to answer a preformed questionnaire after giving consent. Results: The study shows that women are at higher risk for suicidal behavior and that suicidal attempt is directly proportionate to low level of education and low social class situation. Conclusion: the study shows the strong relation between attempting suicide and exposure to domestic violence. At the end of this work, we recommend understanding the broad scope and tragic impact of domestic violence; further research is needed concerning domestic violence-related suicide.

Keywords: Cairo, domestic violence, domestic violence-related suicide, violence against women

Procedia PDF Downloads 285
3740 Mental Health Status among the Transgender Community: A Study of Mumbai

Authors: Mithlesh Chourase

Abstract:

Health of the transgender is as important as any other population sub-groups. However, little is known about the issues of mental health problems and health seeking behaviour of transgender in India. This paper examines the depression, stigma problem and suicidality (risk of suicide) among the transgender people in Mumbai city. The study used the primary survey data conducted in Mumbai city among the transgender community with a total sample of 120 among the transgender. Both qualitative and quantitative data was collected on demographic and socio-economic characteristic, general health and sexual health problems, mental health and health seeking behaviour among transgender. The quantitative results revealed that among the transgender, the prevalence of depression was very high. In this community 58.3% and 45.8 % of the transgender were suffered from depression and stigma problem respectively. On the other hand 42% and 48% of the transgender attempted suicide and experienced discrimination in the society. The qualitative results also revealed that the transgender were suffered from physical violence especially due to being a transgender, stressed due to being a transgender, experienced discrimination everywhere, experienced sexual health problems especially HIV, partner problem etc. As a result the prevalence of depression, self-harm attempt and suicidal attempt was common among this community.

Keywords: transgender, depression, Mumbai, mental health

Procedia PDF Downloads 526
3739 Qatari Licensure System as Perceived by Teachers and School Leaders

Authors: Abdullah Abu-Tineh, Hissa Sadiq, Fatma Al-Mutawah, Youmen Chaaban

Abstract:

The past 20 years have seen a proliferation of empirical research into various licensure systems. Extensive quantitative work investigates these systems of appraisal from different countries, but there is far less research on the implementation of the Qatari licensure system and the adoption of professional standards. In this paper, we provided a quantitatively and qualitatively descriptive look at the process that moves educators from their point of entry into the profession through their certification as accomplished professionals. Specifically, we focused on the perceptions of teachers and school leaders on the licensure system currently adopted by Ministry of Education and Higher Education in Qatar. The paper aims to inform progress towards a system of reliable, valid, and nationally appropriate teacher and school leader evaluation procedures. Such a system can support decision-making based on a common, comprehensive set of standards that ensures the placement of only the most effective educators in Qatari schools. This paper was made possible by NPRP grant # (NPRP7-1224-5-178) from the Qatar national research fund (a member of Qatar foundation) to Abdullah M. Abu-Tineh. The statements made herein are solely the responsibility of the author.

Keywords: licensure system, professional standards, professional portfolio, educator voice

Procedia PDF Downloads 232
3738 Human Wildlife Conflict Outside Protected Areas of Nepal: Causes, Consequences and Mitigation Strategies

Authors: Kedar Baral

Abstract:

This study was carried out in Mustang, Kaski, Tanahun, Baitadi, and Jhapa districts of Nepal. The study explored the spatial and temporal pattern of HWC, socio economic factors associated with it, impacts of conflict on life / livelihood of people and survival of wildlife species, and impact of climate change and forest fire onHWC. Study also evaluated people’s attitude towards wildlife conservation and assessed relevant policies and programs. Questionnaire survey was carried out with the 250 respondents, and both socio-demographic and HWC related information werecollected. Secondary information were collected from Divisional Forest Offices and Annapurna Conservation Area Project.HWC events were grouped by season /months/sites (forest type, distances from forest, and settlement), and the coordinates of the events were exported to ArcGIS. Collected data were analyzed using descriptive statistics in Excel and R Program. A total of 1465 events were recorded in 5 districts during 2015 and 2019. Out of that, livestock killing, crop damage, human attack, and cattle shed damage events were 70 %, 12%, 11%, and 7%, respectively. Among 151 human attack cases, 23 people were killed, and 128 were injured. Elephant in Terai, common leopard and monkey in Middle Mountain, and snow leopard in high mountains were found as major problematic animals. Common leopard attacks were found more in the autumn, evening, and on human settlement area. Whereas elephant attacks were found higher in winter, day time, and on farmland. Poor people farmers were found highly victimized, and they were losing 26% of their income due to crop raiding and livestock depredation. On the other hand, people are killing many wildlife in revenge, and this number is increasing every year. Based on the people's perception, climate change is causing increased temperature and forest fire events and decreased water sources within the forest. Due to the scarcity of food and water within forests, wildlife are compelled to dwell at human settlement area, hence HWC events are increasing. Nevertheless, more than half of the respondents were found positive about conserving entire wildlife species. Forests outside PAs are under the community forestry (CF) system, which restored the forest, improved the habitat, and increased the wildlife.However, CF policies and programs were found to be more focused on forest management with least priority on wildlife conservation and HWC mitigation. Compensation / relief scheme of government for wildlife damage was found some how effective to manage HWC, but the lengthy process, being applicable to the damage of few wildlife species and highly increasing events made it necessary to revisit. Based on these facts, the study suggest to carry out awareness generation activities to the poor farmers, linking the property of people with the insurance scheme, conducting habitat management activities within CF, promoting the unpalatable crops, improvement of shed house of livestock, simplifying compensation scheme and establishing a fund at the district level and incorporating the wildlife conservation and HWCmitigation programs in CF. Finally, the study suggests to carry out rigorous researches to understand the impacts of current forest management practices on forest, biodiversity, wildlife, and HWC.

Keywords: community forest, conflict mitigation, wildlife conservation, climate change

Procedia PDF Downloads 117
3737 Application of Electrical Resistivity Tomography to Image the Subsurface Structure of a Sinkhole, a Case Study in Southwestern Missouri

Authors: Shishay T. Kidanu

Abstract:

The study area is located in Southwestern Missouri and is mainly underlain by Mississippian Age limestone which is highly susceptible to karst processes. The area is known for the presence of various karst features like caves, springs and more importantly Sinkholes. Sinkholes are one of the most common karst features and the primary hazard in karst areas. Investigating the subsurface structure and development mechanism of existing sinkholes enables to understand their long-term impact and chance of reactivation and also helps to provide effective mitigation measures. In this study ERT (Electrical Resistivity Tomography), MASW (Multichannel Analysis of Surface Waves) and borehole control data have been used to image the subsurface structure and investigate the development mechanism of a sinkhole in Southwestern Missouri. The study shows that the main process responsible for the development of the sinkhole is the downward piping of fine grained soils. Furthermore, the study reveals that the sinkhole developed along a north-south oriented vertical joint set characterized by a vertical zone of water seepage and associated fine grained soil piping into preexisting fractures.

Keywords: ERT, Karst, MASW, sinkhole

Procedia PDF Downloads 214
3736 Optimization of Strategies and Models Review for Optimal Technologies-Based on Fuzzy Schemes for Green Architecture

Authors: Ghada Elshafei, A. Elazim Negm

Abstract:

Recently, Green architecture becomes a significant way to a sustainable future. Green building designs involve finding the balance between comfortable homebuilding and sustainable environment. Moreover, the utilization of the new technologies such as artificial intelligence techniques are used to complement current practices in creating greener structures to keep the built environment more sustainable. The most common objectives are green buildings should be designed to minimize the overall impact of the built environment on ecosystems in general and particularly on human health and on the natural environment. This will lead to protecting occupant health, improving employee productivity, reducing pollution and sustaining the environmental. In green building design, multiple parameters which may be interrelated, contradicting, vague and of qualitative/quantitative nature are broaden to use. This paper presents a comprehensive critical state of art review of current practices based on fuzzy and its combination techniques. Also, presented how green architecture/building can be improved using the technologies that been used for analysis to seek optimal green solutions strategies and models to assist in making the best possible decision out of different alternatives.

Keywords: green architecture/building, technologies, optimization, strategies, fuzzy techniques, models

Procedia PDF Downloads 475
3735 Modeling of Power Network by ATP-Draw for Lightning Stroke Studies

Authors: John Morales, Armando Guzman

Abstract:

Protection relay algorithms play a crucial role in Electric Power System stability, where, it is clear that lightning strokes produce the mayor percentage of faults and outages of Transmission Lines (TLs) and Distribution Feeders (DFs). In this context, it is imperative to develop novel protection relay algorithms. However, in order to get this aim, Electric Power Systems (EPS) network have to be simulated as real as possible, especially the lightning phenomena, and EPS elements that affect their behavior like direct and indirect lightning, insulator string, overhead line, soil ionization and other. However, researchers have proposed new protection relay algorithms considering common faults, which are not produced by lightning strokes, omitting these imperative phenomena for the transmission line protection relays behavior. Based on the above said, this paper presents the possibilities of using the Alternative Transient Program ATP-Draw for the modeling and simulation of some models to make lightning stroke studies, especially for protection relays, which are developed through Transient Analysis of Control Systems (TACS) and MODELS language corresponding to the ATP-Draw.

Keywords: back-flashover, faults, flashover, lightning stroke, modeling of lightning, outages, protection relays

Procedia PDF Downloads 316
3734 The Relationship of the Dentate Nucleus with the Pyramid of Vermis: A Microneurosurgical Anatomical Study

Authors: Santhosh K. S. Annayappa, Nupur Pruthi

Abstract:

The region of dentate nucleus is a common site for various pathologies like hematomas, tumours, etc. We aimed to study in detail the relationship of this region with the vermis, especially the pyramid using microscopic fibre dissection technique. To achieve this aim, 20 cerebellar hemispheres were studied from the 11 cerebellums. Dissection was performed using wooden spatulas and micro dissectors under a microscope following Klingler’s preservation technique. The relationship between the pyramid of vermis and the dentate nucleus was studied in detail. A similar relationship was studied on the MRI of randomly selected trigeminal neuralgia patients and correlated with anatomical findings. Results show the mean distance of the lateral margin of the dentate nucleus from the midline on anatomic specimens was 21.4 ± 1.8 mm (19-25 mm) and 23.4 ± 3.4 mm (15-29 mm) on right and left side, respectively. Similar measurements made on the MRI were 22.97 ± 2.0 mm (20.03-26.15 mm) on the right side and 23.98 ± 2.1 mm (21.47-27.67 mm) on the left side. The amount of white matter dissection required to reach the dentate nucleus at the pyramidal attachment area was 7.3 ± 1.0 mm (6-9 mm) on the right side and 6.8 ± 1.4 mm (5-10 mm) on the left side. It was concluded that the pyramid of vermis has a constant relationship with the dentate nucleus and can be used as an excellent landmark during surgery to localise the dentate nucleus on the suboccipital surface.

Keywords: fiber dissection, micro neurosurgery, the dentate nucleus of cerebellum, the pyramid of vermis

Procedia PDF Downloads 153
3733 Epidemiological Profile of Healthcare Associated Infections in Intensive Care Unit

Authors: Abdessamad Dali-Ali, Houaria Beldjillali, Fouzia Agag, Asmaa Oukebdane, Ramzi Tidjani, Arslane Bettayeb, Khadidja Meddeber, Radia Dali-Yahia, Nori Midoun

Abstract:

Healthcare-associated infections are a real public health problem, especially in intensive care units. The aim of our study was to describe the epidemiological profile and to estimate the incidence of these infections at the intensive care unit of our teaching hospital. A prospective study was conducted, from June 2012 to December 2013. During this period, 305 patients having a duration of hospitalization equal or more than 48 hours were included in the study. In terms of the incidence of healthcare associated infections, nosocomial pneumonia occupied the first position with a cumulative incidence rate of 20.0%, followed by bacteremia (5.6%), central venous catheter infections (4%), and urinary tract infections (3%). In the case of isolated microorganisms, Gram-negative bacilli not enterobacteriaceae occupied the first place with 48.5%, followed by enterobacteria (32.1%). Acinetobacter baumannii was the most common germ (27.6%). Our study showed that the rate of health-care-associated infections was relatively high in the intensive care unit. A control program to reduce all infections is a priority for the Infection Control Associated Committee.

Keywords: epidemiological profile, healthcare associated infections, intensive care units, teaching hospital of Oran, Algeria

Procedia PDF Downloads 301
3732 Comparison of Johnson-Cook and Barlat Material Model for 316L Stainless Steel

Authors: Yiğit Gürler, İbrahim Şimşek, Müge Savaştaer, Ayberk Karakuş, Alper Taşdemirci

Abstract:

316L steel is frequently used in the industry due to its easy formability and accessibility in sheet metal forming processes. Numerical and experimental studies are frequently encountered in the literature to examine the mechanical behavior of 316L stainless steel during the forming process. 316L stainless steel is the most common material used in the production of plate heat exchangers and plate heat exchangers are produced by plastic deformation of the stainless steel. The motivation in this study is to determine the appropriate material model during the simulation of the sheet metal forming process. For this reason, two different material models were examined and Ls-Dyna material cards were created using material test data. These are MAT133_BARLAT_YLD2000 and MAT093_SIMPLIFIED_JOHNSON_COOK. In order to compare results of the tensile test & hydraulic bulge test performed both numerically and experimentally. The obtained results were evaluated comparatively and the most suitable material model was selected for the forming simulation. In future studies, this material model will be used in the numerical modeling of the sheet metal forming process.

Keywords: 316L, mechanical characterization, metal forming, Ls-Dyna

Procedia PDF Downloads 334
3731 Symbol Synchronization and Resource Reuse Schemes for Layered Video Multicast Service in Long Term Evolution Networks

Authors: Chung-Nan Lee, Sheng-Wei Chu, You-Chiun Wang

Abstract:

LTE (Long Term Evolution) employs the eMBMS (evolved Multimedia Broadcast/Multicast Service) protocol to deliver video streams to a multicast group of users. However, it requires all multicast members to receive a video stream in the same transmission rate, which would degrade the overall service quality when some users encounter bad channel conditions. To overcome this problem, this paper provides two efficient resource allocation schemes in such LTE network: The symbol synchronization (S2) scheme assumes that the macro and pico eNodeBs use the same frequency channel to deliver the video stream to all users. It then adopts a multicast transmission index to guarantee the fairness among users. On the other hand, the resource reuse (R2) scheme allows eNodeBs to transmit data on different frequency channels. Then, by introducing the concept of frequency reuse, it can further improve the overall service quality. Extensive simulation results show that the S2 and R2 schemes can respectively improve around 50% of fairness and 14% of video quality as compared with the common maximum throughput method.

Keywords: LTE networks, multicast, resource allocation, layered video

Procedia PDF Downloads 389
3730 Prevalence and Antimicrobial Susceptibility of Thermophilic Campylobacter Strains Isolated from Humans and Poultry in Batna

Authors: Baali Mohamed

Abstract:

Campylobacter are among the most common human bacterial gastroenteritis cases in many countries, and poultry meat is considered as a major source of human campylobacteriosis. This study is conducted, on one hand, to determine the prevalence of infection with thermotolerant Campylobacter both in broiler flocks and men, and to study their sensitivity to antibiotics, and secondly for comparing the two methods of isolation of Campylobacter thermotolerant: technique of passive filtration and selective isolation technique using the Karmali medium. This study examined 310 samples, 260 of avian origin and 50 of human origin, during the period from June 2011 to March 2012. Detecting Campylobacter thermotolerant is conducted using the standard ISO 10272. The results show that 66% (95% CI : 60-72%) of avian samples are contaminated with C. TT (172/260). The study of antibiotic susceptibility revealed that all strains (100%) are resistant to ampicillin and amoxicillin/clavulanic acid, 90% to erythromycin, 66.3% to tetracycline, 53.3% to chloramphenicol and 46.7% to enrofloxacin. However, no resistance is noted to gentamycin. In human samples, three strains of C. thermotolerant are detected, with a contamination rate of 6%. The results of the statistical analysis using the chi-square test (χ2) showed that Campylobacter infection, on the one hand, had seasonal variation with a summer peak (p < 0.05) and, on the other hand, are not influenced by the size of the herd.

Keywords: thermotolerant campylobacter, broiler, man, Karmali

Procedia PDF Downloads 395
3729 Effectiveness of Computer-Based Cognitive Training in Improving Attention-Deficit/Hyperactivity Disorder Rehabilitation

Authors: Marjan Ghazisaeedi, Azadeh Bashiri

Abstract:

Background: Attention-Deficit/Hyperactivity Disorder(ADHD), is one of the most common psychiatric disorders in early childhood that in addition to its main symptoms provide significant deficits in the areas of educational, social and individual relationship. Considering the importance of rehabilitation in ADHD patients to control these problems, this study investigated the advantages of computer-based cognitive training in these patients. Methods: This review article has been conducted by searching articles since 2005 in scientific databases and e-Journals and by using keywords including computerized cognitive rehabilitation, computer-based training and ADHD. Results: Since drugs have short term effects and also they have many side effects in the rehabilitation of ADHD patients, using supplementary methods such as computer-based cognitive training is one of the best solutions. This approach has quick feedback and also has no side effects. So, it provides promising results in cognitive rehabilitation of ADHD especially on the working memory and attention. Conclusion: Considering different cognitive dysfunctions in ADHD patients, application of the computerized cognitive training has the potential to improve cognitive functions and consequently social, academic and behavioral performances in patients with this disorder.

Keywords: ADHD, computer-based cognitive training, cognitive functions, rehabilitation

Procedia PDF Downloads 278
3728 Data Integrity: Challenges in Health Information Systems in South Africa

Authors: T. Thulare, M. Herselman, A. Botha

Abstract:

Poor system use, including inappropriate design of health information systems, causes difficulties in communication with patients and increased time spent by healthcare professionals in recording the necessary health information for medical records. System features like pop-up reminders, complex menus, and poor user interfaces can make medical records far more time consuming than paper cards as well as affect decision-making processes. Although errors associated with health information and their real and likely effect on the quality of care and patient safety have been documented for many years, more research is needed to measure the occurrence of these errors and determine the causes to implement solutions. Therefore, the purpose of this paper is to identify data integrity challenges in hospital information systems through a scoping review and based on the results provide recommendations on how to manage these. Only 34 papers were found to be most suitable out of 297 publications initially identified in the field. The results indicated that human and computerized systems are the most common challenges associated with data integrity and factors such as policy, environment, health workforce, and lack of awareness attribute to these challenges but if measures are taken the data integrity challenges can be managed.

Keywords: data integrity, data integrity challenges, hospital information systems, South Africa

Procedia PDF Downloads 181
3727 A Daily Diary Study on Technology-Assisted Supplemental Work, Psychological Detachment, and Well-Being – The Mediating Role of Cognitive Coping

Authors: Clara Eichberger, Daantje Derks, Hannes Zacher

Abstract:

Technology-assisted supplemental work (TASW) involves performing job-related tasks after regular working hours with the help of technological devices. Due to emerging information and communication technologies, such behavior becomes increasingly common. Since previous research on the relationship of TASW, psychological detachment and well-being are mixed, this study aimed to examine the moderating roles of appraisal and cognitive coping. A moderated mediation model was tested with daily diary data from 100 employees. As hypothesized, TASW was positively related to negative affect at bedtime. In addition, psychological detachment mediated this relationship. Results did not confirm appraisal and cognitive coping as moderators. However, additional analyses revealed cognitive coping as a mediator of the positive relationship of TASW and positive affect at bedtime. These results suggest that, on the one hand engaging in TASW can be harmful to employee well-being (i.e., more negative affect) and on the other hand, it can also be associated with higher well-being (i.e., more positive affect) in case it is accompanied by cognitive coping.

Keywords: cognitive coping, psychological detachment, technology-assisted supplemental work, well-being

Procedia PDF Downloads 193
3726 A Progressive Techno-Legal Framework for Digital Evidence Management

Authors: Ayobami P. Olatunji, Saadat Ibiyeye, Abdulaziz Ibiyeye, Tahir M. Khan

Abstract:

Digital evidence has become a cornerstone in criminal investigations due to the vast amount of information available in digital form. Despite its prevalence, this evidence is often met with skepticism in court proceedings because of its inherently volatile nature. Traditional forensic processes, defined predominantly by technology experts, emphasize technical details in evidence collection while often neglecting legal procedures. This gap can pose significant challenges for legal practitioners in understanding and applying digital forensics. As digital evidence increasingly influences future cases, a cohesive framework integrating both technical and legal perspectives is essential. We propose a comprehensive techno-legal framework designed to bridge this gap. Our framework integrates key aspects of collection, preservation, examination, and documentation with legal components such as case building, certificate of compliance, cross-examination, and authorization. This balanced approach aims not to replace existing evidence presentation principles but to enhance the seamless integration of digital evidence into legal proceedings, addressing the common issues that lead to its dismissal.

Keywords: evidence presentation, warrant, digital-forensic, certificate of compliance, legal procedures, computer crime, violation, investigation cybercrime

Procedia PDF Downloads 32
3725 Taxation, Evidential and Jurisdictional Issues in Electronic Commercial Transactions in Nigeria

Authors: Michael Sunday Afolayan

Abstract:

This research work examined the challenges bedevilling the development of legal framework for electronic commercial transactions (e-commerce) in Nigeria. Nigeria does not have a clear-cut legislation regulating electronic commerce in its jurisdiction despite the geometrical rate of growth and adoption of this method of trade. It specifically posed a great challenge looking at taxation, evidential and jurisdictional issues in e-commerce in Nigeria. The author in a broader research work which is abridged here, traced the origin and development of e-commerce and the attendant laws applicable in Nigeria, examining their sufficiency or otherwise. In carrying out the research work, doctrinal mode of legal research was adopted, examining both primary and secondary sources of legal research materials within their contextual meanings. It was found that the failure to enact a law which has direct regulatory bearing on e-commerce in Nigeria has led to adoption and application of circumstantial laws, rules and common law principles to tackle the problems arising out of electronic commercial transactions, especially in the areas of taxation, evidential and jurisdictional challenges. It was ultimately suggested that there is urgent need to sign into law, the Electronic Transaction Bill which had already been passed by the National Assembly since 2017.

Keywords: e-commerce, legislation, taxation, evidential, jurisdiction

Procedia PDF Downloads 86
3724 Optimal Allocation of Multiple Emergency Resources for a Single Potential Accident Node: A Mixed Integer Linear Program

Authors: Yongjian Du, Jinhua Sun, Kim M. Liew, Huahua Xiao

Abstract:

Optimal allocation of emergency resources before a disaster is of great importance for emergency response. In reality, the pre-protection for a single critical node where accidents may occur is common. In this study, a model is developed to determine location and inventory decisions of multiple emergency resources among a set of candidate stations to minimize the total cost based on the constraints of budgetary and capacity. The total cost includes the economic accident loss which is accorded with probability distribution of time and the warehousing cost of resources which is increasing over time. A ratio is set to measure the degree of a storage station only serving the target node that becomes larger with the decrease of the distance between them. For the application of linear program, it is assumed that the length of travel time to the accident scene of emergency resources has a linear relationship with the economic accident loss. A computational experiment is conducted to illustrate how the proposed model works, and the results indicate its effectiveness and practicability.

Keywords: emergency response, integer linear program, multiple emergency resources, pre-allocation decisions, single potential accident node

Procedia PDF Downloads 154
3723 Electrokinetics and Stability of Solder Powders in Aqueous Media

Authors: Terence Lucero F. Menor, Manolo G. Mena, Herman D. Mendoza

Abstract:

Solder pastes are widely used in creating mechanical, thermal and electrical connection between electronic components. Continued miniaturization of consumer electronics drives manufacturers to achieve smaller, lighter, and faster electronic packages at low cost. This faces them to the difficult challenge of dispensing solder pastes in extremely precise and repeatable manner. The most common problem in solder paste dispensing is the clogging of dispensers which results from agglomeration and settling of solder powders leading to increase on the effective particle size and uneven distribution of particles in the mixture. In this work, microelectrophoresis was employed to investigate the effect of pH and KNO₃ concentration on the electrokinetic behavior and stability of SAC305, PbSn5Ag2.5 and Sn powders in aqueous media. Results revealed that the electrokinetic behavior of the three types of solder powders are similar, which was attributed to high SnO₂ content on the surface of the particles. Electrokinetic measurements showed that the zeta potentials of the solder powders are highly dependent on pH and KNO₃ concentration with isoelectric points ranging from 3.5 to 5.5. Results were verified using stability tests.

Keywords: electrokinetic behavior, isoelectric point, solder powder, stability, surface analysis

Procedia PDF Downloads 230
3722 Design of an Energy Efficient Electric Auto Rickshaw

Authors: Muhammad Asghar, Aamer Iqbal Bhatti, Qadeer Ahmed, Tahir Izhar

Abstract:

Three wheeler auto Rickshaw, often termed as ‘auto rickshaw’ is very common in Pakistan and is considered as the most affordable means of transportation to the local people. Problems caused by the gasoline engine on the environment and people, the researchers and the automotive industry have turned to the hybrid electric vehicles and electrical powered vehicle. The research in this paper explains the design of energy efficient Electric auto Rickshaw. An electric auto rickshaw is being developed at Center for Energy Research and Development, (Lahore), which is running on the roads of Lahore city. Energy storage capacity of batteries is at least 25 times heavier than fossil fuel and having volume 10 times in comparison to fuel, resulting an increase of the Rickshaw weight. A set of specifications is derived according to the mobility requirements of the electric auto rickshaw. The design choices considering the power-train and component selection are explained in detail. It was concluded that electric auto rickshaw has many advantages and benefits over the conventional auto rickshaw. It is cleaner and much more energy efficient but limited to the distance it can travel before recharging of battery. In addition, a brief future view of the battery technology is given.

Keywords: conventional auto rickshaw, energy efficiency, electric auto rickshaw, internal combustion engine, environment

Procedia PDF Downloads 287
3721 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods

Authors: Issa Qabaja, Fadi Thabtah

Abstract:

Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.

Keywords: data mining, email classification, phishing, online security

Procedia PDF Downloads 432
3720 Fracture Dislocation of Upper Sacrum in an Adolescent: Case Report and Review of Literature

Authors: S. Alireza Mirghasemi, Narges Rahimi Gabaran

Abstract:

Although sacral fractures in children are rare due to the fact that the occurrence of pelvic fracture is not common in childhood. Sacral fractures present a high risk of neurological damage. This kind of fracture is often missed because the routine pelvic X-rays imaging scarcely show this fracture. Also, the treatment is controversial, and it ranges from fine reduction to conservative treatments without any try to reduce the dislocation. In this article, a case of fracture dislocation of S1 and S2 along with a suggested diagnostic test and treatment based on similar cases are presented. The case investigates a 14-year-old boy who entered the hospital one week after a car accident that knocked him to the ground in crawling position and a rack fell down on his body. Pain and tenderness in the sacral region and a fracture in the left leg were notable--we detected incomplete bilateral palsy of L5, S1 and S2 roots. In radiographs of the spine fracture dislocation of S1, the sacral fracture was seen. The treatment included a skeletal traction with a halo over the patient’s head and two femoral pins. After one week, another surgery was performed in order to stabilize and reduce the fracture, and we employed a posterior approach with CD and a pedicular screw. After two years of follow-up, the fracture is completely cured without any loss of reduction.

Keywords: adolescent, fracture in adolescent, fracture dislocation, sacrum

Procedia PDF Downloads 292
3719 Comparison of Allelopathic Activity of Some Edible Mushroom and Wild Mushroom in Japan

Authors: Asma Osivand, Hossein Mardani, Hiroshi Araya, Yoshiharu Fujii

Abstract:

Wild mushrooms have always been considered as valuable source of bioactive compounds, while edible mushrooms have been known for their importance as food source. However, their interaction with plants through chemicals that could lead to find new biochemical have not been well undertaken. A special bioassay method (Sandwich method) was applied to compare eight common edible mushrooms (Pleurotus eryngii, Pleurotus citrinopileatus, Pleurotus ostreatus, Lentinula edodes, Grifola frondosa, Flammulina velutipes, Hypsizygus tessellatus and Pholiota namako) with some wild species (Ganoderma appelanatum, Amanita pantherina, Artomyces pyxidatus, Morchella conica, Tricholosporum porphyrophyllum, Trametes hirsuta) for their phytotoxicity against lettuce. Among all tested edible mushrooms, application of 5 mg of P. ostreatus showed stronger allelopathic activity by inhibiting the growth of radicle and hypocotyl of lettuce by 84% and 63% respectively. Moreover, same amount of T. porphyrophyllum exerted 77% and 67% growth inhibition on radicle and hypocotyl of lettuce. In general, biochemicals contributed in tested mushrooms could be the main cause for their inhibitory activity and could lead to find new allelochemicals.

Keywords: allelopathy, interaction, mushroom, phytotoxicity, Pleurotus sp., sandwich method

Procedia PDF Downloads 292
3718 Cytotoxicity of Flavonoid Compounds from Smilax corbularia Kunth Against Cholangiocarcinoma Cell Line

Authors: Pakakrong Thongdeeying, Srisopa Ruangnoo, Arunporn Itharat

Abstract:

The rhizomes of Smilax corbularia Kunth have long been used as common ingredients in anticancer preparations. Thus, the objective of this study is to investigate cytotoxicity of S. corbularia and its ingredients against cholangiocarcinoma cell line (KKU-M156) by SRB assay. Ethanolic and water extracts of S. corbularia rhizomes were obtained using the procedures followed by Thai traditional doctors. Bioassay guided isolation was used to isolate cytotoxic compounds. The results revealed that the ethanolic extract of S. corbularia exhibited activity against KKU-M156 cell line with an IC50 value of 84.53±1.62 µg/ml, but the water extract showed no cytotoxic activity. Three flavonoid compounds [astilbin (1), engeletin (2), and quercetin (3)] were isolated from the ethanolic extract. Compound 3 exhibited the strongest activity against KKU-M156 cell line (IC50 = 8.14 ± 1.15 µg/ml), but 1 and 2 showed no cytotoxic activity (IC50 > 100 µg/ml). In conclusion, quercetin showed the highest efficacy against cholangiocarcinoma. These results support the traditional use of this plant by Thai traditional doctors for cancer treatment.

Keywords: cholangiocarcinoma, cytotoxicity, flavonoid, Smilax corbularia

Procedia PDF Downloads 381
3717 Role of Bariatric Surgery in Polycystic Ovarian Syndrome &Infertility

Authors: Ahuja Ashish, Nain Prabhdeep Singh

Abstract:

Introduction: Polycystic ovarian syndrome(PCOS) is the most common endocrine disorder among women of reproductive age.Pcos encompasses a broad spectrum of signs&symptoms of ovary dysfunction,obesity,blood pressure,insulin resistance & infertility. Bariatric Surgery can be an effective means of weight loss in Pcos & curing infertility. Materials and Methods: 15 female patients were enrolled in the study from 2012-2014.66%(n=10) were in age group of 20-25 years,33%(n=5) were in age group of 25-33 years who underwent. Bariatric surgery in form of Laproscopic sleeve Gastrectomy(LSG)& Roux-en-Y gastric bypass. LSG 73%(n=11), RYGB26% (n=4). Results: There was a significant improvement in obesity (60% excess weight loss)over 1 year after bariatric surgery, in 12 patients there was gross improvement in restoration of menstrual cycle who had irregular menstrual cycle. In 80% patients the serum insulin level showed normal value. Over two years 8 patients become pregnant. Conclusions: 1)Obese women with Pcos maybe able to conceive after Bariatric Surgery. 2) Women with Pcos should only consider bariatric surgery if they were already considering it for other reasons to treat obesity, blood pressure & other co-morbid conditions.

Keywords: obesity, bariatric surgery, polycystic ovarian syndrome, infertility

Procedia PDF Downloads 293
3716 Taleghan Dam Break Numerical Modeling

Authors: Hamid Goharnejad, Milad Sadeghpoor Moalem, Mahmood Zakeri Niri, Leili Sadeghi Khalegh Abadi

Abstract:

While there are many benefits to using reservoir dams, their break leads to destructive effects. From the viewpoint of International Committee of Large Dams (ICOLD), dam break means the collapse of whole or some parts of a dam; thereby the dam will be unable to hold water. Therefore, studying dam break phenomenon and prediction of its behavior and effects reduces losses and damages of the mentioned phenomenon. One of the most common types of reservoir dams is embankment dam. Overtopping in embankment dams occurs because of flood discharge system inability in release inflows to reservoir. One of the most important issues among managers and engineers to evaluate the performance of the reservoir dam rim when sliding into the storage, creating waves is large and long. In this study, the effects of floods which caused the overtopping of the dam have been investigated. It was assumed that spillway is unable to release the inflow. To determine outflow hydrograph resulting from dam break, numerical model using Flow-3D software and empirical equations was used. Results of numerical models and their comparison with empirical equations show that numerical model and empirical equations can be used to study the flood resulting from dam break.

Keywords: embankment dam break, empirical equations, Taleghan dam, Flow-3D numerical model

Procedia PDF Downloads 321
3715 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 148