Search results for: mobile secure texting
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2295

Search results for: mobile secure texting

255 Clinical Applications of Amide Proton Transfer Magnetic Resonance Imaging: Detection of Brain Tumor Proliferative Activity

Authors: Fumihiro Ima, Shinichi Watanabe, Shingo Maeda, Haruna Imai, Hiroki Niimi

Abstract:

It is important to know growth rate of brain tumors before surgery because it influences treatment planning including not only surgical resection strategy but also adjuvant therapy after surgery. Amide proton transfer (APT) imaging is an emerging molecular magnetic resonance imaging (MRI) technique based on chemical exchange saturation transfer without administration of contrast medium. The underlying assumption in APT imaging of tumors is that there is a close relationship between the proliferative activity of the tumor and mobile protein synthesis. We aimed to evaluate the diagnostic performance of APT imaging of pre-and post-treatment brain tumors. Ten patients with brain tumor underwent conventional and APT-weighted sequences on a 3.0 Tesla MRI before clinical intervention. The maximum and the minimum APT-weighted signals (APTWmax and APTWmin) in each solid tumor region were obtained and compared before and after clinical intervention. All surgical specimens were examined for histopathological diagnosis. Eight of ten patients underwent adjuvant therapy after surgery. Histopathological diagnosis was glioma in 7 patients (WHO grade 2 in 2 patients, WHO grade 3 in 3 patients and WHO grade 4 in 2 patients), meningioma WHO grade1 in 2 patients and primary lymphoma of the brain in 1 patient. High-grade gliomas showed significantly higher APTW-signals than that in low-grade gliomas. APTWmax in one huge parasagittal meningioma infiltrating into the skull bone was higher than that in glioma WHO grade 4. On the other hand, APTWmax in another convexity meningioma was the same as that in glioma WHO grade 3. Diagnosis of primary lymphoma of the brain was possible with APT imaging before pathological confirmation. APTW-signals in residual tumors decreased dramatically within one year after adjuvant therapy in all patients. APT imaging demonstrated excellent diagnostic performance for the planning of surgery and adjuvant therapy of brain tumors.

Keywords: amides, magnetic resonance imaging, brain tumors, cell proliferation

Procedia PDF Downloads 134
254 Surprise Fraudsters Before They Surprise You: A South African Telecommunications Case Study

Authors: Ansoné Human, Nantes Kirsten, Tanja Verster, Willem D. Schutte

Abstract:

Every year the telecommunications industry suffers huge losses due to fraud. Mobile fraud, or generally, telecommunications fraud is the utilisation of telecommunication products or services to acquire money illegally from or failing to pay a telecommunication company. A South African telecommunication operator developed two internal fraud scorecards to mitigate future risks of application fraud events. The scorecards aim to predict the likelihood of an application being fraudulent and surprise fraudsters before they surprise the telecommunication operator by identifying fraud at the time of application. The scorecards are utilised in the vetting process to evaluate the applicant in terms of the fraud risk the applicant would present to the telecommunication operator. Telecommunication providers can utilise these scorecards to profile customers, as well as isolate fraudulent and/or high-risk applicants. We provide the complete methodology utilised in the development of the scorecards. Furthermore, a Determination and Discrimination (DD) ratio is provided in the methodology to select the most influential variables from a group of related variables. Throughout the development of these scorecards, the following was revealed regarding fraudulent cases and fraudster behaviour within the telecommunications industry: Fraudsters typically target high-value handsets. Furthermore, debit order dates scheduled for the end of the month have the highest fraud probability. The fraudsters target specific stores. Applicants who acquire an expensive package and receive a medium-income, as well as applicants who obtain an expensive package and receive a high income, have higher fraud percentages. If one month prior to application, the status of an account is already in arrears (two months or more), the applicant has a high probability of fraud. The applicants with the highest average spend on calls have a higher probability of fraud. If the amount collected changes from month to month, the likelihood of fraud is higher. Lastly, young and middle-aged applicants have an increased probability of being targeted by fraudsters than other ages.

Keywords: application fraud scorecard, predictive modeling, regression, telecommunications

Procedia PDF Downloads 113
253 Sustaining Efficiency in Electricity Distribution to Enhance Effective Human Security for the Vulnerable People in Ghana

Authors: Anthony Nyamekeh-Armah Adjei, Toshiaki Aoki

Abstract:

The unreliable and poor efficiency of electricity distribution leading to frequent power outages and high losses are the major challenge facing the power distribution sector in Ghana. Distribution system routes electricity from the power generating station at a higher voltage through the transmission grid and steps it down through the low voltage lines to end users. Approximately all electricity problems and disturbances that have increased the call for renewable and sustainable energy in recent years have their roots in the distribution system. Therefore, sustaining electricity distribution efficiency can potentially contribute to the reserve of natural energy resources use in power generation, reducing greenhouse gas emission (GHG), decreasing tariffs for consumers and effective human security. Human Security is a people-centered approach where individual human being is the principal object of concern, focuses on protecting the vital core of all human lives in ways for meeting basic needs that enhance the safety and protection of individuals and communities. The vulnerability is the diminished capacity of an individual or group to anticipate, resist and recover from the effect of natural, human-induced disaster. The research objectives are to explore the causes of frequent power outages to consumers, high losses in the distribution network and the effect of poor electricity distribution efficiency on the vulnerable (poor and ordinary) people that mostly depend on electricity for their daily activities or life to survive. The importance of the study is that in a developing country like Ghana where raising a capital for new infrastructure project is difficult, it would be beneficial to enhance the efficiency that will significantly minimize the high energy losses, reduce power outage, to ensure safe and reliable delivery of electric power to consumers to secure the security of people’s livelihood. The methodology used in this study is both interview and questionnaire survey to analyze the response from the respondents on causes of power outages and high losses facing the electricity company of Ghana (ECG) and its effect on the livelihood on the vulnerable people. Among the outcome of both administered questionnaire and the interview survey from the field were; poor maintenance of existing sub-stations, use of aging equipment, use of poor distribution infrastructure and poor metering and billing system. The main observation of this paper is that the poor network efficiency (high losses and power outages) affects the livelihood of the vulnerable people. Therefore, the paper recommends that policymakers should insist on all regulation guiding electricity distribution to improve system efficiency. In conclusion, there should be decentralization of off-grid solar PV technologies to provide a sustainable and cost-effective, which can increase daily productivity and improve the quality of life of the vulnerable people in the rural communities.

Keywords: electricity efficiency, high losses, human security, power outage

Procedia PDF Downloads 279
252 Bedouin Dispersion in Israel: Between Sustainable Development and Social Non-Recognition

Authors: Tamir Michal

Abstract:

The subject of Bedouin dispersion has accompanied the State of Israel from the day of its establishment. From a legal point of view, this subject has offered a launchpad for creative judicial decisions. Thus, for example, the first court decision in Israel to recognize affirmative action (Avitan), dealt with a petition submitted by a Jew appealing the refusal of the State to recognize the Petitioner’s entitlement to the long-term lease of a plot designated for Bedouins. The Supreme Court dismissed the petition, holding that there existed a public interest in assisting Bedouin to establish permanent urban settlements, an interest which justifies giving them preference by selling them plots at subsidized prices. In another case (The Forum for Coexistence in the Negev) the Supreme Court extended equitable relief for the purpose of constructing a bridge, even though the construction infringed the Law, in order to allow the children of dispersed Bedouin to reach school. Against this background, the recent verdict, delivered during the Protective Edge military campaign, which dismissed a petition aimed at forcing the State to spread out Protective Structures in Bedouin villages in the Negev against the risk of being hit from missiles launched from Gaza (Abu Afash) is disappointing. Even if, in arguendo, no selective discrimination was involved in the State’s decision not to provide such protection, the decision, and its affirmation by the Court, is problematic when examined through the prism of the Theory of Recognition. The article analyses the issue by tools of theory of Recognition, according to which people develop their identities through mutual relations of recognition in different fields. In the social context, the path to recognition is cognitive respect, which is provided by means of legal rights. By seeing other participants in Society as bearers of rights and obligations, the individual develops an understanding of his legal condition as reflected in the attitude to others. Consequently, even if the Court’s decision may be justified on strict legal grounds, the fact that Jewish settlements were protected during the military operation, whereas Bedouin villages were not, is a setback in the struggle to make the Bedouin citizens with equal rights in Israeli society. As the Court held, ‘Beyond their protective function, the Migunit [Protective Structures] may make a moral and psychological contribution that should not be undervalued’. This contribution is one that the Bedouin did not receive in the Abu Afash verdict. The basic thesis is that the Court’s verdict analyzed above clearly demonstrates that the reliance on classical liberal instruments (e.g., equality) cannot secure full appreciation of all aspects of Bedouin life, and hence it can in fact prejudice them. Therefore, elements of the recognition theory should be added, in order to find the channel for cognitive dignity, thereby advancing the Bedouins’ ability to perceive themselves as equal human beings in the Israeli society.

Keywords: bedouin dispersion, cognitive respect, recognition theory, sustainable development

Procedia PDF Downloads 347
251 3D Codes for Unsteady Interaction Problems of Continuous Mechanics in Euler Variables

Authors: M. Abuziarov

Abstract:

The designed complex is intended for the numerical simulation of fast dynamic processes of interaction of heterogeneous environments susceptible to the significant formability. The main challenges in solving such problems are associated with the construction of the numerical meshes. Currently, there are two basic approaches to solve this problem. One is using of Lagrangian or Lagrangian Eulerian grid associated with the boundaries of media and the second is associated with the fixed Eulerian mesh, boundary cells of which cut boundaries of the environment medium and requires the calculation of these cut volumes. Both approaches require the complex grid generators and significant time for preparing the code’s data for simulation. In this codes these problems are solved using two grids, regular fixed and mobile local Euler Lagrange - Eulerian (ALE approach) accompanying the contact and free boundaries, the surfaces of shock waves and phase transitions, and other possible features of solutions, with mutual interpolation of integrated parameters. For modeling of both liquids and gases, and deformable solids the Godunov scheme of increased accuracy is used in Lagrangian - Eulerian variables, the same for the Euler equations and for the Euler- Cauchy, describing the deformation of the solid. The increased accuracy of the scheme is achieved by using 3D spatial time dependent solution of the discontinuity problem (3D space time dependent Riemann's Problem solver). The same solution is used to calculate the interaction at the liquid-solid surface (Fluid Structure Interaction problem). The codes does not require complex 3D mesh generators, only the surfaces of the calculating objects as the STL files created by means of engineering graphics are given by the user, which greatly simplifies the preparing the task and makes it convenient to use directly by the designer at the design stage. The results of the test solutions and applications related to the generation and extension of the detonation and shock waves, loading the constructions are presented.

Keywords: fluid structure interaction, Riemann's solver, Euler variables, 3D codes

Procedia PDF Downloads 430
250 Design and Development of an Autonomous Beach Cleaning Vehicle

Authors: Mahdi Allaoua Seklab, Süleyman BaşTürk

Abstract:

In the quest to enhance coastal environmental health, this study introduces a fully autonomous beach cleaning machine, a breakthrough in leveraging green energy and advanced artificial intelligence for ecological preservation. Designed to operate independently, the machine is propelled by a solar-powered system, underscoring a commitment to sustainability and the use of renewable energy in autonomous robotics. The vehicle's autonomous navigation is achieved through a sophisticated integration of LIDAR and a camera system, utilizing an SSD MobileNet V2 object detection model for accurate and real-time trash identification. The SSD framework, renowned for its efficiency in detecting objects in various scenarios, is coupled with the lightweight and precise highly MobileNet V2 architecture, making it particularly suited for the computational constraints of on-board processing in mobile robotics. Training of the SSD MobileNet V2 model was conducted on Google Colab, harnessing cloud-based GPU resources to facilitate a rapid and cost-effective learning process. The model was refined with an extensive dataset of annotated beach debris, optimizing the parameters using the Adam optimizer and a cross-entropy loss function to achieve high-precision trash detection. This capability allows the machine to intelligently categorize and target waste, leading to more effective cleaning operations. This paper details the design and functionality of the beach cleaning machine, emphasizing its autonomous operational capabilities and the novel application of AI in environmental robotics. The results showcase the potential of such technology to fill existing gaps in beach maintenance, offering a scalable and eco-friendly solution to the growing problem of coastal pollution. The deployment of this machine represents a significant advancement in the field, setting a new standard for the integration of autonomous systems in the service of environmental stewardship.

Keywords: autonomous beach cleaning machine, renewable energy systems, coastal management, environmental robotics

Procedia PDF Downloads 12
249 Clinical Applications of Amide Proton Transfer Magnetic Resonance Imaging: Detection of Brain Tumor Proliferative Activity

Authors: Fumihiro Imai, Shinichi Watanabe, Shingo Maeda, Haruna Imai, Hiroki Niimi

Abstract:

It is important to know the growth rate of brain tumors before surgery because it influences treatment planning, including not only surgical resection strategy but also adjuvant therapy after surgery. Amide proton transfer (APT) imaging is an emerging molecular magnetic resonance imaging (MRI) technique based on chemical exchange saturation transfer without the administration of a contrast medium. The underlying assumption in APT imaging of tumors is that there is a close relationship between the proliferative activity of the tumor and mobile protein synthesis. We aimed to evaluate the diagnostic performance of APT imaging of pre-and post-treatment brain tumors. Ten patients with brain tumor underwent conventional and APT-weighted sequences on a 3.0 Tesla MRI before clinical intervention. The maximum and the minimum APT-weighted signals (APTWmax and APTWmin) in each solid tumor region were obtained and compared before and after a clinical intervention. All surgical specimens were examined for histopathological diagnosis. Eight of ten patients underwent adjuvant therapy after surgery. Histopathological diagnosis was glioma in 7 patients (WHO grade 2 in 2 patients, WHO grade 3 in 3 patients, and WHO grade 4 in 2 patients), meningioma WHO grade 1 in 2 patients, and primary lymphoma of the brain in 1 patient. High-grade gliomas showed significantly higher APTW signals than that low-grade gliomas. APTWmax in one huge parasagittal meningioma infiltrating into the skull bone was higher than that in glioma WHO grade 4. On the other hand, APTWmax in another convexity meningioma was the same as that in glioma WHO grade 3. Diagnosis of primary lymphoma of the brain was possible with APT imaging before pathological confirmation. APTW signals in residual tumors decreased dramatically within one year after adjuvant therapy in all patients. APT imaging demonstrated excellent diagnostic performance for the planning of surgery and adjuvant therapy of brain tumors.

Keywords: amides, magnetic resonance imaging, brain tumors, cell proliferation

Procedia PDF Downloads 81
248 Renovating Language Laboratories for Pedagogical and Technological Advancements in the New Era

Authors: Paul Lam, Chi Him Chan, Alan Tse

Abstract:

Language laboratories have been widely used in language learning, starting in the middle of the last century as one of the earliest forms of educational technology. They are designed to assist students’ language learning with technological innovations. Traditional language laboratories provide individual workstations that allow students to access multimedia language resources. In this type of facility, students can train their listening and speaking abilities, and teachers can also assess the performance of an individual student. Although such a setting promotes a student-centered pedagogy by encouraging students to work at their own pace and according to their own needs, it still favours a traditional, behaviourist language learning pedagogy which focuses on repetitive drilling. The change of pedagogies poses challenges to both the teachers and the facilities. The peer-learning pedagogy advocates that language learning should focus on the social aspect, which emphasizes the importance of everyday communication in language learning. The self-access, individual workstation language laboratories may not be able to provide the flexibility for interaction in the new pedagogies. Modern advancement in technology is another factor that drove our language laboratory renovation. In particular, mobile and wireless technology enabled the use of smaller and more flexible devices, making possible much clever use of space. The Chinese University of Hong Kong (CUHK) renovated nine existing language laboratories to provide lighter and more advanced equipment, movable tables, and round desks. These facilities allow more flexibility and encourage students’ interaction. It is believed that the renovated language laboratories can serve different peer learning activities and thus support peer-learning pedagogies in language teaching and learning. A survey has been conducted to collect comments from the teachers who have used the renovated language laboratories and received forty-four response. The teachers’ comments reveal that they experienced different challenges in using the renovated language laboratories, and there is a need to provide guidance to teachers during the technological and pedagogical transition. For example, teachers need instruction on using the newly installed devices such as touch-monitor and visualizer. They also need advice on planning new teaching and learning activities. Nevertheless, teachers appreciated that the renovated language laboratories are flexible and provide more spaces for different learning activities.

Keywords: language laboratories, language learning, peer-learning, student interaction

Procedia PDF Downloads 104
247 Adaptive Beamforming with Steering Error and Mutual Coupling between Antenna Sensors

Authors: Ju-Hong Lee, Ching-Wei Liao

Abstract:

Owing to close antenna spacing between antenna sensors within a compact space, a part of data in one antenna sensor would outflow to other antenna sensors when the antenna sensors in an antenna array operate simultaneously. This phenomenon is called mutual coupling effect (MCE). It has been shown that the performance of antenna array systems can be degraded when the antenna sensors are in close proximity. Especially, in a systems equipped with massive antenna sensors, the degradation of beamforming performance due to the MCE is significantly inevitable. Moreover, it has been shown that even a small angle error between the true direction angle of the desired signal and the steering angle deteriorates the effectiveness of an array beamforming system. However, the true direction vector of the desired signal may not be exactly known in some applications, e.g., the application in land mobile-cellular wireless systems. Therefore, it is worth developing robust techniques to deal with the problem due to the MCE and steering angle error for array beamforming systems. In this paper, we present an efficient technique for performing adaptive beamforming with robust capabilities against the MCE and the steering angle error. Only the data vector received by an antenna array is required by the proposed technique. By using the received array data vector, a correlation matrix is constructed to replace the original correlation matrix associated with the received array data vector. Then, the mutual coupling matrix due to the MCE on the antenna array is estimated through a recursive algorithm. An appropriate estimate of the direction angle of the desired signal can also be obtained during the recursive process. Based on the estimated mutual coupling matrix, the estimated direction angle, and the reconstructed correlation matrix, the proposed technique can effectively cure the performance degradation due to steering angle error and MCE. The novelty of the proposed technique is that the implementation procedure is very simple and the resulting adaptive beamforming performance is satisfactory. Simulation results show that the proposed technique provides much better beamforming performance without requiring complicated complexity as compared with the existing robust techniques.

Keywords: adaptive beamforming, mutual coupling effect, recursive algorithm, steering angle error

Procedia PDF Downloads 319
246 Using Industry Projects to Modernize Business Education

Authors: Marie Sams, Kate Barnett-Richards, Jacqui Speculand, Gemma Tombs

Abstract:

Business education in the United Kingdom has seen a number of improvements over the years in moving from delivering traditional chalk and talk lectures to using digital technologies and inviting guest lectures from industry to deliver sessions for students. Engaging topical industry talks to enhance course delivery is generally seen as a positive aspect of enhancing curriculum, however it is acknowledged that perhaps there are better ways in which industry can contribute to the quality of business programmes. Additionally, there is a consensus amongst UK industry managers that a bigger involvement in designing and inputting into business curriculum will have a greater impact on the quality of business ready graduates. Funded by the Disruptive Media Learning Lab at Coventry University in the UK, a project (SOPI - Student Online Projects with Industry) was initiated to enable students to work in project teams to respond and engage with real problems and challenges faced by five managers in various industries including retail, events and manufacturing. Over a semester, approximately 200 students were given the opportunity to develop their management, facilitation, problem solving and reflective skills, whilst having some exposure to real challenges in industry with a focus on supply chain and project management. Face to face seminars were re-designed to enable students to work on live issues in a competitive environment, and were guided to consider the theoretical aspects of their module delivery to underpin the solutions that they were generating. Dialogue between student groups and managers took place using Google+ community; an online social media tool which enables private discussions to take place and can be accessed on mobile devices. Results of the project will be shared in how this development has added value to students experience and understanding of the two subject areas. Student reflections will be analysed and evaluated to assess how the project has contributed to their perception of how the theoretical nature of these two business subjects are applied in practical situations.

Keywords: business, education, industry, projects

Procedia PDF Downloads 179
245 Development and Validation of a Liquid Chromatographic Method for the Quantification of Related Substance in Gentamicin Drug Substances

Authors: Sofiqul Islam, V. Murugan, Prema Kumari, Hari

Abstract:

Gentamicin is a broad spectrum water-soluble aminoglycoside antibiotics produced by the fermentation process of microorganism known as Micromonospora purpurea. It is widely used for the treatment of infection caused by both gram positive and gram negative bacteria. Gentamicin consists of a mixture of aminoglycoside components like C1, C1a, C2a, and C2. The molecular structure of Gentamicin and its related substances showed that it has lack of presence of chromophore group in the molecule due to which the detection of such components were quite critical and challenging. In this study, a simple Reversed Phase-High Performance Liquid Chromatographic (RP-HPLC) method using ultraviolet (UV) detector was developed and validated for quantification of the related substances present in Gentamicin drug substances. The method was achieved by using Thermo Scientific Hypersil Gold analytical column (150 x 4.6 mm, 5 µm particle size) with isocratic elution composed of methanol: water: glacial acetic acid: sodium hexane sulfonate in the ratio 70:25:5:3 % v/v/v/w as a mobile phase at a flow rate of 0.5 mL/min, column temperature was maintained at 30 °C and detection wavelength of 330 nm. The four components of Gentamicin namely Gentamicin C1, C1a, C2a, and C2 were well separated along with the related substance present in Gentamicin. The Limit of Quantification (LOQ) values were found to be at 0.0075 mg/mL. The accuracy of the method was quite satisfactory in which the % recovery was resulted between 95-105% for the related substances. The correlation coefficient (≥ 0.995) shows the linearity response against concentration over the range of Limit of Quantification (LOQ). Precision studies showed the % Relative Standard Deviation (RSD) values less than 5% for its related substance. The method was validated in accordance with the International Conference of Harmonization (ICH) guideline with various parameters like system suitability, specificity, precision, linearity, accuracy, limit of quantification, and robustness. This proposed method was easy and suitable for use for the quantification of related substances in routine analysis of Gentamicin formulations.

Keywords: reversed phase-high performance liquid chromatographic (RP-HPLC), high performance liquid chromatography, gentamicin, isocratic, ultraviolet

Procedia PDF Downloads 157
244 Therapeutic Drug Monitoring by Dried Blood Spot and LC-MS/MS: Novel Application to Carbamazepine and Its Metabolite in Paediatric Population

Authors: Giancarlo La Marca, Engy Shokry, Fabio Villanelli

Abstract:

Epilepsy is one of the most common neurological disorders, with an estimated prevalence of 50 million people worldwide. Twenty five percent of the epilepsy population is represented in children under the age of 15 years. For antiepileptic drugs (AED), there is a poor correlation between plasma concentration and dose especially in children. This was attributed to greater pharmacokinetic variability than adults. Hence, therapeutic drug monitoring (TDM) is recommended in controlling toxicity while drug exposure is maintained. Carbamazepine (CBZ) is a first-line AED and the drug of first choice in trigeminal neuralgia. CBZ is metabolised in the liver into carbamazepine-10,11-epoxide (CBZE), its major metabolite which is equipotent. This develops the need for an assay able to monitor the levels of both CBZ and CBZE. The aim of the present study was to develop and validate a LC-MS/MS method for simultaneous quantification of CBZ and CBZE in dried blood spots (DBS). DBS technique overcomes many logistical problems, ethical issues and technical challenges faced by classical plasma sampling. LC-MS/MS has been regarded as superior technique over immunoassays and HPLC/UV methods owing to its better specificity and sensitivity, lack of interference or matrix effects. Our method combines advantages of DBS technique and LC-MS/MS in clinical practice. The extraction process was done using methanol-water-formic acid (80:20:0.1, v/v/v). The chromatographic elution was achieved by using a linear gradient with a mobile phase consisting of acetonitrile-water-0.1% formic acid at a flow rate of 0.50 mL/min. The method was linear over the range 1-40 mg/L and 0.25-20 mg/L for CBZ and CBZE respectively. The limit of quantification was 1.00 mg/L and 0.25 mg/L for CBZ and CBZE, respectively. Intra-day and inter-day assay precisions were found to be less than 6.5% and 11.8%. An evaluation of DBS technique was performed, including effect of extraction solvent, spot homogeneity and stability in DBS. Results from a comparison with the plasma assay are also presented. The novelty of the present work lies in being the first to quantify CBZ and its metabolite from only one 3.2 mm DBS disc finger-prick sample (3.3-3.4 µl blood) by LC-MS/MS in a 10 min. chromatographic run.

Keywords: carbamazepine, carbamazepine-10, 11-epoxide, dried blood spots, LC-MS/MS, therapeutic drug monitoring

Procedia PDF Downloads 409
243 Repeated Suicidal Attempts in Foster Teenagers: Breaking the Cycle Using a Stepped Care Approach

Authors: Mathilde Blondon, Salla Aicha Dieng, Catherine Pfister

Abstract:

In a paradoxical way, teenagers nowadays seem to use suicidal attempts to elaborate on their trauma abuses and regain some kind of control in their lives. As their behavior becomes life-threatening, the hospital offers a variety of expertise to address their need, with Child Protective Services also joining in, to a point when teenagers could have a feeling of losing control of their lives, which results in them making more suicidal attempts. Our goal here is to walk with these foster teenagers long enough to step therapy up first, then as their mental health is restored enough to step the therapy down in a way that is secure and will give them their life back. This would prevent them from making suicidal attempts to get a feeling of control over their life. We’ll present a clinical case of a 14-year-old girl named Sofia, who was suffering from parental deprivation, an identity disorder, and severe depression disorder. Our intervention took place in January 2024, after Sofia had undergone four hospitalizations, including a two-month period in a specialized clinic. In a stepping-up effort, a substantial setting has been built around Sofia. She was coming three days a week to therapeutic activities at the Child Psychiatry Day Hospital, she had one psychotherapy session a week at the Medical-Psychological Center, and she was meeting with the Adolescent Psychiatrist on a regular basis. However, her suicidal attempts frequency continued to increase to the point when she couldn’t stay more than four days outside the hospital unit without harming herself and being brought back to the Emergency Unit. We were all stuck in some kind of medical deadlock, writing to clinics that had no room for her while social workers were calling foster homes that wouldn’t even accept her either. At some point, a clinical decision was made by the psychiatrist to stop what appeared to be a global movement of traumatic repetition, which involved Sofia’s family, the medical team and the social workers as one. This decision to step therapy down created a surprise and put an end to the cycle. It provided a new path, a new solution where Sofia could securely settle without being unfaithful to her family. Her suicidal attempts stopped for four weeks. She had one relapse, then didn’t make another attempt so far. There is a fine line between too little and too much, a pathway with the right amount of care and support. We believe it is not a steady line but rather a path up and down the hill. It’s about building up this moment when medication and mental processes have improved the subject’s condition enough to allow the medical team to step therapy down and give more control back to the subject. These needed variations used to come from a change of hospital or medical team. Stepped care avoids any breaking of bonds and appears to be decisive in stopping teenagers’ suicidal attempts.

Keywords: child protection, adolescent psychiatry, teenager suicidal attempt, foster teenagers, parental deprivation, stepped care

Procedia PDF Downloads 21
242 Long-Term Conservation Tillage Impact on Soil Properties and Crop Productivity

Authors: Danute Karcauskiene, Dalia Ambrazaitiene, Regina Skuodiene, Monika Vilkiene, Regina Repsiene, Ieva Jokubauskaite

Abstract:

The main ambition for nowadays agriculture is to get the economically effective yield and to secure the soil ecological sustainability. According to the effect on the main soil quality indexes, tillage systems may be separated into two types, conventional and conservation tillage. The goal of this study was to determine the impact of conservation and conventional primary soil tillage methods and soil fertility improvement measures on soil properties and crop productivity. Methods: The soil of the experimental site is Dystric Glossic Retisol (WRB 2014) with texture of sandy loam. The trial was established in 2003 in the experimental field of crop rotation of Vėžaičiai Branch of Lithuanian Research Centre for Agriculture and Forestry. Trial factors and treatments: factor A- primary soil tillage in (autumn): deep ploughing (20-25cm), shallow ploughing (10-12cm), shallow ploughless tillage (8-10cm); factor B – soil fertility improvement measures: plant residues, plant residues + straw, green manure 1st cut + straw, farmyard manure 40tha-1 + straw. The four - course crop rotation consisted of red clover, winter wheat, spring rape and spring barley with undersown. Results: The tillage had no statistically significant effect on topsoil (0-10 cm) pHKCl level, it was 5.5 - 5.7. During all experiment period, the highest soil pHKCl level (5.65) was in the shallow ploughless tillage. The organic fertilizers particularly the biomass of grass and farmyard manure had tendency to increase the soil pHKCl. The content of plant - available phosphorus and potassium significantly increase in the shallow ploughing compared with others tillage systems. The farmyard manure increases those elements in whole arable layer. The dissolved organic carbon concentration was significantly higher in the 0 - 10 cm soil layer in the shallow ploughless tillage compared with deep ploughing. After the incorporation of clover biomass and farmyard manure the concentration of dissolved organic carbon increased in the top soil layer. During all experiment period the largest amount of water stable aggregates was determined in the soil where the shallow ploughless tillage was applied. It was by 12% higher compared with deep ploughing. During all experiment time, the soil moisture was higher in the shallow ploughing and shallow ploughless tillage (9-27%) compared to deep ploughing. The lowest emission of CO2 was determined in the deep ploughing soil. The highest rate of CO2 emission was in shallow ploughless tillage. The addition of organic fertilisers had a tendency to increase the CO2 emission, but there was no statistically significant effect between the different types of organic fertilisers. The crop yield was larger in the deep ploughing soil compared to the shallow and shallow ploughless tillage.

Keywords: reduced tillage, soil structure, soil pH, biological activity, crop productivity

Procedia PDF Downloads 260
241 A System Architecture for Hand Gesture Control of Robotic Technology: A Case Study Using a Myo™ Arm Band, DJI Spark™ Drone, and a Staubli™ Robotic Manipulator

Authors: Sebastian van Delden, Matthew Anuszkiewicz, Jayse White, Scott Stolarski

Abstract:

Industrial robotic manipulators have been commonplace in the manufacturing world since the early 1960s, and unmanned aerial vehicles (drones) have only begun to realize their full potential in the service industry and the military. The omnipresence of these technologies in their respective fields will only become more potent in coming years. While these technologies have greatly evolved over the years, the typical approach to human interaction with these robots has not. In the industrial robotics realm, a manipulator is typically jogged around using a teach pendant and programmed using a networked computer or the teach pendant itself via a proprietary software development platform. Drones are typically controlled using a two-handed controller equipped with throttles, buttons, and sticks, an app that can be downloaded to one’s mobile device, or a combination of both. This application-oriented work offers a novel approach to human interaction with both unmanned aerial vehicles and industrial robotic manipulators via hand gestures and movements. Two systems have been implemented, both of which use a Myo™ armband to control either a drone (DJI Spark™) or a robotic arm (Stäubli™ TX40). The methodologies developed by this work present a mapping of armband gestures (fist, finger spread, swing hand in, swing hand out, swing arm left/up/down/right, etc.) to either drone or robot arm movements. The findings of this study present the efficacy and limitations (precision and ergonomic) of hand gesture control of two distinct types of robotic technology. All source code associated with this project will be open sourced and placed on GitHub. In conclusion, this study offers a framework that maps hand and arm gestures to drone and robot arm control. The system has been implemented using current ubiquitous technologies, and these software artifacts will be open sourced for future researchers or practitioners to use in their work.

Keywords: human robot interaction, drones, gestures, robotics

Procedia PDF Downloads 150
240 Measuring the Effect of Ventilation on Cooking in Indoor Air Quality by Low-Cost Air Sensors

Authors: Andres Gonzalez, Adam Boies, Jacob Swanson, David Kittelson

Abstract:

The concern of the indoor air quality (IAQ) has been increasing due to its risk to human health. The smoking, sweeping, and stove and stovetop use are the activities that have a major contribution to the indoor air pollution. Outdoor air pollution also affects IAQ. The most important factors over IAQ from cooking activities are the materials, fuels, foods, and ventilation. The low-cost, mobile air quality monitoring (LCMAQM) sensors, is reachable technology to assess the IAQ. This is because of the lower cost of LCMAQM compared to conventional instruments. The IAQ was assessed, using LCMAQM, during cooking activities in a University of Minnesota graduate-housing evaluating different ventilation systems. The gases measured are carbon monoxide (CO) and carbon dioxide (CO2). The particles measured are particle matter (PM) 2.5 micrometer (µm) and lung deposited surface area (LDSA). The measurements are being conducted during April 2019 in Como Student Community Cooperative (CSCC) that is a graduate housing at the University of Minnesota. The measurements are conducted using an electric stove for cooking. The amount and type of food and oil using for cooking are the same for each measurement. There are six measurements: two experiments measure air quality without any ventilation, two using an extractor as mechanical ventilation, and two using the extractor and windows open as mechanical and natural ventilation. 3The results of experiments show that natural ventilation is most efficient system to control particles and CO2. The natural ventilation reduces the concentration in 79% for LDSA and 55% for PM2.5, compared to the no ventilation. In the same way, CO2 reduces its concentration in 35%. A well-mixed vessel model was implemented to assess particle the formation and decay rates. Removal rates by the extractor were significantly higher for LDSA, which is dominated by smaller particles, than for PM2.5, but in both cases much lower compared to the natural ventilation. There was significant day to day variation in particle concentrations under nominally identical conditions. This may be related to the fat content of the food. Further research is needed to assess the impact of the fat in food on particle generations.

Keywords: cooking, indoor air quality, low-cost sensor, ventilation

Procedia PDF Downloads 107
239 Changing Patterns of Marriage and Sexual Relations among Young Single Female Workers in Garment Factories in Gazipur, Bangladesh

Authors: Runa Laila

Abstract:

In Bangladesh, migration and employment opportunities in the ready-made garment factories presented an alternative to early and arranged-marriage to many young women from the countryside. Although the positive impact of young women’s labour migration and employment in the garment industry on economic independence, increased negotiation power, and enhancement of self-esteem have been well documented, impact of employment on sexual norms and practices remained under-researched. This ethnographic study comprising of an in-depth interview of 21 single young women working in various garment factories in Gazipur, Dhaka, explores the implication of work on sexual norms and practices. This study found young single garment workers experience a range of consensual and coercive sexual relations. The mixed-sex work environment in the garment manufacturing industry and private housing arrangements provide young single women opportunities to develop romantic and sexual relationships in the transient urban space, which was more restricted in the rural areas. The use of mobile phones further aids lovers to meet in amusement parks, friends’ houses, or residential hotels beyond the gaze of colleagues and neighbors. Due to sexual double standard, men’s sexual advantage is seen as natural and accepted, while women are being blamed as immoral for being engaged in pre-marital sex. Although self-choice marriage and premarital relations reported to be common among garment workers, stigma related to premarital sex lead young single women to resort to secret abortion practices. Married men also use power position to lure women in a subordinate position in coerce sexual relations, putting their reproductive and psychological health at risk. To improve sexual and reproductive health and wellbeing of young female garment workers, it is important to understand these changing sexual practices which otherwise remain taboo in public health discourses.

Keywords: female migration, ready-made garment, reproductive health, sexual practice

Procedia PDF Downloads 179
238 Polymer Mediated Interaction between Grafted Nanosheets

Authors: Supriya Gupta, Paresh Chokshi

Abstract:

Polymer-particle interactions can be effectively utilized to produce composites that possess physicochemical properties superior to that of neat polymer. The incorporation of fillers with dimensions comparable to polymer chain size produces composites with extra-ordinary properties owing to very high surface to volume ratio. The dispersion of nanoparticles is achieved by inducing steric repulsion realized by grafting particles with polymeric chains. A comprehensive understanding of the interparticle interaction between these functionalized nanoparticles plays an important role in the synthesis of a stable polymer nanocomposite. With the focus on incorporation of clay sheets in a polymer matrix, we theoretically construct the polymer mediated interparticle potential for two nanosheets grafted with polymeric chains. The self-consistent field theory (SCFT) is employed to obtain the inhomogeneous composition field under equilibrium. Unlike the continuum models, SCFT is built from the microscopic description taking in to account the molecular interactions contributed by both intra- and inter-chain potentials. We present the results of SCFT calculations of the interaction potential curve for two grafted nanosheets immersed in the matrix of polymeric chains of dissimilar chemistry to that of the grafted chains. The interaction potential is repulsive at short separation and shows depletion attraction for moderate separations induced by high grafting density. It is found that the strength of attraction well can be tuned by altering the compatibility between the grafted and the mobile chains. Further, we construct the interaction potential between two nanosheets grafted with diblock copolymers with one of the blocks being chemically identical to the free polymeric chains. The interplay between the enthalpic interaction between the dissimilar species and the entropy of the free chains gives rise to a rich behavior in interaction potential curve obtained for two separate cases of free chains being chemically similar to either the grafted block or the free block of the grafted diblock chains.

Keywords: clay nanosheets, polymer brush, polymer nanocomposites, self-consistent field theory

Procedia PDF Downloads 248
237 Strategies of Risk Management for Smallholder Farmers in South Africa: A Case Study on Pigeonpea (Cajanus cajan) Production

Authors: Sanari Chalin Moriri, Kwabena Kingsley Ayisi, Alina Mofokeng

Abstract:

Dryland smallholder farmers in South Africa are vulnerable to all kinds of risks, and it negatively affects crop productivity and profit. Pigeonpea is a leguminous and multipurpose crop that provides food, fodder, and wood for smallholder farmers. The majority of these farmers are still growing pigeonpea from traditional unimproved seeds, which comprise a mixture of genotypes. The objectives of the study were to identify the key risk factors that affect pigeonpea productivity and to develop management strategies on how to alleviate the risk factors in pigeonpea production. The study was conducted in two provinces (Limpopo and Mpumalanga) of South Africa in six municipalities during the 2020/2021 growing seasons. The non-probability sampling method using purposive and snowball sampling techniques were used to collect data from the farmers through a structured questionnaire. A total of 114 pigeonpea producers were interviewed individually using a questionnaire. Key stakeholders in each municipality were also identified, invited, and interviewed to verify the information given by farmers. Data collected were subjected to SPSS statistical software 25 version. The findings of the study were that majority of farmers affected by risk factors were women, subsistence, and old farmers resulted in low food production. Drought, unavailability of improved pigeonpea seeds for planting, access to information, and processing equipment were found to be the main risk factors contributing to low crop productivity in farmer’s fields. Above 80% of farmers lack knowledge on the improvement of the crop and also on the processing techniques to secure high prices during the crop off-season. Market availability, pricing, and incidence of pests and diseases were found to be minor risk factors which were triggered by the major risk factors. The minor risk factors can be corrected only if the major risk factors are first given the necessary attention. About 10% of the farmers found to use the crop as a mulch to reduce soil temperatures and to improve soil fertility. The study revealed that most of the farmers were unaware of its utilisation as fodder, much, medicinal, nitrogen fixation, and many more. The risk of frequent drought in dry areas of South Africa where farmers solely depend on rainfall poses a serious threat to crop productivity. The majority of these risk factors are caused by climate change due to unrealistic, low rainfall with extreme temperatures poses a threat to food security, water, and the environment. The use of drought-tolerant, multipurpose legume crops such as pigeonpea, access to new information, provision of processing equipment, and support from all stakeholders will help in addressing food security for smallholder farmers. Policies should be revisited to address the prevailing risk factors faced by farmers and involve them in addressing the risk factors. Awareness should be prioritized in promoting the crop to improve its production and commercialization in the dryland farming system of South Africa.

Keywords: management strategies, pigeonpea, risk factors, smallholder farmers

Procedia PDF Downloads 206
236 Associations Between Pornography Use Motivations and Sexual Satisfaction in Gender Diverse and Cisgender Individuals in the 43-Country International Sex Survey

Authors: Aurélie Michaud, Émilie Gaudet, Mónika Koós, Léna Nagy, Zsolt Demetrovics, Shane W. Kraus, Marc N. Potenza, Beáta Bőthe

Abstract:

Pornography use is prevalent among adults worldwide. Prior studies have assessed the associations between pornography use frequency and sexual satisfaction, in cisgender and heterosexual individuals, with mixed results. However, measuring pornography use solely by pornography use frequency is problematic, as it can lead to disregarding important contextual factors that may be related to pornography use’s potential effects. Pornography use motivations (PUMs) represent key predictors of sexual behaviors. Yet, their associations with different indicators of sexual wellbeing have yet to be extensively studied. This cross-cultural study examined the links between the eight PUMs most often reported in the general population (i.e. sexual pleasure, sexual curiosity, emotional distraction or suppression, fantasy, stress reduction, boredom avoidance, lack of sexual satisfaction, and self-exploration) and sexual satisfaction in gender diverse and cisgender individuals. Given the lack of scientific data on associations between individuals’ PUMs and sexual satisfaction, these links were examined in an exploratory manner. A total of 43 countries from five continents were included in the International Sex Survey (ISS). A secure online platform was used to collect self-report, anonymous data from 82,243 participants (39.6% men, 57% women, 3.4% gender diverse individuals; M = 32.4 years, SD = 12.5). Gender-based differences in levels of sexual pleasure, sexual curiosity, emotional distraction, fantasy, stress reduction, boredom avoidance, lack of sexual satisfaction, and self-exploration PUMs were examined using one-way ANOVAs. Then, for each gender group, the associations between each PUM and sexual satisfaction were examined using multiple linear regression, controlling for frequency of masturbation. One-way ANOVAs indicated significant differences between men, women, and gender diverse individuals on all PUMs. For sexual pleasure, sexual curiosity, fantasy, boredom avoidance, lack of sexual satisfaction, emotional distraction, and stress reduction PUMs, men showed the highest scores, followed by gender-diverse individuals, and women. However, for self-exploration, gender-diverse individuals had higher average scores than men. For all PUMs, women’s average scores were the lowest. After controlling for frequency of masturbation, for all genders, sexual pleasure, sexual curiosity and boredom avoidance were significant positive predictors of sexual satisfaction, while lack of sexual satisfaction PUM was a significant negative predictor. Fantasy, stress reduction and self-exploration PUMs were positive significant predictors of sexual satisfaction, and fantasy was a negative significant predictor, but only for women. Findings highlight important gender differences in regards to the main motivations underlying pornography use and their relations to sexual satisfaction. While men and gender diverse individuals show similar motivation profiles, woman report a particularly unique experience, with fantasy, stress reduction and self-exploration being associated to their sexual satisfaction. This work outlines the importance of considering the role of pornography use motivations when studying the links between pornography viewing and sexual well-being, and may provide basis for gender-based considerations when working with individuals seeking help for their pornography use or sexual satisfaction.

Keywords: pornography, sexual satifsaction, cross-cultural, gender diversity

Procedia PDF Downloads 102
235 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 460
234 Supporting International Student’s Acculturation Through Chatbot Technology: A Proposed Study

Authors: Sylvie Studente

Abstract:

Despite the increase in international students migrating to the UK, the transition from home environment to a host institution abroad can be overwhelming for many students due to acculturative stressors. These stressors are reported to peak within the first six months of transitioning into study abroad which has determinantal impacts for Higher Education Institutions. These impacts include; increased drop-out rates and overall decreases in academic performance. Research suggests that belongingness can negate acculturative stressors through providing opportunities for students to form necessary social connections. In response to this universities have focussed on utilising technology to create learning communities with the most commonly deployed being social media, blogs, and discussion forums. Despite these attempts, the application of technology in supporting international students is still ambiguous. With the reported growing popularity of mobile devices among students and accelerations in learning technology owing to the COVID-19 pandemic, the potential is recognised to address this challenge via the use of chatbot technology. Whilst traditionally, chatbots were deployed as conversational agents in business domains, they have since been applied to the field of education. Within this emerging area of research, a gap exists in addressing the educational value of chatbots over and above the traditional service orientation categorisation. The proposed study seeks to extend upon current understandings by investigating the challenges faced by international students in studying abroad and exploring the potential of chatbots as a solution to assist students’ acculturation. There has been growing interest in the application of chatbot technology to education accelerated by the shift to online learning during the COVID-19 pandemic. Although interest in educational chatbots has surged, there is a lack of consistency in the research area in terms of guidance on the design to support international students in HE. This gap is widened when considering the additional challenge of supporting multicultural international students with diverse. Diversification in education is rising due to increases in migration trends for international study. As global opportunities for education increase, so does the need for multiculturally inclusive learning support.

Keywords: chatbots, education, international students, acculturation

Procedia PDF Downloads 29
233 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 252
232 Fear of Gender-Based Crime and Women Empowerment: An Empirical Study among the Urban Residents of Bangladesh

Authors: Mohammad Ashraful Alam, Biro Judit

Abstract:

Fear of gender-based crime and fear of crime victimization for women is a major concern in the urban areas of Bangladesh. Based on the recent data from various human rights organizations and international literature the study found that gender-based crime especially sexual assault and rape are increasing in Bangladesh at a significant rate in comparison to other countries. The major focus of the study was to identify the relationship between fear of gender-based crime and women empowerment. To explore the fact the study followed the mixed methodological approach comprising with quantitative and qualitative methods and used secondary information from national and international sources. Corresponding global pictures the present study found that gender, age, complexion, social position, and ethnicity were more common factors of sexual assault and victimization in Bangladesh which lead to women become more fearful about crime victimization than men. Fear of gender-based crime traumatizes women which leads to withdrawal of their non-essential everyday works and some time from the essential works based on their social position, financial status, and social honor in the society. The increasing crime rate also increases the propensity to fear of criminal victimization, traumatization, and feeling of helplessness which make them vulnerable. The patriarchal culture and practices in Bangladesh based on religious culture and established social norms women always feel defenseless therefore they withdraw themselves from various social activities and own interest. Women who have already victimized feel more fear and become traumatized, and who do not victimize yet but know the severity of victimization from the media and others’ have the feeling of fear of crime. Women who find themselves as weak bonding and low networks with their neighbors and living for a short duration have a feeling of more fear and avoid visiting a certain place in a certain time and avoid some social activities. The study found the young women have more possibilities to become victimized through the feeling of fear of crime is higher among elderly women than young. Though women feel fear of all kinds of crime but usually all aged women are more fearful of sexual assault and rape than other violent crimes. Therefore, elderly women and another person in the family does not allow younger girls to go and involve outside activities to secure their family status. On the other hand, fear of crime in public transport is more common to all aged women at a higher level and sometimes they compromise their freedom, independence, financial opportunities, the job only to avoid the perceived threat, and save their social and cultural honor. The study also explores that fear of crime does not always depend on crime rate but the crime news, the severity of the crime, delay justice, the ineffectiveness of police, bail of criminals, corruption and political favoritism, etc. Finally, the study shows that the fear of gender-based crime and violence is working as a potential barrier to ensuring women's empowerment in Bangladesh.

Keywords: compromise personal freedom, fear of crime, fear of gender-based crime, fear of violent crime victimization, rape, sexual assaults, withdrawal from regular activities, women empowerment

Procedia PDF Downloads 130
231 Innovations and Challenges: Multimodal Learning in Cybersecurity

Authors: Tarek Saadawi, Rosario Gennaro, Jonathan Akeley

Abstract:

There is rapidly growing demand for professionals to fill positions in Cybersecurity. This is recognized as a national priority both by government agencies and the private sector. Cybersecurity is a very wide technical area which encompasses all measures that can be taken in an electronic system to prevent criminal or unauthorized use of data and resources. This requires defending computers, servers, networks, and their users from any kind of malicious attacks. The need to address this challenge has been recognized globally but is particularly acute in the New York metropolitan area, home to some of the largest financial institutions in the world, which are prime targets of cyberattacks. In New York State alone, there are currently around 57,000 jobs in the Cybersecurity industry, with more than 23,000 unfilled positions. The Cybersecurity Program at City College is a collaboration between the Departments of Computer Science and Electrical Engineering. In Fall 2020, The City College of New York matriculated its first students in theCybersecurity Master of Science program. The program was designed to fill gaps in the previous offerings and evolved out ofan established partnership with Facebook on Cybersecurity Education. City College has designed a program where courses, curricula, syllabi, materials, labs, etc., are developed in cooperation and coordination with industry whenever possible, ensuring that students graduating from the program will have the necessary background to seamlessly segue into industry jobs. The Cybersecurity Program has created multiple pathways for prospective students to obtain the necessary prerequisites to apply in order to build a more diverse student population. The program can also be pursued on a part-time basis which makes it available to working professionals. Since City College’s Cybersecurity M.S. program was established to equip students with the advanced technical skills needed to thrive in a high-demand, rapidly-evolving field, it incorporates a range of pedagogical formats. From its outset, the Cybersecurity program has sought to provide both the theoretical foundations necessary for meaningful work in the field along with labs and applied learning projects aligned with skillsets required by industry. The efforts have involved collaboration with outside organizations and with visiting professors designing new courses on topics such as Adversarial AI, Data Privacy, Secure Cloud Computing, and blockchain. Although the program was initially designed with a single asynchronous course in the curriculum with the rest of the classes designed to be offered in-person, the advent of the COVID-19 pandemic necessitated a move to fullyonline learning. The shift to online learning has provided lessons for future development by providing examples of some inherent advantages to the medium in addition to its drawbacks. This talk will address the structure of the newly-implemented Cybersecurity Master’s Program and discuss the innovations, challenges, and possible future directions.

Keywords: cybersecurity, new york, city college, graduate degree, master of science

Procedia PDF Downloads 139
230 From Industry 4.0 to Agriculture 4.0: A Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability

Authors: Angelo Corallo, Maria Elena Latino, Marta Menegoli

Abstract:

Agri-food value chain involves various stakeholders with different roles. All of them abide by national and international rules and leverage marketing strategies to advance their products. Food products and related processing phases carry with it a big mole of data that are often not used to inform final customer. Some data, if fittingly identified and used, can enhance the single company, and/or the all supply chain creates a math between marketing techniques and voluntary traceability strategies. Moreover, as of late, the world has seen buying-models’ modification: customer is careful on wellbeing and food quality. Food citizenship and food democracy was born, leveraging on transparency, sustainability and food information needs. Internet of Things (IoT) and Analytics, some of the innovative technologies of Industry 4.0, have a significant impact on market and will act as a main thrust towards a genuine ‘4.0 change’ for agriculture. But, realizing a traceability system is not simple because of the complexity of agri-food supply chain, a lot of actors involved, different business models, environmental variations impacting products and/or processes, and extraordinary climate changes. In order to give support to the company involved in a traceability path, starting from business model analysis and related business process a Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability was conceived. Studying each process task and leveraging on modeling techniques lead to individuate information held by different actors during agri-food supply chain. IoT technologies for data collection and Analytics techniques for data processing supply information useful to increase the efficiency intra-company and competitiveness in the market. The whole information recovered can be shown through IT solutions and mobile application to made accessible to the company, the entire supply chain and the consumer with the view to guaranteeing transparency and quality.

Keywords: agriculture 4.0, agri-food suppy chain, industry 4.0, voluntary traceability

Procedia PDF Downloads 141
229 Perception of Corporate Social Responsibility and Enhancing Compassion at Work through Sense of Meaningfulness

Authors: Nikeshala Weerasekara, Roshan Ajward

Abstract:

Contemporary business environment, given the circumstance of stringent scrutiny toward corporate behavior, organizations are under pressure to develop and implement solid overarching Corporate Social Responsibility (CSR) strategies. In that milieu, in order to differentiate themselves from competitors and maintain stakeholder confidence banks spend millions of dollars on CSR programmes. However, knowledge on how non-western bank employees perceive such activities is inconclusive. At the same time recently only researchers have shifted their focus on positive effects of compassion at work or the organizational conditions under which it arises. Nevertheless, mediation mechanisms between CSR and compassion at work have not been adequately examined leaving a vacuum to be explored. Despite finding a purpose in work that is greater than extrinsic outcomes of the work is important to employees, meaningful work has not been examined adequately. Thus, in addition to examining the direct relationship between CSR and compassion at work, this study examined the mediating capability of meaningful work between these variables. Specifically, the researcher explored how CSR enables employees to sense work as meaningful which in turn would enhance their level of compassion at work. Hypotheses were developed to examine the direct relationship between CSR and compassion at work and the mediating effect of meaningful work on the relationship between CSR and compassion at work. Both Social Identity Theory (SIT) and Social Exchange Theory (SET) were used to theoretically support the relationships. The sample comprised of 450 respondents covering different levels of the bank. A convenience sampling strategy was used to secure responses from 13 local licensed commercial banks in Sri Lanka. Data was collected using a structured questionnaire which was developed based on a comprehensive review of literature and refined using both expert opinions and a pilot survey. Structural equation modeling using Smart Partial Least Square (PLS) was utilized for data analysis. Findings indicate a positive and significant (p < .05) relationship between CSR and compassion at work. Also, it was found that meaningful work partially mediates the relationship between CSR and compassion at work. As per the findings it is concluded that bank employees’ perception of CSR engagement not only directly influence compassion at work but also impact such through meaningful work as well. This implies that employees consider working for a socially responsible bank since it creates greater meaningfulness of work to retain with the organization, which in turn trigger higher level of compassion at work. By utilizing both SIT and SET in explaining relationships between CSR and compassion at work it amounts to theoretical significance of the study. Enhance existing literature on CSR and compassion at work. Also, adds insights on mediating capability of psychologically related variables such as meaningful work. This study is expected to have significant policy implications in terms of increasing compassion at work where managers must understand the importance of including CSR activities into their strategy in order to thrive. Finally, it provides evidence of suitability of using Smart PLS to test models with mediating relationships involving non normal data.

Keywords: compassion at work, corporate social responsibility, employee commitment, meaningful work, positive affect

Procedia PDF Downloads 123
228 Mineralogy and Fluid Inclusion Study of the Kebbouch South Pb-Zn Deposit, Northwest Tunisia

Authors: Imen Salhi, Salah Bouhlel, Bernrd Lehmann

Abstract:

The Kebbouch South Pb-Zn deposit is located 20 km to the east of El Kef (NW) in the southeastern part of the Triassic diapir belt in the Tunisian Atlas. The deposit is composed of sulfide and non-sulfide zinc-lead ore bodies. The aim of this study is to provide petrographic results, mineralogy, as well as fluid inclusion data of the carbonate-hosted Pb-Zn Kebbouch South deposit. Mineralization forms two major ore types: (1) lenticular dolostones and clay breccias in the contact zone between Triassic and Upper Cretaceous strata;, it consists of small-scale lenticular, strata-or fault-controlled mineralization mainly composed of marcasite, galena, sphalerite, pyrite, and (2) stratiform mineralization in the Bahloul Formation (Upper Cenomanian-Lower Turonian) consisting of framboidal and cubic pyrite, disseminated sphalerite and galena. Non-metalliferous and/or gangue minerals are represented by dolomite, calcite, celestite and quartz. Fluid inclusion petrography study has been carried out on calcite and celestite. Fluid inclusions hosted in celestite are less than 20 µm large and show two types of aqueous inclusions: monophase liquid aqueous inclusions (L), abundant and very small, generally less than 15 µm and liquid-rich two phase inclusions (L+V). The gas phase forms a mobile vapor bubble. Microthermometric analyses of (L+V) fluid inclusions for celestite indicate that the homogenization temperature ranges from 121 to 156°C, and final ice melting temperatures are in the range of – 19 to -9°C corresponding to salinities of 12 to 21 wt% NaCl eq. (L+V) fluid inclusions from calcite are frequently localized along the growth zones; their homogenization temperature ranges from 96 to 164°C with final ice melting temperatures between -16 and -7°C corresponding to salinities of 9 to 19 wt% NaCl eq. According to mineralogical and fluid inclusion studies, mineralization in the Pb – Zn Kebbouch South deposit formed between 96 to 164°C with salinities ranging from 9 to 21 wt% NaCl eq. A contribution of basinal brines in the ore formation of the kebbouch South Pb–Zn deposit is likely. The deposit is part of the family of MVT deposits associated with the salt diapir environment.

Keywords: fluid inclusion, Kebbouch South, mineralogy, MVT deposits, Pb-Zn

Procedia PDF Downloads 247
227 Digital and Technological Transformation of Trekking Routes of Cappadocia Valleys

Authors: Şenay Güngör, Emre Elbaşi, Beyda Sadikoğlu, Utku Eren Bağci, Ömer Uzunel

Abstract:

One of the first places that comes to mind when it comes to tourism in Turkey is the Cappadocia Region. Due to its rich geological and geomorphological heritage, Cappadocia is one of the most visited destinations in the world. In fact, in the first half of 2023, the number of international tourists visiting Cappadocia exceeded 2 million. Considering that the economy of the Cappadocia region is largely based on tourism, it is understood that the quality and technology integration levels of the touristic services offered in the region are of great importance. In this context; as a result of the observations made in Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys, where the important hiking routes of the Cappadocia Region are located, it has been observed that the digital level of the routes is insufficient. It has been observed that the telephone networks in the area are very low or have completely lost their signal strength. In addition, it was determined that the materials such as maps and brochures used by tourism agencies to introduce the valleys are simple and incomplete. It is thought that this situation negatively affects the tourists' orientation and touristic experience in the field. Eliminating these deficiencies identified in the field, improving the digital level of the above-mentioned hiking routes and increasing the added value in destinations are among the main objectives of our study. Within the scope of the study, a mobile application that can work both online and offline on hiking routes has been prepared. 3D modeling of Kızılçukur, Meskendir, Güllüdere 1 and Güllüdere 2 valleys were made using Geographical Information Systems (GIS). In addition, a website has been created to enable tourists to easily access all the above-mentioned information, visuals and technological applications related to the routes. As it is known, the effective use of information and communication technologies in touristic regions not only increases the satisfaction levels of tourists, but also positively affects the attraction of qualified tourists to the region. When the tangible and intangible outputs of this study are evaluated, it is thought that it will serve the social and economic development of the region and set an example for the digital transformation of other routes in the region.

Keywords: nevşehir, cappadocia, cappadocia valleys, trekking route

Procedia PDF Downloads 59
226 Colour and Travel: Design of an Innovative Infrastructure for Travel Applications with Entertaining and Playful Features

Authors: Avrokomi Zavitsanou, Spiros Papadopoulos, Theofanis Alexandridis

Abstract:

This paper presents the research project ‘Colour & Travel’, which is co-funded by the European Union and national resources through the Operational Programme “Competitiveness, Entrepreneurship and Innovation” 2014-2020, under the Single RTDI State Aid Action "RESEARCH - CREATE - INNOVATE". The research project proposes the design of an innovative, playful framework for exploring a variety of travel destinations and creating personalised travel narratives, aiming to entertain, educate, and promote culture and tourism. Gamification of the cultural and touristic environment can enhance its experiential, multi-sensory aspects and broaden the perception of the traveler. The latter's involvement in creating and shaping his personal travel narrations and the possibility of sharing it with others can offer him an alternative, more binding way of getting acquainted with a place. In particular, the paper presents the design of an infrastructure: (a) for the development of interactive travel guides for mobile devices, where sites with specific points of interest will be recommended, with which the user can interact in playful ways and then create his personal travel narratives, (b) for the development of innovative games within virtual reality environment, where the interaction will be offered while the user is moving within the virtual environment; and (c) for an online application where the content will be offered through the browser and the modern 3D imaging technologies (WebGL). The technological products that will be developed within the proposed project can strengthen important sectors of economic and social life, such as trade, tourism, exploitation and promotion of the cultural environment, creative industries, etc. The final applications delivered at the end of the project will guarantee an improved level of service for visitors and will be a useful tool for content creators with increased adaptability, expansibility, and applicability in many regions of Greece and abroad. This paper aims to present the research project by referencing the state of the art and the methodological scheme, ending with a brief reflection on the expected outcome in terms of results.

Keywords: gamification, culture, tourism, AR, VR, applications

Procedia PDF Downloads 139