Search results for: unknown risk people
10647 The Roles of Local Administration Management to Promote the Culture Based On Philosophy of Sufficiency Economy
Authors: Sukanya Sripho
Abstract:
The purpose of this research was to study the role of local administration management to promote culture based on philosophy of sufficiency economy to many communities in Thailand. The philosophy was given to the Thai people by their King and become one of the important policies from the Thai government. A total of 375 local people in main district, Amnadcharoen province were selected by random sampling. A questionnaire was used as the tool for collecting data. Descriptive statistics in this research included percentage, mean, and multiple regression analysis. The findings revealed that the role of facilitator was utilized the most from the management in order to promote culture based on philosophy of sufficiency economy to many communities in Thailand.Keywords: administration, management, philosophy of sufficiency economy, facilitator
Procedia PDF Downloads 39010646 Spatial Optimization of Riverfront Street Based on Inclusive Design
Authors: Lianxue Shi
Abstract:
Riverfront street has the dual characteristics of street space and waterfront space, which is not only a vital place for residents to travel and communicate but also a high-frequency space for people's leisure and entertainment. However, under the development of cities and towns pursuing efficiency, riverfront streets appear to have a variety of problems, such as a lack of multifunctionality, insufficient facilities, and loss of characteristics, which fail to meet the needs of various groups of people, and their inclusiveness is facing a great challenge. It is, therefore, evident that the optimization of riverfront street space from an inclusivity perspective is important to the establishment of a human-centered, high-quality urban space. Therefore, this article starts by exploring the interactive relationship between inclusive design and street space. Based on the analysis of the characteristics of the riverfront street space and people's needs, it proposes the four inclusive design orientations of natural inclusion, group inclusion, spatial inclusion, and social inclusion. It then constructs a design framework for the inclusive optimization of riverfront street space, aiming to create streets that are “safe and accessible, diverse and shared, distinctive and friendly, green and sustainable”. Riverfront streets in Wansheng District, Chongqing, are selected as a practice case, and specific strategies are put forward in four aspects: the creation of an accessible slow-traffic system, the provision of diversified functional services, the reshaping of emotional bonds and the integration of ecological spaces.Keywords: inclusiveness design, riverfront street, spatial optimization, street spaces
Procedia PDF Downloads 3710645 An Examination of the Relationship between the Five Stages of the Yogacara Path to Enlightenment and the Ten Ox-Herding Pictures
Authors: Kyungbong Kim
Abstract:
This study proposed to compare and analyse the five stages of cultivating the Yogâcāra path and the spiritual journey in the Ten Ox-Herding Pictures. To achieve this, the study investigated the core concepts and practice methods of the two approaches and analysed their relations from the literature reviewed. The results showed that the end goal of the two approaches is the same, the attainment of Buddhahood, with the two having common characteristics including the practice of being aware of the impermanent and non-self, and the fulfilling benefit of sentient beings. The results suggest that our Buddhist practice system needs to sincerely consider the realistic ways by which one can help people in agony in contemporary society, not by emphasizing on the enlightenment through a specific practice way for all people, but by tailored practice methods based on each one's faculties in understanding Buddhism.Keywords: transformation of consciousness to wisdom, enlightenment, the five stages of cultivating the Yogacāra path, the Ten Ox-Herding Pictures, transformation of the basis
Procedia PDF Downloads 26710644 Personality Traits and Starting a Romantic Relationship on Social Media in a Turkish Sample
Authors: Ates Gul Ergun, Melda Tacyildiz
Abstract:
The current study focuses on the relationship between the personality traits and starting a romantic relationship on social media. It is interested in the study whether there are any personality trait differences between individuals who started their romantic relationships on social media platforms or through circle of friends in daily life. Sixty five participants between the ages of 18-30 filled out a three-question-survey about romantic relationships and social media, with the Big Five Inventory. Four separate independent samples t tests comparing agreeableness and extraversion scores on the environment of participants first interacted (online vs. real-life) and where they fırst meet without interaction (online vs. real-life) were carried out. The results indicated that there was a statistically significant difference between people who had the first interaction with their partner online vs. real-life in terms of extraversion and agreeableness traits. The more extrovert and agreeable traits reported the more people were likely to interact with their partner through circle of friends in real-life. Furthermore, it was found that people who are less agreeable have a tendency to interact with their partners in social media for the first time. However, there was no statistically significant difference between how participants met with their partners without interaction (online vs. real-life) in terms of extraversion and agreeableness traits. This study has shown the relationships between personality traits and starting a romantic relationship on social media versus in real-life but not the reasons behind it. Further research could examine such reasons. In addition, the data only includes Turkish sample. By virtue of the cultural restriction in the present study, it is suggested that the future research should also include different cultures to investigate how people spend time with their friends and also in social media which can be changed according to individualism levels of countries. Overall, the study emphasizes the importance and the role of social media in individual’s lives, and it opens the ways associated with personal traits and social media relationships for further researches.Keywords: agreeableness, big five, extraversion, romantic relationships, social media
Procedia PDF Downloads 14710643 Impact of Tuberculosis Co-infection on Cytokine Expression in HIV-Infected Individuals
Authors: M. Nosik, I. Rymanova, N. Adamovich, S. Sevostyanihin, K. Ryzhov, Y. Kuimova, A. Kravtchenko, N. Sergeeva, A. Sobkin
Abstract:
HIV and Tuberculosis (TB) infections each speed the other's progress. HIV-infection increases the risk of TB disease. At the same time, TB infection is associated with clinical progression of HIV-infection. HIV+TB co-infected patients are also at higher risk of acquiring new opportunistic infections. An important feature of disease progression and clinical outcome is the innate and acquired immune responses. HIV and TB, however, have a spectrum of dysfunctions of the immune response. As cytokines play a crucial role in the immunopathology of both infections, it is important to study immune interactions in patients with dual infection HIV+TB. Plasma levels of proinflammatory cytokines IL-2, IFN-γ and immunoregulating cytokines IL-4, IL-10 were evaluated in 75 patients with dual infection HIV+TB, 58 patients with HIV monoinfection and 50 patients with TB monoinfection who were previously naïve for HAART. The decreased levels of IL-2, IFN-γ, IL-4 and IL-10 were observed in patients with dual infection HIV+TB in comparison with patients who had only HIV or TB which means the profound suppression of Th1 and Th2 cytokine secretion. Thus, those cytokines could possibly serve as immunological markers of progression of HIV-infection in patients with TB.Keywords: HIV, tuberculosis (TB), HIV associated with TB, Th1/ Th2 cytokine expression
Procedia PDF Downloads 36610642 Syndrome of Irreversible Lithium-Effectuated Neurotoxicity: Case Report and Review of Literature
Authors: David J. Thomson, Joshua C. J. Chew
Abstract:
Background: Syndrome of Irreversible Lithium-Effectuated Neurotoxicity (SILENT) is a rare complication of lithium toxicity that typically causes irreversible cerebellar dysfunction. These patients may require hemodialysis and extensive supports in the intensive care. Methods: A review was performed on the available literature of SILENT with a focus on current pathophysiological hypotheses and advances in treatment. Articles were restricted to the English language. Results: Although the exact mechanism is unclear, CNS demyelination, especially in the cerebellum, was seen on the brain biopsies of a proportion of patients. There is no definitive management of SILENT but instead current management is focused on primary and tertiary prevention – detection of those at risk, and rehabilitation post onset of neurological deficits. Conclusions: This review draws conclusions from a limited amount of available literature, most of which are isolated case reports. Greater awareness of SILENT and further investigation into the risk factors and pathogenesis are required so this serious and irreversible syndrome may be avoided.Keywords: lithium toxicity, pathogenesis, SILENT, syndrome of irreversible lithium-effectuated neurotoxicity
Procedia PDF Downloads 49910641 Regulatory Frameworks and Bank Failure Prevention in South Africa: Assessing Effectiveness and Enhancing Resilience
Authors: Princess Ncube
Abstract:
In the context of South Africa's banking sector, the prevention of bank failures is of paramount importance to ensure financial stability and economic growth. This paper focuses on the role of regulatory frameworks in safeguarding the resilience of South African banks and mitigating the risks of failures. It aims to assess the effectiveness of existing regulatory measures and proposes strategies to enhance the resilience of financial institutions in the country. The paper begins by examining the specific regulatory frameworks in place in South Africa, including capital adequacy requirements, stress testing methodologies, risk management guidelines, and supervisory practices. It delves into the evolution of these measures in response to lessons learned from past financial crises and their relevance in the unique South African banking landscape. Drawing on empirical evidence and case studies specific to South Africa, this paper evaluates the effectiveness of regulatory frameworks in preventing bank failures within the country. It analyses the impact of these frameworks on crucial aspects such as early detection of distress signals, improvements in risk management practices, and advancements in corporate governance within South African financial institutions. Additionally, it explores the interplay between regulatory frameworks and the specific economic environment of South Africa, including the role of macroprudential policies in preventing systemic risks. Based on the assessment, this paper proposes recommendations to strengthen regulatory frameworks and enhance their effectiveness in bank failure prevention in South Africa. It explores avenues for refining existing regulations to align capital requirements with the risk profiles of South African banks, enhancing stress testing methodologies to capture specific vulnerabilities, and fostering better coordination among regulatory authorities within the country. Furthermore, it examines the potential benefits of adopting innovative approaches, such as leveraging technology and data analytics, to improve risk assessment and supervision in the South African banking sector.Keywords: banks, resolution, liquidity, regulation
Procedia PDF Downloads 9110640 Sustainable Transformative Approaches to Reuse the Built Heritage of Erbil Citadel Houses as Part of Restoration
Authors: Wafaa Anwar Sulaiman Goriel
Abstract:
The historiography of the Revival heritage aims to breathe a wider spirit of historical building back into life. This paper reflects an approach to revitalizing architectural antiquities through unusual methodologies elsewhere unknown in the renovation heritage sphere using the Erbil Citadel houses as a example. The 6000-year-old, continuously occupied site of Erbil Citadel embodies the challenges and mutual opportunities in ensuring that historical context is preserved during modern redevelopment. It shows how these principles can engage traditional construction systems with modern materials and technologies. It is an approach that champions the age and integrity of restored heritage sites, containing within its vernacular style elements which add to a sense of relevance when contextually re-set in modern settings. Some Citadel’s houses will be discussed in the paper and the restoration method has been processed.Keywords: Erbil Citadel houses, preservation, heritage, historical sites
Procedia PDF Downloads 2110639 Performance Parameters of an Abbreviated Breast MRI Protocol
Authors: Andy Ho
Abstract:
Breast cancer is a common cancer in Australia. Early diagnosis is crucial for improving patient outcomes, as later-stage detection correlates with poorer prognoses. While multiparametric MRI offers superior sensitivity in detecting invasive and high-grade breast cancers compared to conventional mammography, its extended scan duration and high costs limit widespread application. As a result, full protocol MRI screening is typically reserved for patients at elevated risk. Recent advancements in imaging technology have facilitated the development of Abbreviated MRI protocols, which dramatically reduce scan times (<10 minutes compared to >30 minutes for full protocol). The potential for Abbreviated MRI to offer a more time- and cost-efficient alternative has implications for improving patient accessibility, reducing appointment durations, and enhancing compliance—especially relevant for individuals requiring regular annual screening over several decades. The purpose of this study is to assess the diagnostic efficacy of Abbreviated MRI for breast cancer screening among high-risk patients at the Royal Prince Alfred Hospital (RPA). This study aims to determine the sensitivity, specificity, and inter-reader variability of Abbreviated MRI protocols when interpreted by subspecialty-trained Breast Radiologists. A systematic review of the RPA’s electronic Picture Archive and Communication System identified high-risk patients, defined by Australian ‘Medicare Benefits Schedule’ criteria, who underwent Breast MRI from 2021 to 2022. Eligible participants included asymptomatic patients under 50 years old referred by the High-Risk Clinic due to a high-risk genetic profile or relevant familial history. The MRIs were anonymized, randomized, and interpreted by four Breast Radiologists, each independently completing standardized proforma evaluations. Radiological findings were compared against histopathology as the gold standard or follow-up imaging if biopsies were unavailable. Statistical metrics, including sensitivity, specificity, and inter-reader variability, were assessed. The Fleiss-Kappa analysis demonstrated a fair inter-reader agreement (kappa = 0.25; 95% CI: 0.19–0.32; p < 0.0001). The sensitivity for detecting malignancies was 0.75, with a specificity of 0.84. These findings underline the potential of Abbreviated MRI as a reliable screening tool for malignancies with significant specificity, though reduced sensitivity highlights the importance of robust radiologist training and consistent evaluation standards. Abbreviated MRI protocols exhibit promise as a viable screening option for high-risk patients, combining reduced scan times and acceptable diagnostic accuracy. Further work to refine interpretation practices and optimize training is essential to maximize the protocol’s utility in routine clinical screening and facilitate broader accessibility.Keywords: abbreviated, breast, cancer, MRI
Procedia PDF Downloads 1710638 The Socio-Religious, Economic, and Cultural Impacts of Aso-Ebi on South-East Nigeria
Authors: Nwaoga, Theresa Chinyere
Abstract:
The paper examines the impacts of Aso-Ebi, a Yoruba term for ‘uniform’ on the people of south-east Nigeria. Aso-Ebi is used to denote uniform wear which is typical of the people of south-west Nigeria. In the 1980s and 1990s, uniform wears were used only by immediate family members of a deceased person. This is for easy identification by visitors—to know those who are related to the deceased person. Aso-Ebi is now part of a culture that has existed in Nigeria from the Yoruba and transcended to other parts of Nigeria, precisely south-east Nigeria. The buying of Aso-Ebi and attending the occasions in the attire is the only way of showing solidarity and support to the celebrant. Aso-Ebi has led to creating a sense of belonging, opening of doors for marriage by those single, and fundraising. As part of the findings, it was discovered that Aso-Ebi has led to an increase in marital infidelity and divorce, robbery, prostitution, depression, and an increase in enmity between friends in south-east Nigeria. Data was generated through oral interviews, focus group discussion and participant observation. Secondary data were obtained from journals, textbooks, the internet and periodicals. The phenomenological method of research was used as the methodology. This method allows for an objective report and analysis of the research problem. Aso-Ebi has come to stay in Igbo culture, so there should be a proper re-orientation on the uses of Aso-Ebi during occasions like burial in Igbo land. The campaign can start from the church by discouraging people from using Aso-Ebi during burials and wedding ceremonies.Keywords: Asho Ebi, uniformed women, burial ceremonies, August meetings
Procedia PDF Downloads 14810637 The Symbolism of Kolanut in Igbo Cosmology: A Re-Examination
Authors: Chukwudi Chidume
Abstract:
This paper considers the symbolism of kola nut according to Igbo worldview. How kola nut helps to shape the people’s philosophical ideology, especially in relation to religion. The roles of kola nut within the Igbo socio-cultural context and the values attached to these roles will be examined. The roles of kola nut as a means of socialization, education and transmission of cultural values from the preceding to succeeding generations will come under consideration. Equally, this paper looks at the traditional rules regarding not only the uses but more essentially the mode of kola nut presentation, blessing, breaking and sharing of kola nut. How these rules and kola nut have persisted in the face of social and cultural changes which have affected the Igbo people shall be reviewed. The roles played by kola nut in Igbo religion will come under study, which is to correct some of the misconceptions by writers who are motivated by eurocentric idealism but quite oblivious of the Igbo cultural setting and the place of kola nut in it. The onslaught of Western civilization causing the change of attitude among the young generation towards kola nut as a vital aspect of our culture tends to pose a threat to the future and survival of kola nut. Again, the study of Igbo culture as many have done rarely gives an in depth knowledge on the concept, roles and symbolism of kola nut as one of the sacred objects like Ofo and Shrines in Igboland. Mostly it is forgotten that without kola nut, shrines cannot be attended to. Many people think that the spiritual significance and sacramental symbolism are not worth exploring. They, therefore, refuse to try and discover the ritual ramifications, claiming that to probe into the mystery demystifies the matter. Kola nut symbolism is not mysteriously inexplicable. It is a revered symbol of social intercourse with deep social relevance.Keywords: communion, consecration, Igbo, kola nut, religion
Procedia PDF Downloads 45610636 Bank Specialization and Credit Risk: Evidence from Global Financial Crisis Shock
Authors: Lemu Abebe Geleta
Abstract:
In this study, it compare the performance of banks and financial services (operational, financial, and market) across four major regions including Asia, Europe, Africa, and North with the extent of sustainability reporting. We examine how the Environment, Social, and Governance score (ESG) and the three pillars such as Return on Assets, Return on Equity, and Tobin's (Q) affect the performance of banks using data collected from 3450 observations across 40 different nations over ten years of (2011-2020). it also consider implications for governance, macroeconomics, and specific bank attributes. The results indicate a negative correlation between ESG and operational performance (ROA), financial performance (ROE), and market performance (TQ). The inclusion of diverse political and economic contexts lends distinctiveness to this paper. the findings hold significant theoretical implications for global scholars and policymakers. The limited correlation between ESG, its pillars, and the performance of banks and financial services underscores managerial shortcomings within these sectors.Keywords: bank specialization, financial crisis, credit risk, difference-in-differences, herfindahl hirschman index
Procedia PDF Downloads 2910635 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI
Authors: Brennan Lodge
Abstract:
Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies
Procedia PDF Downloads 9810634 Analysis of the Interference from Risk-Determining Factors of Cooperative and Conventional Construction Contracts
Authors: E. Harrer, M. Mauerhofer, T. Werginz
Abstract:
As a result of intensive competition, the building sector is suffering from a high degree of rivalry. Furthermore, there can be observed an unbalanced distribution of project risks. Clients are aimed to shift their own risks into the sphere of the constructors or planners. The consequence of this is that the number of conflicts between the involved parties is inordinately high or even increasing; an alternative approach to counter on that developments are cooperative project forms in the construction sector. This research compares conventional contract models and models with partnering agreements to examine the influence on project risks by an early integration of the involved parties. The goal is to show up deviations in different project stages from the design phase to the project transfer phase. These deviations are evaluated by a survey of experts from the three spheres: clients, contractors and planners. By rating the influence of the participants on specific risk factors it is possible to identify factors which are relevant for a smooth project execution.Keywords: building projects, contract models, partnering, project risks
Procedia PDF Downloads 27710633 Oil Exploration in the Niger Delta and the Right to a Healthy Environment
Authors: Olufunke Ayilara Aje-Famuyide
Abstract:
The centrality of the Petroleum Industry in the world energy is undoubted. The world economy almost runs and depends on petroleum. Petroleum industry is a multi-trillion industry; it turns otherwise poor and underdeveloped countries into wealthy nations and thrusts them at the center of international diplomacy. Although these developing nations lack the necessary technology to explore and exploit petroleum resources they are not without help as developed nations, represented by their multinational corporations are ready and willing to provide both the technical and managerial expertise necessary for the development of this natural resource. However, the exploration of these petroleum resources comes with, sometimes, grave, concomitant consequences. These consequences are especially pronounced with respect to the environment. From the British Petroleum Oil rig explosion and the resultant oil spillage and pollution in New Mexico, United States to the Mobil Oil spillage along Nigerian coast, the story and consequence is virtually the same. Nigeria’s Niger Delta Region produces Nigeria’s petroleum which accounts for more than ninety-five percent of Nigeria’s foreign exchange earnings. Between 1999 and 2007, Nigeria earned more than $400 billion from petroleum exports. Nevertheless, petroleum exploration and exploitation has devastated the Niger Delta environment. From oil spillage which pollutes the rivers, farms and wetlands to gas flaring by the multi-national corporations; the consequences is similar-a region that has been devastated by petroleum exploitation. This paper thus seeks to examine the consequences and impact of petroleum pollution in the Niger Delta of Nigeria with particular reference on the right of the people of Niger Delta to a healthy environment. The paper further seeks to examine the relevant international, regional instrument and Nigeria’s municipal laws that are meant to protect the result of the people of the Niger Delta and their enforcement by the Nigerian State. It is quite worrisome that the Niger Delta Region and its people have suffered and are still suffering grave violations of their right to a healthy environment as a result of petroleum exploitation in their region. The Nigerian effort at best is half-hearted in its protection of the people’s right.Keywords: environment, exploration, petroleum, pollution
Procedia PDF Downloads 43610632 Particulate Pollution and Its Effect on Respiratory Symptoms of Exposed Personnel's in Three Heavy Traffic Cities (Roads), Kathmandu, Nepal
Authors: Sujen Man Shrestha, Kanchan Thapa, Tista Prasai Joshi
Abstract:
Background: The present study was carried out to determine suspended particles and respirable particles of diameter less than 1 micrometers (PM1) on road side and some distance of outside from road; and to compare the respiratory symptoms between traffic police men and shop keepers directly 'exposed' to traffic fumes and office worker stay in 'protected' enclosed environment. Methods: Semi structured questionnaire was used to collect the data among case and control after getting verbal informed consent among the convenience sample of traffic police, shopkeepers and officials in three different locations in Kathmandu. Secondary data analysis of hospital data of three hospitals of Kathmandu was also performed. The data on air Particulate Matter was taken by Haz Dust. Results: The result showed air quality of road side traffic is unhealthy and there was increasing trends of respiratory illness in hospital outpatient department (OPD). The people who were exposed found to have more risk of developing respiratory diseases symptoms. Conclusions: The study concluded that air pollution level is strong contributing factor for respiratory diseases and further recommended strong, epidemiological studies with larger sample size, less bias, and also measuring other significant physical and chemicals parameters of air pollution.Keywords: heavy traffic cities, Kathmandu, particulate pollution, respiratory symptoms
Procedia PDF Downloads 30810631 Cultural Studies: The Effect of Western Culture on Muslim Lifestyle
Authors: Farah Wahida Binti Mohamad Said
Abstract:
Islamic culture is the way of life a Muslim is defined by the Qur’an and Sunnah. On the other hand, Western culture is fashioned by a host of people; Capitalists, atheists, people who believe in same-gender marriages and others of a similar nature. The main issue that faced by the Muslim in Malaysia is the effect of western culture on Muslim lifestyle. This is because of the influence from western culture that dominates mind of the Muslim and also impressed on their lifestyle. Practically, majority all things have connected with western culture. However, the main objective for this project is to develop the effect of western culture on Muslim lifestyle. This project also focuses on a few aspects that relate with cultural of Muslim and western culture nowadays. This paper will include a few method .The methods for this project are a video, interview etc. Another methodology we will put on next paper for more detail information. As a result, this research found that western cultural will be effect on Muslim lifestyle.Keywords: effect of western culture, Muslim lifestyle, western culture, western and Muslim culture
Procedia PDF Downloads 52110630 Perception of Risk toward Traffic Violence among Road Users in Makassar, Indonesia
Authors: Sulasmi Sudirman, Rachmadanty Mujah Hartika
Abstract:
Traffic violence is currently a big issue in Indonesia. However, the road users perceived risk that is caused by traffic violence is low. The lack of safety driving awareness is one of the factors that road users committed to traffic violence. There are several lists of common traffic violence in Indonesia such as lack of physical fitness, not wearing helmet, unfasten seatbelt, breaking through the traffic light, not holding a driving license, and some more violence. This research sought to explore the perception of road users toward traffic violence. The participants were road users in Makassar, Indonesia who were using cars and motorbikes. The method of the research was a qualitative approach by using a personal interview to collect data. The research showed that there three main ideas of perceiving traffic violence which are motives, environment that supported traffic violence, and reinforcement. The road users committed traffic violence had particular motive, for example, rushing. The road users committed to traffic violence when other road users and significant other did the same. The road users committed traffic violence when the police were not there to give a ticket. It can be concluded that the perception of road users toward traffic violence determined by internal aspect, the social aspect, and regulation.Keywords: perception, road users, traffic, violence
Procedia PDF Downloads 22410629 Modelling of Passengers Exchange between Trains and Platforms
Authors: Guillaume Craveur
Abstract:
The evaluation of the passenger exchange time is necessary for railway operators in order to optimize and dimension rail traffic. Several influential parameters are identified and studied. Each parameter leads to a modeling completed with the buildingEXODUS software. The objective is the modelling of passenger exchanges measured by passenger counting. Population size is dimensioned using passenger counting files which are a report of the train service and contain following useful informations: number of passengers who get on and leave the train, exchange time. These information are collected by sensors placed at the top of each train door. With passenger counting files it is possible to know how many people are engaged in the exchange and how long is the exchange, but it is not possible to know passenger flow of the door. All the information about observed exchanges are thus not available. For this reason and in order to minimize inaccuracies, only short exchanges (less than 30 seconds) with a maximum of people are performed.Keywords: passengers exchange, numerical tools, rolling stock, platforms
Procedia PDF Downloads 23010628 Qualitative Analysis of Current Child Custody Evaluation Practices
Authors: Carolyn J. Ortega, Stephen E. Berger
Abstract:
The role of the custody evaluator is perhaps one of the most controversial and risky endeavors in clinical practice. Complaints filed with licensing boards regarding a child-custody evaluation constitute the second most common reason for such an event. Although the evaluator is expected to answer for the family-law court what is in the “best interest of the child,” there is a lack of clarity on how to establish this in any empirically validated manner. Hence, practitioners must contend with a nebulous framework in formulating their methodological procedures that inherently places them at risk in an already litigious context. This study sought to qualitatively investigate patterns of practice among doctoral practitioners conducting child custody evaluations in the area of Southern California. Ten psychologists were interviewed who devoted between 25 and 100% of their California private practice to custody work. All held Ph.D. degrees with a range of eight to 36 years of experience in custody work. Semi-structured interviews were used to investigate assessment practices, ensure adherence to guidelines, risk management, and qualities of evaluators. Forty-three Specific Themes were identified using Interpretive Phenomenological Analysis (IPA). Seven Higher Order Themes clustered on salient factors such as use of Ethics, Law, Guidelines; Parent Variables; Child Variables; Psychologist Variables; Testing; Literature; and Trends. Evaluators were aware of the ever-present reality of a licensure complaint and thus presented idiosyncratic descriptions of risk management considerations. Ambiguity about quantifying and validly tapping parenting abilities was also reviewed. Findings from this study suggested a high reliance on unstructured and observational methods in child custody practices.Keywords: forensic psychology, psychological testing, assessment methodology, child custody
Procedia PDF Downloads 28510627 The Relationship between Proximity to Sources of Industrial-Related Outdoor Air Pollution and Children Emergency Department Visits for Asthma in the Census Metropolitan Area of Edmonton, Canada, 2004/2005 to 2009/2010
Authors: Laura A. Rodriguez-Villamizar, Alvaro Osornio-Vargas, Brian H. Rowe, Rhonda J. Rosychuk
Abstract:
Introduction/Objectives: The Census Metropolitan Area of Edmonton (CMAE) has important industrial emissions to the air from the Industrial Heartland Alberta (IHA) at the Northeast and the coal-fired power plants (CFPP) at the West. The objective of the study was to explore the presence of clusters of children asthma ED visits in the areas around the IHA and the CFPP. Methods: Retrospective data on children asthma ED visits was collected at the dissemination area (DA) level for children between 2 and 14 years of age, living in the CMAE between April 1, 2004, and March 31, 2010. We conducted a spatial analysis of disease clusters around putative sources with count (ecological) data using descriptive, hypothesis testing, and multivariable modeling analysis. Results: The mean crude rate of asthma ED visits was 9.3/1,000 children population per year during the study period. Circular spatial scan test for cases and events identified a cluster of children asthma ED visits in the DA where the CFPP are located in the Wabamum area. No clusters were identified around the IHA area. The multivariable models suggest that there is a significant decline in risk for children asthma ED visits as distance increases around the CFPP area this effect is modified at the SE direction with mean angle 125.58 degrees, where the risk increases with distance. In contrast, the regression models for IHA suggest that there is a significant increase in risk for children asthma ED visits as distance increases around the IHA area and this effect is modified at SW direction with mean angle 216.52 degrees, where the risk increases at shorter distances. Conclusions: Different methods for detecting clusters of disease consistently suggested the existence of a cluster of children asthma ED visits around the CFPP but not around the IHA within the CMAE. These results are probably explained by the direction of the air pollutants dispersion caused by the predominant and subdominant wind direction at each point. The use of different approaches to detect clusters of disease is valuable to have a better understanding of the presence, shape, direction and size of clusters of disease around pollution sources.Keywords: air pollution, asthma, disease cluster, industry
Procedia PDF Downloads 28410626 Ecological Tourism Performance and Environmental Sustainability of Mediterranean Countries
Authors: Mehmet Tahir Dursun, Hilmi Rafet Yüncü
Abstract:
In social life growing fast, not only people, but also, companies and regions are located in a struggle to provide continuity of life cycles. This struggle brings together an important competitiveness when considering environmental conditions. By emphasizing this point, being able to competitiveness notion comes out as a determiner of the struggle to exist. With the development of technology in tourism industry so as in all branches, it is seen that the companies and regions in different districts are in competitiveness and competitiveness ability is affected in assessing of marketing shares. A condition of competitiveness is to provide sustainability of all structured forms. In addition, environment and sensitiveness of environment are notions affecting directly the competitiveness ability of tourism destinations. It is claimed that providing the sustainability of environment gives competitiveness to tourism destinations. In this study, competitiveness and performances of tourism in Mediterranean countries are going to be compared by examining a variety of indexes related to the sensitiveness of environment. Travel and Tourism Competitiveness Index (T&TCI) (Environmental Sustainability and Natural Resources), Environmental Performance Index (EPI), Ecological Foot Print, Human Development Index (HDI), Climate Risk Index (CRI) will be used in this study. These Index data will be compared with international tourist arrivals, international tourism receives and expenses of per tourist of countries.Keywords: ecological foot print, environmental performance index, human development index, sustainability, travel and tourism competitiveness index
Procedia PDF Downloads 35610625 Effects of Macroprudential Policies on BankLending and Risks
Authors: Stefanie Behncke
Abstract:
This paper analyses the effects of different macroprudential policy measures that have recently been implemented in Switzerland. Among them is the activation and the increase of the countercyclical capital buffer (CCB) and a tightening of loan-to-value (LTV) requirements. These measures were introduced to limit systemic risks in the Swiss mortgage and real estate markets. They were meant to affect mortgage growth, mortgage risks, and banks’ capital buffers. Evaluation of their quantitative effects provides insights for Swiss policymakers when reassessing their policy. It is also informative for policymakers in other countries who plan to introduce macroprudential instruments. We estimate the effects of the different macroprudential measures with a Differences-in-Differences estimator. Banks differ with respect to the relative importance of mortgages in their portfolio, their riskiness, and their capital buffers. Thus, some of the banks were more affected than others by the CCB, while others were more affected by the LTV requirements. Our analysis is made possible by an unusually informative bank panel data set. It combines data on newly issued mortgage loans and quantitative risk indicators such as LTV and loan-to-income (LTI) ratios with supervisory information on banks’ capital and liquidity situation and balance sheets. Our results suggest that the LTV cap of 90% was most effective. The proportion of new mortgages with a high LTV ratio was significantly reduced. This result does not only apply to the 90% LTV, but also to other threshold values (e.g. 80%, 75%) suggesting that the entire upper part of the LTV distribution was affected. Other outcomes such as the LTI distribution, the growth rates of mortgages and other credits, however, were not significantly affected. Regarding the activation and the increase of the CCB, we do not find any significant effects: neither LTV/LTI risk parameters nor mortgage and other credit growth rates were significantly reduced. This result may reflect that the size of the CCB (1% of relevant residential real estate risk-weighted assets at activation, respectively 2% at the increase) was not sufficiently high enough to trigger a distinct reaction between the banks most likely to be affected by the CCB and those serving as controls. Still, it might be have been effective in increasing the resilience in the overall banking system. From a policy perspective, these results suggest that targeted macroprudential policy measures can contribute to financial stability. In line with findings by others, caps on LTV reduced risk taking in Switzerland. To fully assess the effectiveness of the CCB, further experience is needed.Keywords: banks, financial stability, macroprudential policy, mortgages
Procedia PDF Downloads 36210624 A Deep Explanation for the Formation of Force as a Foundational Law of Physics by Incorporating Unknown Degrees of Freedom into Space
Authors: Mohsen Farshad
Abstract:
Information and force definition has been intertwined with the concept of entropy for many years. The displacement information of degrees of freedom with Brownian motions at a given temperature in space emerges as an entropic force between species. Here, we use this concept of entropy to understand the underlying physics behind the formation of attractive and repulsive forces by imagining that space is filled with free Brownian degrees of freedom. We incorporate the radius of bodies and the distance between them into entropic force relation systematically. Using this modified gravitational entropic force, we derive the attractive entropic force between bodies without considering their spin. We further hypothesize a possible mechanism for the formation of the repulsive force between two bodies. We visually elaborate that the repulsive entropic force will be manifested through the rotation of degrees of freedom around the spinning particles.Keywords: entropy, information, force, Brownian Motions
Procedia PDF Downloads 7810623 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 9210622 Students’ Online Forum Activities and Social Network Analysis in an E-Learning Environment
Authors: P. L. Cheng, I. N. Umar
Abstract:
Online discussion forum is a popular e-learning technique that allows participants to interact and construct knowledge. This study aims to examine the levels of participation, categories of participants and the structure of their interactions in a forum. A convenience sampling of one course coordinator and 23 graduate students was selected in this study. The forums’ log file and the Social Network Analysis software were used in this study. The analysis reveals 610 activities (including viewing forum’s topic, viewing discussion thread, posting a new thread, replying to other participants’ post, updating an existing thread and deleting a post) performed by them in this forum, with an average of 3.83 threads posted. Also, this forum consists of five at-risk participants, six bridging participants, four isolated participants and five leaders of information. In addition, the network density value is 0.15 and there exist five reciprocal interactions in this forum. The closeness value varied between 28 and 68 while the eigen vector centrality value varied between 0.008 and 0.39. The finding indicates that the participants tend to listen more rather than express their opinions in the forum. It was also revealed that those who actively provide supports in the discussion forum were not the same people who received the most responses from their peers. This study found that cliques do not exist in the forum and the participants are not selective to whom they response to, rather, it was based on the content of the posts made by their peers. Based upon the findings, further analysis with different method and population, larger sample size and a longer time frame are recommended.Keywords: e-learning, learning management system, online forum, social network analysis
Procedia PDF Downloads 39110621 Aliasing Free and Additive Error in Spectra for Alpha Stable Signals
Authors: R. Sabre
Abstract:
This work focuses on the symmetric alpha stable process with continuous time frequently used in modeling the signal with indefinitely growing variance, often observed with an unknown additive error. The objective of this paper is to estimate this error from discrete observations of the signal. For that, we propose a method based on the smoothing of the observations via Jackson polynomial kernel and taking into account the width of the interval where the spectral density is non-zero. This technique allows avoiding the “Aliasing phenomenon” encountered when the estimation is made from the discrete observations of a process with continuous time. We have studied the convergence rate of the estimator and have shown that the convergence rate improves in the case where the spectral density is zero at the origin. Thus, we set up an estimator of the additive error that can be subtracted for approaching the original signal without error.Keywords: spectral density, stable processes, aliasing, non parametric
Procedia PDF Downloads 13110620 Predictors and Prevention of Sports’ Injuries among Male Professional Footballers in Nigeria
Authors: Timothy A. Oloyede
Abstract:
The study assessed the influence of playing field, climatic conditions, rate of exposure to matches, skill level and competition level on the occurrence and severity of football injuries. The prospective outline of the study was as follows: after a baseline examination and measurements were performed ascertaining possible predictors of injury, all players were followed up weekly for one year to register subsequent injuries and complaints. Four hundred and thirty-five out of 455 subjects completed the weekly follow-ups over one year. Multiple regression analysis was employed to analyse the data collected. Results showed that playing field, climatic conditions, rate of exposure to matches skill level and competition level were predictors of injuries among the professional footballer. Playing on natural grass, acclimatization, reduction of physical overload, among others, were strategies postulated for preventing injuries.Keywords: sports’ injuries, predictors of sports’ injuries, intrinsic risk factors, extrinsic risk factors, injury mechanism, professional footballer
Procedia PDF Downloads 25310619 Safety Conditions Analysis of Scaffolding on Construction Sites
Authors: M. Pieńko, A. Robak, E. Błazik-Borowa, J. Szer
Abstract:
This paper presents the results of analysis of 100 full-scale scaffolding structures in terms of compliance with legal acts and safety of use. In 2016 and 2017, authors examined scaffolds in Poland located at buildings which were at construction or renovation stage. The basic elements affecting the safety of scaffolding use such as anchors, supports, platforms, guardrails and toe-boards have been taken into account. All of these elements were checked in each of considered scaffolding. Based on the analyzed scaffoldings, the most common errors concerning assembly process and use of scaffolding were collected. Legal acts on the scaffoldings are not always clear, and this causes many issues. In practice, people realize how dangerous the use of incomplete scaffolds is only when the accident occurs. Despite the fact that the scaffolding should ensure the safety of its users, most accidents on construction sites are caused by fall from a height.Keywords: façade scaffolds, load capacity, practice, safety of people
Procedia PDF Downloads 40310618 Facebook Spam and Spam Filter Using Artificial Neural Networks
Authors: A. Fahim, Mutahira N. Naseem
Abstract:
SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.Keywords: artificial neural networks, facebook spam, social networking sites, spam filter
Procedia PDF Downloads 373