Search results for: crime pattern theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7281

Search results for: crime pattern theory

7161 Cultural Factors Associated with Male Criminal Behavior and Inmate Population

Authors: Patricia Martinez Lanz, Patricia Hernandez Valdez

Abstract:

Over the last decade, crime has reached unprecedented levels and has caused much violent death in Mexico. To establish factors that potentially can facilitate crime, as well as the status of the emotional wellbeing presented in prison population, the present study was realized with a sample composed of 299 inmates of the Federal Center for Social Reinsertion in Oaxaca, Mexico. A questionnaire was specifically developed designed and applied to this population, evaluating sociodemographic factors and four Likert scales: substance consumption (drugs and alcohol), domestic violence and depressive symptoms. Reliability was adequate (Cronbach's Alpha= .703) and validity of the instrument showed appropriate relations between the reagents of each scale. Results showed through Chi Square analysis, statistically significant differences in the correlations between sociodemographic factors, domestic violence, addictions and depressive symptoms. Results reported that most of the inmates were between 28 and 47 years old (51.8%), had a low educational level (elementary school 42.5%), were in consensual union (42.5%), had high and severe levels of alcohol consumption (43.5% of the cases) and reported the presence of high and severe level of depression (28.9% of the cases). The results of this research are part of a national study of all Federal Centers for Social Reinsertion System in Mexico, in order to developed intervention strategies used in prison to prevent crime.

Keywords: delinquency, addictions, violence, depression, crime, criminal behavior

Procedia PDF Downloads 150
7160 Role of Vigilante in Crime Control in Bodija Market

Authors: Obadiah Nwabueze

Abstract:

Bodija market is classified as Central Business District (CBD) of Ibadan North Local Government Area of Oyo State (Nigeria) because of socio economic activities, so Crime is a peculiar social issue that causes insecurity. The law enforcement agencies tasked with crime prevention and control such as the Nigerian Police have insufficient manpower, and a resultant effect is the emergence of Vigilante groups as citizen’s response to crime control and prevention (self-help). The research design adopted for this study is a case study design exploring Vigilante activities in Bodija Market. The study utilizes both quantitative and qualitative approach, sources of data includes primary and secondary sources. A sample of 127 respondents randomly picked from the 4 sections of Bodija Market through questionnaire, comprising of 50 male and 77 females which alienates issues of gender bias in addition to the 4 in-depth interview, making a total of 131 respondents. Statistical package for Social Sciences (SPSS) was used. The descriptive statistics of simple frequency, percentage, charts and graphs were computed for the analysis. Finding in the study shows that the market vigilante is able to deter and disrupt criminal activities through strategic spiritual intelligence (SSI), use of charm and juju, physical presence in strategic locations vulnerable to crime occurrence. Findings in the study also show that vigilantes collaborate with the police by assisting them in surveillance, tracking down criminals, identifying black spots, acting as informants to the police, arrest and handover criminal to police. Their challenges include poor equipment, motivation, unhealthy rivalry between the vigilante and the police. The study recommends that the government should support vigilantes with logistics and training, including patrol vehicle and radio communication. The study also recommends the integration of the informal mechanism (juju and charm) of crime detection and prevention into the formal policing strategy, an office should be created in the force commands for use of SSI.

Keywords: central business district, CBD, charm, Juju, strategic spiritual intelligence, SSI

Procedia PDF Downloads 211
7159 SQL Generator Based on MVC Pattern

Authors: Chanchai Supaartagorn

Abstract:

Structured Query Language (SQL) is the standard de facto language to access and manipulate data in a relational database. Although SQL is a language that is simple and powerful, most novice users will have trouble with SQL syntax. Thus, we are presenting SQL generator tool which is capable of translating actions and displaying SQL commands and data sets simultaneously. The tool was developed based on Model-View-Controller (MVC) pattern. The MVC pattern is a widely used software design pattern that enforces the separation between the input, processing, and output of an application. Developers take full advantage of it to reduce the complexity in architectural design and to increase flexibility and reuse of code. In addition, we use White-Box testing for the code verification in the Model module.

Keywords: MVC, relational database, SQL, White-Box testing

Procedia PDF Downloads 400
7158 Female Criminality in Lagos State: A Case of Armed Robbery

Authors: Ebobo Urowoli Christiana

Abstract:

The Nigerian Prison Service statistics of 2007; 2009 revealed that though crime in the past was ascribed to men, but today there is a steady increase in the population of women involved in crime. This study focused on the investigation of female criminality in Lagos State: A case of Armed Robbery. Its major objective was to find out if there is an increase or decrease in female involvement in armed robbery and its growth rate. The major research question is 'Is there an increase in the perpetration of armed robbery by females in Lagos State?' the null hypotheses is 'There is no significant increase in the perpetration of armed robbery by females in Lagos State.' As a result, this study adopted the survey design, purposive sampling method and a sample size of 120 respondents. The rational choice theory was used to explain the reason for female involvement in armed robbery. Both primary and secondary data was generated for this study; the primary data was collected from the criminal records in Lagos State Police Command, Panti while the Quantitative data was collected using the questionnaire from 120 female detainees and inmates. The data collected was analyzed using the simple frequency tables and percentages and chi square was used to test for relationships. The study revealed a persistent rise in the prevalence of female armed robbery and recommended that youths should be equipped with educational/vocational skills in order to lead responsible lives.

Keywords: criminality, armed robbery, female, police commands, panti, nature

Procedia PDF Downloads 379
7157 From Theory to Practice: Teaching Rhetorical Theory for Effective Argumentative Essay Writing

Authors: Mohammad Ahmadi

Abstract:

Argumentative writing is a highly opinion-based form of discourse that necessitates the ability to address commonly held opinions (endoxa). To enhance the development of persuasive, argumentative essays, the incorporation of classical rhetorical theory, with a specific focus on topics related to the canon of Invention (inventio), can be advantageous. This research investigates the practical application of rhetorical theory in teaching students how to construct compelling argumentative essays. The fundamental premise of this study is the limited familiarity of rhetoric and composition students with rhetorical theory. Consequently, this paper presents an effective pedagogical approach to introduce rhetorical theory to students, beginning from a foundational level. It delineates the procedures and progression that educators should adopt to elucidate and facilitate students' comprehension of rhetorical theory while demonstrating its utilization in the writing of an argumentative essay.

Keywords: argumentative essay, rhetorical theory, pedagogy, invention

Procedia PDF Downloads 46
7156 Personal and Social Factors as Barriers to Leisure Walking in Residential Neighborhoods

Authors: Zeinab Aliyas, Diba Mahboubi

Abstract:

Leisure walking is known as one of the most common types of physical activity that perform in purpose of recreation or health, which in turn may affect resident’s health. In the recent years, promoting leisure walking activity in neighborhood areas become as one of the important issues regarding promoting mental and physical health, however; the level of physical inactivity is rising in many societies including Iran. As it was proven that the tendency to walk out of choice is not encouraging among Iranian people. Hence; understanding the main concern of residents regarding walking activity in their neighborhoods can help in increasing the tendency to do leisure activity among residents. Built environment, social and individual factors are known as the main factors that affect decision to walk, in this regard, the study aimed to investigate the influence of personal and social factors that prevent residents to walk for recreation or exercise in their neighborhoods. Hence the fear of crime and personal barriers were examined in the current research as social and personal factors respectively. To collect the required data, 500 questionnaires by using systematic sampling were distributed from March to May 2016 in four residential neighborhoods of Bandar Abbas in Iran out which 411 questionnaire turned out to be qualified to be used in the study. The Smart-PLS was used to analyze the data. The findings of the study revealed that personal and fear of crime both have significant influence on the level of recreation and exercise walking in the neighborhood areas. The study found that fear of crime has the higher influence on exercise and recreational walking behavior in comparison to individual factors. It was revealed that social factors such as fear of crime in the neighborhoods might be more important than the personal reason for walking optionally in the surrounding environment. The finding of this study can help urban and health researcher to know the significant influence of fear of crime and individual attitudes on the level of leisure walking activity, in addition, the findings of the study suggest that urban planners and designers, as well as public health promoters, need to highly consider the contribution of neighborhoods' social environment variables as well as individual variables to promote walking behavior changes among adult population.

Keywords: exercise walking, fear of crime, neighborhood, personal barriers, recreation walking

Procedia PDF Downloads 165
7155 Effect of Stitching Pattern on Composite Tubular Structures Subjected to Quasi-Static Crushing

Authors: Ali Rabiee, Hessam Ghasemnejad

Abstract:

Extensive experimental investigation on the effect of stitching pattern on tubular composite structures was conducted. The effect of stitching reinforcement through thickness on using glass flux yarn on energy absorption of fiber-reinforced polymer (FRP) was investigated under high speed loading conditions at axial loading. Keeping the mass of the structure at 125 grams and applying different pattern of stitching at various locations in theory enables better energy absorption, and also enables the control over the behaviour of force-crush distance curve. The study consists of simple non-stitch absorber comparison with single and multi-location stitching behaviour and its effect on energy absorption capabilities. The locations of reinforcements are 10 mm, 20 mm, 30 mm, 10-20 mm, 10-30 mm, 20-30 mm, 10-20-30 mm and 10-15-20-25-30-35 mm from the top of the specimen. The effect of through the thickness reinforcements has shown increase in energy absorption capabilities and crushing load. The significance of this is that as the stitching locations are closer, the crushing load increases and consequently energy absorption capabilities are also increased. The implementation of this idea would improve the mean force by applying stitching and controlling the behaviour of force-crush distance curve.

Keywords: through-thickness stitching, 3D enforcement​, energy absorption, tubular composite structures

Procedia PDF Downloads 234
7154 Using Discriminant Analysis to Forecast Crime Rate in Nigeria

Authors: O. P. Popoola, O. A. Alawode, M. O. Olayiwola, A. M. Oladele

Abstract:

This research work is based on using discriminant analysis to forecast crime rate in Nigeria between 1996 and 2008. The work is interested in how gender (male and female) relates to offences committed against the government, against other properties, disturbance in public places, murder/robbery offences and other offences. The data used was collected from the National Bureau of Statistics (NBS). SPSS, the statistical package was used to analyse the data. Time plot was plotted on all the 29 offences gotten from the raw data. Eigenvalues and Multivariate tests, Wilks’ Lambda, standardized canonical discriminant function coefficients and the predicted classifications were estimated. The research shows that the distribution of the scores from each function is standardized to have a mean O and a standard deviation of 1. The magnitudes of the coefficients indicate how strongly the discriminating variable affects the score. In the predicted group membership, 172 cases that were predicted to commit crime against Government group, 66 were correctly predicted and 106 were incorrectly predicted. After going through the predicted classifications, we found out that most groups numbers that were correctly predicted were less than those that were incorrectly predicted.

Keywords: discriminant analysis, DA, multivariate analysis of variance, MANOVA, canonical correlation, and Wilks’ Lambda

Procedia PDF Downloads 440
7153 Sequential Pattern Mining from Data of Medical Record with Sequential Pattern Discovery Using Equivalent Classes (SPADE) Algorithm (A Case Study : Bolo Primary Health Care, Bima)

Authors: Rezky Rifaini, Raden Bagus Fajriya Hakim

Abstract:

This research was conducted at the Bolo primary health Care in Bima Regency. The purpose of the research is to find out the association pattern that is formed of medical record database from Bolo Primary health care’s patient. The data used is secondary data from medical records database PHC. Sequential pattern mining technique is the method that used to analysis. Transaction data generated from Patient_ID, Check_Date and diagnosis. Sequential Pattern Discovery Algorithms Using Equivalent Classes (SPADE) is one of the algorithm in sequential pattern mining, this algorithm find frequent sequences of data transaction, using vertical database and sequence join process. Results of the SPADE algorithm is frequent sequences that then used to form a rule. It technique is used to find the association pattern between items combination. Based on association rules sequential analysis with SPADE algorithm for minimum support 0,03 and minimum confidence 0,75 is gotten 3 association sequential pattern based on the sequence of patient_ID, check_Date and diagnosis data in the Bolo PHC.

Keywords: diagnosis, primary health care, medical record, data mining, sequential pattern mining, SPADE algorithm

Procedia PDF Downloads 370
7152 Current Judicial Discourse Regarding the Impact of Alcohol Use Disorders on Crime in Canada

Authors: Ellen McClure

Abstract:

It is generally well-known that a number of inmates suffer from some form of substance or alcohol use disorder. This study identifies, analyses, classifies and codifies the most recent Canadian criminal judgments involving an accused diagnosed with an alcohol use disorder specifically. From this research, patterns in judicial discourse and sentencing norms can be established, and these findings can be juxtaposed with existing relevant academic literature, particular attention will be given to this discussion at the sentencing stage, and the subsequent incarceration of those with alcohol use disorders. This topic will be explored with an overarching emphasis on the effects that a lack of conversation regarding a possible correlation between alcohol consumption and crime may have. Although comparisons may be made in order to clarify or highlight certain issues, particular attention will be paid to jurisdictions within Canada. This paper explores the existing judicial discourse in sentencing regarding the relationship between alcohol and crime, and how this might explain the higher incarceration rates of those suffering from alcohol use disorders in Canada. The research questions are as follows: (1) What are the existing judicial discourses in sentencing around the relationship between alcohol and crime? (2) To what extent has the current discourse on alcohol addiction among judges and legal academics contributed to the incarceration of alcoholics?The major findings of this research indicate a strong correlation between a lack of judicial discussion regarding the accused’s alcohol use disorder and an increased tendency to consider an alcohol use disorder as an aggravating factor. Furthermore, it was found that an 82% of judges who discussed the alcohol use disorder meaningfully referred to the disorder as a mitigating factor. This can be compared with 6.7% of judges who referred to the alcohol use disorder as a mitigating factor in cases where the disorder was not meaningfully discussed.

Keywords: alcohol use disorder, addiction, criminal justice, judicial discourse

Procedia PDF Downloads 237
7151 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.

Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19

Procedia PDF Downloads 37
7150 Structural Parameter-Induced Focusing Pattern Transformation in CEA Microfluidic Device

Authors: Xin Shi, Wei Tan, Guorui Zhu

Abstract:

The contraction-expansion array (CEA) microfluidic device is widely used for particle focusing and particle separation. Without the introduction of external fields, it can manipulate particles using hydrodynamic forces, including inertial lift forces and Dean drag forces. The focusing pattern of the particles in a CEA channel can be affected by the structural parameter, block ratio, and flow streamlines. Here, two typical focusing patterns with five different structural parameters were investigated, and the force mechanism was analyzed. We present nine CEA channels with different aspect ratios based on the process of changing the particle equilibrium positions. The results show that 10-15 μm particles have the potential to generate a side focusing line as the structural parameter (¬R𝓌) increases. For a determined channel structure and target particles, when the Reynolds number (Rₑ) exceeds the critical value, the focusing pattern will transform from a single pattern to a double pattern. The parameter α/R𝓌 can be used to calculate the critical Reynolds number for the focusing pattern transformation. The results can provide guidance for microchannel design and biomedical analysis.

Keywords: microfluidic, inertial focusing, particle separation, Dean flow

Procedia PDF Downloads 51
7149 The Whole Is Greater than ‘Them’ and ‘Us’: The Effect of a Shared Workplace of Israeli-Jews and Non-Israeli Palestinians Physicians on Mutual Attitudes

Authors: Idit Miller

Abstract:

This paper examines the effect of a common organizational identity on intergroup relations of Israeli-Jews and non-Israeli Palestinians medical interns who are employed together within the Israeli hospitals, while asymmetrical relationships and ongoing conflict between the two groups still exist. Using mixed theory, which included the Intergroup contact, Othering, and the Common social identity theories, the study examines the intra-organizational identities dynamic involved within the hospital department and its effects on intergroup relations. In-depth, semi-structured interviews with the Palestinian and Jews physicians were conducted. Findings show three social identity responses are being constructed during the shared employment: Them vs. Us construction, Them vs. Us deconstruction, and an 'Organizational Us' reconstruction. Despite the inequality inherent within the intergroup relations, by holding a universal identity and using a deconstruction pattern, positive emotions are demonstrated by both sides. The adoption of a shared professional super-identity is found as an essential component for fostering and maintaining positive attitudes between the parties. This finding strengthens the significance of a long-term continuous intergroup contact inside the organization and especially between two polarized groups.

Keywords: common social identity theory, intergroup contact theory, inequality, intergroup conflict, othering theory

Procedia PDF Downloads 126
7148 A Study on Game Theory Approaches for Wireless Sensor Networks

Authors: M. Shoukath Ali, Rajendra Prasad Singh

Abstract:

Game Theory approaches and their application in improving the performance of Wireless Sensor Networks (WSNs) are discussed in this paper. The mathematical modeling and analysis of WSNs may have low success rate due to the complexity of topology, modeling, link quality, etc. However, Game Theory is a field, which can efficiently use to analyze the WSNs. Game Theory is related to applied mathematics that describes and analyzes interactive decision situations. Game theory has the ability to model independent, individual decision makers whose actions affect the surrounding decision makers. The outcome of complex interactions among rational entities can be predicted by a set of analytical tools. However, the rationality demands a stringent observance to a strategy based on measured of perceived results. Researchers are adopting game theory approaches to model and analyze leading wireless communication networking issues, which includes QoS, power control, resource sharing, etc.

Keywords: wireless sensor network, game theory, cooperative game theory, non-cooperative game theory

Procedia PDF Downloads 398
7147 An Analysis of Sequential Pattern Mining on Databases Using Approximate Sequential Patterns

Authors: J. Suneetha, Vijayalaxmi

Abstract:

Sequential Pattern Mining involves applying data mining methods to large data repositories to extract usage patterns. Sequential pattern mining methodologies used to analyze the data and identify patterns. The patterns have been used to implement efficient systems can recommend on previously observed patterns, in making predictions, improve usability of systems, detecting events, and in general help in making strategic product decisions. In this paper, identified performance of approximate sequential pattern mining defines as identifying patterns approximately shared with many sequences. Approximate sequential patterns can effectively summarize and represent the databases by identifying the underlying trends in the data. Conducting an extensive and systematic performance over synthetic and real data. The results demonstrate that ApproxMAP effective and scalable in mining large sequences databases with long patterns.

Keywords: multiple data, performance analysis, sequential pattern, sequence database scalability

Procedia PDF Downloads 305
7146 'Spare the Rod and Spoil the Child': The Criminal Career of an Armed Robber

Authors: Mahlogonolo Stephina Thobane

Abstract:

The aim of the study upon which this article is based was “to evaluate the possibility of using criminal career research in the development and evaluation of crime control strategies, particularly for armed robberies.” The research employed a concurrent triangulation mixed-method approach where quantitative and qualitative data were collected concurrently but analysed separately through the use of SPSS and Atlas.ti respectively. Forty offenders incarcerated at six correctional centres around the Gauteng province of South Africa for robbery with aggravating circumstances were interviewed as research participants. Since the researcher had no prior information on the total number of the population, purposive sampling (i.e. snowballing) was executed to draw the sample. This research found that offenders launched their criminal career at a very young age of, 11 years, by committing petty crimes such as theft and then, as they grew older, they progressed to more serious and violent crimes such as vehicle hijacking and Cash-in-Transit (CIT) robberies. Thus, it is pivotal that those responsible for developing crime prevention policies focus on interrupting the root causes of crime in the early stages of one’s life in order to prevent continuation of delinquent behaviour from childhood to adolescence and adulthood.

Keywords: criminal career, robbery with aggravating circumstances, cash-in-transit robbery, criminal career research

Procedia PDF Downloads 417
7145 The Legal Position of Criminal Prevention in the Metaverse World

Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim

Abstract:

Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.

Keywords: crime, cyber, metaverse, law

Procedia PDF Downloads 119
7144 The Patterns Designation by the Inspiration from Flower at Suan Sunandha Palace

Authors: Nawaporn Srisarankullawong

Abstract:

This research is about the creating the design by the inspiration of the flowers, which were once planted in Suan Sunandha Palace. The researcher have conducted the research regarding the history of Suan Sunandha Palace and the flowers which have been planted in the palace’s garden, in order to use this research to create the new designs in the future. The objective are as follows; 1. To study the shape and the pattern of the flowers in Suan Sunandha Palace, in order to select a few of them as the model to create the new design. 2. In order to create the flower design from the flowers in Suan Sunandha Palace by using the current photograph of the flowers which were once used to be planted inside the palace and using adobe Illustrator and Adobe Photoshop programs to create the patterns and the model. The result of the research: From the research, the researcher had selected three types of flowers to crate the pattern model; they are Allamanda, Orchids and Flamingo Plant. The details of the flowers had been reduced in order to show the simplicity and create the pattern model to use them for models, so three flowers had created three pattern models and they had been developed into six patterns, using universal artist techniques, so the pattern created are modern and they can be used for further decoration.

Keywords: patterns design, Suan Sunandha Palace, pattern of the flowers, visual arts and design

Procedia PDF Downloads 344
7143 Irregular Meal Pattern: What Is the Impact on Weight

Authors: Maha Alhussain, Moira A Taylor, Ian A. Macdonald

Abstract:

Background: It is well established that dietary composition has effects on metabolism and therefore impacts on health; however other aspects of diet, such as meal pattern, could also be important in both obesity management and promoting health. The present study investigated the effect of irregular meal frequency on anthropometric measurements and energy expenditure (EE) in healthy women. Design: 11 healthy weight women (18–40 years) were studied in a randomized crossover trial with two phases of 2 weeks each. In Phase 1, participants consumed either a regular meal pattern (6 meals/day) or an irregular meal pattern (varying from 3 to 9 meals/day). In Phase 2, participants followed the alternative meal pattern to that followed in Phase 1, after a 2-weeks washout period. In the two phases, identical foods were provided to a participant in amounts designed to keep body weight constant. Participants came to the laboratory after an overnight fast at the start and end of each phase. EE was measured in fasting state by indirect calorimetry. Postprandial EE was measured during the 3 h period after consumption of a milkshake, test drink. Results: There were no significant changes in body weight and anthropometric measurements after both meal pattern interventions. There was also no significant difference in mean daily energy intake between the regular and irregular meal pattern (2043 ±31 and 2099 ±33 respectively). EE in the fasting state showed no significant differences cross the experiment visits. There was a significant difference in Postprandial EE (measured for 3 h) by visit (P=0.04). Postprandial EE after the regular meal pattern was significantly higher than at baseline (P=0.002) or than after the irregular meal pattern (P= 0.04). Conclusion: Eating regularly for 14-day period significantly increases Postprandial EE which may contribute to weight loss and obesity management.

Keywords: energy expenditure, energy intake, meal pattern, weight loss

Procedia PDF Downloads 384
7142 Quality Assurance in Software Design Patterns

Authors: Rabbia Tariq, Hannan Sajjad, Mehreen Sirshar

Abstract:

Design patterns are widely used to make the process of development easier as they greatly help the developers to develop the software. Different design patterns have been introduced till now but the behavior of same design pattern may differ in different domains that can lead to the wrong selection of the design pattern. The paper aims to discover the design patterns that suits best with respect to their domain thereby helping the developers to choose an effective design pattern. It presents the comprehensive analysis of design patterns based on different methodologies that include simulation, case study and comparison of various algorithms. Due to the difference of the domain the methodology used in one domain may be inapplicable to the other domain. The paper draws a conclusion based on strength and limitation of each design pattern in their respective domain.

Keywords: design patterns, evaluation, quality assurance, software domains

Procedia PDF Downloads 490
7141 The Grand Unified Theory of Everything as a Generalization to the Standard Model Called as the General Standard Model

Authors: Amir Deljoo

Abstract:

The endeavor to comprehend the existence have been the center of thought for human in form of different disciplines and now basically in physics as the theory of everything. Here, after a brief review of the basic frameworks of thought, and a history of thought since ancient up to present, a logical methodology is presented based on a core axiom after which a function, a proto-field and then a coordinates are explained. Afterwards a generalization to Standard Model is proposed as General Standard Model which is believed to be the base of the Unified Theory of Everything.

Keywords: general relativity, grand unified theory, quantum mechanics, standard model, theory of everything

Procedia PDF Downloads 68
7140 Experimental Study of Tunable Layout Printed Fresnel Lens Structure Based on Dye Doped Liquid Crystal

Authors: M. Javadzadeh, H. Khoshsima

Abstract:

In this article, we present a layout printing way for producing Fresnel zone on 1294-1b doped liquid crystal with Methyl-Red azo dye. We made a Fresnel zone mask with 25 zones and radius of 5 mm using lithography technique. With layout printing way, we recorded mask’s pattern on cell with λ=532 nm solid-state diode pump laser. By recording Fresnel zone pattern on cell and making Fresnel pattern on the surface of cell, odd and even zones, will form. The printed pattern, because of Azo dye’s photoisomerization, was permanent. Experimentally, we saw focal length tunability from 32 cm to 43 cm.

Keywords: liquid crystal, lens, Fresnel zone, diffraction, Fresnel lens

Procedia PDF Downloads 174
7139 A Study of Blood Alcohol Concentration in People Arrested for Various Offences and Its Demographic Pattern

Authors: Tabin Millo, Khoob Chand, Ashok Kumar Jaiswal

Abstract:

Introduction: Various kinds of violence and offences are related to alcohol consumption by the offenders. The relationship between alcohol and violence is complex. But its study is important to achieve understanding of violence as well as alcohol related behavior. This study was done to know the blood alcohol concentration in people involved in various offences and its demographic pattern. The study was carried out in the forensic toxicology laboratory, department of Forensic Medicine, All India Institute of Medical Sciences, New Delhi, India. Material and methods: The blood samples were collected from the arrested people shortly after the commission of the offence by the emergency medical officers in the emergency department and forwarded to the forensic toxicology laboratory through the investigating officer. The blood samples were collected in EDTA vial with sodium fluoride preservative. The samples were analyzed by using gas chromatography with head space (GC-HS), which is ideal for alcohol estimation. The toxicology reports were given within a week. The data of seven years (2011-17) were analyzed for its alcohol concentration, associated crimes and its demographic pattern. Analysis and conclusion: Total 280 samples were analyzed in the period of 2011-2017. All were males except one female who was a bar dancer. The maximum cases were in the age group of 21-30 years (124 cases). The type of offences involved were road traffic accidents (RTA), assault cases, drunken driving, drinking in public place, drunk on duty, sexual offence, bestiality, eve teasing, fall etc. The maximum cases were of assault (75 cases) followed by RTA (64 cases). The maximum cases were in the alcohol concentration range of 101-150mg% (58 cases) followed by 51-100mg% (52 cases). The maximum blood alcohol level detected was 391.51 mg%, belonging to a security guard found unconscious. This study shows that alcohol consumption is associated with various kinds of violence and offences in society.

Keywords: alcohol, crime, toxicology, violence

Procedia PDF Downloads 115
7138 Pattern Recognition Search: An Advancement Over Interpolation Search

Authors: Shahpar Yilmaz, Yasir Nadeem, Syed A. Mehdi

Abstract:

Searching for a record in a dataset is always a frequent task for any data structure-related application. Hence, a fast and efficient algorithm for the approach has its importance in yielding the quickest results and enhancing the overall productivity of the company. Interpolation search is one such technique used to search through a sorted set of elements. This paper proposes a new algorithm, an advancement over interpolation search for the application of search over a sorted array. Pattern Recognition Search or PR Search (PRS), like interpolation search, is a pattern-based divide and conquer algorithm whose objective is to reduce the sample size in order to quicken the process and it does so by treating the array as a perfect arithmetic progression series and thereby deducing the key element’s position. We look to highlight some of the key drawbacks of interpolation search, which are accounted for in the Pattern Recognition Search.

Keywords: array, complexity, index, sorting, space, time

Procedia PDF Downloads 199
7137 Architectural Thinking in a Time of Climate Emergency

Authors: Manoj Parmar

Abstract:

The article uses reflexivity as a research method to investigate and propose an architectural theory plan for climate change. It hypothecates that to discuss or formulate discourse on "Architectural Thinking in a Time of Climate Emergency," firstly, we need to understand the modes of integration that enable architectural thinking with climate change. The study intends to study the various integration modes that have evolved historically and situate them in time. Subsequently, it analyses the integration pattern, challenges the existing model, and finds a way towards climate change as central to architectural thinking. The study is fundamental on-premises that ecology and climate change scholarship has consistently out lashed the asymmetrical and nonlinear knowledge and needs approaches for architecture that are less burden to climate change to people and minimize its impact on ecology.

Keywords: climate change, architectural theory, reflexivity, modernity

Procedia PDF Downloads 248
7136 An Exploration of Why Insider Fraud Is the Biggest Threat to Your Business

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, otherwise known as occupational, employee, or internal fraud, is a financial crime threat. Perpetrated by defrauding (or attempting to defraud) one’s current, prospective, or past employer, an ‘employee’ covers anyone employed by the company, including board members and contractors. The Coronavirus pandemic has forced insider fraud into the spotlight, and it isn’t dimming. As the focus of most academics and practitioners has historically been on that of ‘external fraud’, insider fraud is often overlooked or not considered to be a real threat. However, since COVID-19 changed the working world, pushing most of us into remote or hybrid working, employers cannot easily keep an eye on what their staff are doing, which has led to reliance on trust and transparency. This, therefore, brings about an increased risk of insider fraud perpetration. The objective of this paper is to explore why insider fraud is, therefore, now the biggest threat to a business. To achieve the research objective, participating individuals within the financial crime sector (either as a practitioner or consultants) attended semi-structured interviews with the researcher. The principal recruitment strategy for these individuals was via the researcher’s LinkedIn network. The main findings in the research suggest that insider fraud has been ignored and rejected as a threat to a business, owing to a reluctance to admit that a colleague may perpetrate. A positive of the Coronavirus pandemic is that it has forced insider fraud into a more prominent position and giving it more importance on a business’ agenda and risk register. Despite insider fraud always having been a possibility (and therefore a risk) within any business, it is very rare that a business has given it the attention it requires until now, if at all. The research concludes that insider fraud needs to prioritised by all businesses, and even ahead of external fraud. The research also provides advice on how a business can add new or enhance existing controls to mitigate the risk.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 36
7135 Legal Provisions on Child Pornography in Bangladesh: A Comparative Study on South Asian Landscape

Authors: Monira Nazmi Jahan, Nusrat Jahan Nishat

Abstract:

'Child Pornography' is a sex crime that portrays illegal images and videos of a minor over the Internet and now has become a social concern with the increase of commission of this crime. The major objective of this paper is to identify and examine the laws relating to child pornography in Bangladesh and to compare this with other South Asian countries. In Bangladesh to prosecute under child pornography, provisions have been made in ‘Digital Security Act, 2018’ where it has been defined as involving child in areas of child sexuality or in sexuality and whoever commits the crime will be punished for 10 years imprisonment or 10 lac taka fine. In India, the crime is dealt with ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) where the offenders for commission of this crime has been divided separately and has provision for punishments starting from three years to rigorous life imprisonment and shall also be liable to fine. In the Maldives, there is ‘Special Provisions Act to Deal with Child Sex Abuse Offenders, Act number 12/2009’. In this act it has been provided that a person is guilty of such an act if intentionally runs child prostitution, involves child in the creation of pornography or displays child’s sexual organ in pornography then shall be punished between 20 to 25 years of imprisonment. Nepal prosecutes this crime through ‘Act Relating to Children, 2018’ and the conviction of using child in prostitution or sexual services is imprisonment up to fifteen years and fine up to one hundred fifty thousand rupees. In Pakistan, child pornography is prosecuted with ‘Pakistan Penal Code Child Abuse Amendment Act, 2016’. This provides that one is guilty of this offence if he involves child with or without consent in such activities. It provides punishment for two to seven years of imprisonment or fine from two hundred thousand to seven hundred thousand rupees. In Bhutan child pornography is not explicitly addressed under the municipal laws. The Penal Code of Bhutan penalizes all kinds of pornography including child pornography under the provisions of computer pornography and the offence shall be a misdemeanor. Child Pornography is also prohibited under the ‘Child Care and Protection Act’. In Sri Lanka, ‘The Penal Code’ de facto criminalizes child prohibition and has a penalty of two to ten years and may also be liable to fine. The most shocking scenario exists in Afghanistan. There is no specific law for the protection of children from pornography, whereas this serious crime is present there. This paper will be conducted through a qualitative research method that is, the primary sources will be laws, and secondary sources will be journal articles and newspapers. The conclusion that can be drawn is except Afghanistan all other South Asian countries have laws for controlling this crime but still have loopholes. India has the most amended provisions. Nepal has no provision for fine, and Bhutan does not mention any specific punishment. Bangladesh compared to these countries, has a good piece of law; however, it also has space to broaden the laws for controlling child pornography.

Keywords: child abuse, child pornography, life imprisonment, penal code, South Asian countries

Procedia PDF Downloads 184
7134 Testing Method of Soil Failure Pattern of Sand Type as an Effort to Minimize the Impact of the Earthquake

Authors: Luthfi Assholam Solamat

Abstract:

Nowadays many people do not know the soil failure pattern as an important part in planning the under structure caused by the loading occurs. This is because the soil is located under the foundation, so it cannot be seen directly. Based on this study, the idea occurs to do a study for testing the soil failure pattern, especially the type of sand soil under the foundation. The necessity of doing this to the design of building structures on the land which is the initial part of the foundation structure that met with waves/vibrations during an earthquake. If the underground structure is not strong it is feared the building thereon more vulnerable to the risk of building damage. This research focuses on the search of soil failure pattern, which the most applicable in the field with the loading periodic re-testing of a particular time with the help of the integrated video visual observations performed. The results could be useful for planning under the structure in an effort to try the upper structure is minimal risk of the earthquake.

Keywords: soil failure pattern, earthquake, under structure, sand soil testing method

Procedia PDF Downloads 328
7133 Identifying Chaotic Architecture: Origins of Nonlinear Design Theory

Authors: Mohammadsadegh Zanganehfar

Abstract:

Since the modernism, movement, and appearance of modern architecture, an aggressive desire for a general design theory in the theoretical works of architects in the form of books and essays emerges. Since Robert Venturi and Denise Scott Brown’s published complexity and contradiction in architecture in 1966, the discourse of complexity and volumetric composition has been an important and controversial issue in the discipline. Ever since various theories and essays were involved in this discourse, this paper attempt to identify chaos theory as a scientific model of complexity and its relation to architecture design theory by conducting a qualitative analysis and multidisciplinary critical approach through architecture and basic sciences resources. As a result, we identify chaotic architecture as the correlation of chaos theory and architecture as an independent nonlinear design theory with specific characteristics and properties.

Keywords: architecture complexity, chaos theory, fractals, nonlinear dynamic systems, nonlinear ontology

Procedia PDF Downloads 342
7132 Skills and Abilities Expected from Professionals Conducting Serious Crimes Investigations: A Descriptive Study from Turkey

Authors: Burak M. Gonultas

Abstract:

Criminal investigation provides a practical contribution to this process while criminology provides a theoretical background in the apprehension of criminals arrest and clarification of crimes. However, studies on criminal investigation, which is a practical aspect of this process, are not sufficient. Every crime involves different dynamics in terms of investigation. But investigations of serious crimes are versatile and contains complex processes because of cases they are conducted. Therefore, professionals who conduct serious crime investigations differ in some aspects from others in the field. The most fundamental element of this differentiation is skills and abilities of these professionals. According to Eurostat data, Turkey is in an important position in terms of homicide rates. Therefore, in Turkey practice of serious crime investigation is specialized. The present study aims to research the skills and abilities expected from professionals in conducting an effective serious criminal investigation in Turkey and so aims to offer a number of suggestions. 25 emerged ability and skills collected from literature were asked to professionals (n=289) with semi-structured form according to 5 provinces with the highest and 2 provinces with the lowest number of serious crime cases. Three data categories were collected during experience: 1- Five most important skills and abilities, 2- The most important skills for knowledge and inquiry management and 3- Ability and skills that stand out for five stages of serious criminal investigation. The most rated skills and abilities are investigative skill (13%, n=134), planning/designing (9,2%, n=95) and interpersonal relations/communication (8,8%, n=91) in 1010 skills and abilities. While the 1st and 2nd suggest elections of these professionals, the 3rd also suggests how and what type of training will be given to these professionals. This practice differs from other studies in the area in terms of separately addressing the skills and abilities expected in stages of investigation and in terms of selected methodology.

Keywords: ability, criminal investigation, criminology, homicide, serious crimes, skill, Turkey

Procedia PDF Downloads 246