Search results for: early detection of violence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7041

Search results for: early detection of violence

6801 Adaptive CFAR Analysis for Non-Gaussian Distribution

Authors: Bouchemha Amel, Chachoui Takieddine, H. Maalem

Abstract:

Automatic detection of targets in a modern communication system RADAR is based primarily on the concept of adaptive CFAR detector. To have an effective detection, we must minimize the influence of disturbances due to the clutter. The detection algorithm adapts the CFAR detection threshold which is proportional to the average power of the clutter, maintaining a constant probability of false alarm. In this article, we analyze the performance of two variants of adaptive algorithms CA-CFAR and OS-CFAR and we compare the thresholds of these detectors in the marine environment (no-Gaussian) with a Weibull distribution.

Keywords: CFAR, threshold, clutter, distribution, Weibull, detection

Procedia PDF Downloads 549
6800 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Authors: Rashid Mahmood, Muhammad Junaid Sarwar

Abstract:

Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Keywords: MANET, IDS, intrusions, signature, detection, prevention

Procedia PDF Downloads 345
6799 SVM-RBN Model with Attentive Feature Culling Method for Early Detection of Fruit Plant Diseases

Authors: Piyush Sharma, Devi Prasad Sharma, Sulabh Bansal

Abstract:

Diseases are fairly common in fruits and vegetables because of the changing climatic and environmental circumstances. Crop diseases, which are frequently difficult to control, interfere with the growth and output of the crops. Accurate disease detection and timely disease control measures are required to guarantee high production standards and good quality. In India, apples are a common crop that may be afflicted by a variety of diseases on the fruit, stem, and leaves. It is fungi, bacteria, and viruses that trigger the early symptoms of leaf diseases. In order to assist farmers and take the appropriate action, it is important to develop an automated system that can be used to detect the type of illnesses. Machine learning-based image processing can be used to: this research suggested a system that can automatically identify diseases in apple fruit and apple plants. Hence, this research utilizes the hybrid SVM-RBN model. As a consequence, the model may produce results that are more effective in terms of accuracy, precision, recall, and F1 Score, with respective values of 96%, 99%, 94%, and 93%.

Keywords: fruit plant disease, crop disease, machine learning, image processing, SVM-RBN

Procedia PDF Downloads 21
6798 Conflict, Confusion or Compromise: Violence against Women, A Case Study of Pakistan

Authors: Farhat Jabeen, Syed Asfaq Hussain Bukhari

Abstract:

In the wake of the contemporary period the basic objective of the research paper points out that socio-cultural scenario of Pakistan reveals that gender-based violence is deep rooted in the society irrespective of language and ethnicity. This paper would reconnaissance the possibility reforms in Pakistan for diminishing of violence. Women are not given their due role, rights, and respect. Furthermore, they are treated as chattels. This presentation will cover the socio-customary practices in the context of discrimination, stigmatization, and violence against women. This paper envisages justice in a broader sense of recognition of rights for women, and masculine structure of society, socio-customary practices and discrimination against women are a very serious concern which needs to be understood as a multidimensional problem. The paper will specially focus on understanding the existing obstacles of women in Pakistan in the constitutional scenario. Women stumble across discrimination and human rights manipulations, voluptuous violation and manipulation including domestic viciousness and are disadvantaged by laws, strategies, and programming that do not take their concerns into considerations. This presentation examines the role of honour killings among Pakistani community. This affects their self-assurance and capability to elevation integrity campaign where gender inequalities and discrimination in social, legal domain are to be put right. This paper brings to light the range of practices, laws and legal justice regarding the status of women and also covers attitude towards compensations for murders/killings, domestic violence, rape, adultery, social behavior and recourse to justice.

Keywords: discrimination, cultural, women, violence

Procedia PDF Downloads 293
6797 The Importance and Feasibility of Hospital Interventions for Patient Aggression and Violence Against Physicians in China: A Delphi Study

Authors: Yuhan Wu, CTB (Kees) Ahaus, Martina Buljac-Samardzic

Abstract:

Patient aggression and violence is a complex occupational hazards for physicians working in hospitals, and it can have multiple severe negative effects for physicians and hospitals. Although there is a range of interventions in the healthcare sector applied in various countries, China lacks a comprehensive set of interventions at the hospital level in this area. Therefore, due to cultural differences, this study investigates whether international interventions are important and feasible in the Chinese cultural context by conducting a Delphi study. Based on a literature search, a list of 47 hospital interventions to prevent and manage patient aggression and violence was constructed, including 8 categories: hospital environment design, access and entrance, staffing and work practice, training and education, leadership and culture, support, during/after-the-event actions, and hospital policy. The list of interventions will be refined, extended and brought back during a three-round Delphi study. The panel consists of 17 Chinese experts, including physicians experiencing patient aggression and violence, hospital management team members, scientists working in this research area, and policymakers in the healthcare sector. In each round, experts will receive the possible interventions with the instruction to indicate the importance and feasibility of each intervention for preventing and managing patient violence and aggression in Chinese hospitals. Experts will be asked about the importance and feasibility of interventions for patient violence and aggression at the same time. This study will exclude or include interventions based on the score of importance. More specifically, an intervention will be included after each round if >80% of the experts judged it as important or very important and excluded if >50% judged an intervention as not or moderately important. The three-round Delphi study will provide a list of included interventions and assess which of the 8 categories of interventions are considered as important. It is expected that this study can bring new ideas and inspiration to Chinese hospitals in the prevention and management of patient aggression and violence.

Keywords: patient aggression and violence, hospital interventions, feasibility, importance

Procedia PDF Downloads 56
6796 Automatic Post Stroke Detection from Computed Tomography Images

Authors: C. Gopi Jinimole, A. Harsha

Abstract:

For detecting strokes, Computed Tomography (CT) scan is preferred for imaging the abnormalities or infarction in the brain. Because of the problems in the window settings used to evaluate brain CT images, they are very poor in the early stage infarction detection. This paper presents an automatic estimation method for the window settings of the CT images for proper contrast of the hyper infarction present in the brain. In the proposed work the window width is estimated automatically for each slice and the window centre is changed to a new value of 31HU, which is the average of the HU values of the grey matter and white matter in the brain. The automatic window width estimation is based on the average of median of statistical central moments. Thus with the new suggested window centre and estimated window width, the hyper infarction or post-stroke regions in CT brain images are properly detected. The proposed approach assists the radiologists in CT evaluation for early quantitative signs of delayed stroke, which leads to severe hemorrhage in the future can be prevented by providing timely medication to the patients.

Keywords: computed tomography (CT), hyper infarction or post stroke region, Hounsefield Unit (HU), window centre (WC), window width (WW)

Procedia PDF Downloads 173
6795 Violent, Psychological, Sexual and Abuse-Related Emergency Department Usage amongst Pediatric Victims of Physical Assault and Gun Violence: A Case-Control Study

Authors: Mary Elizabeth Bernardin, Margie Batek, Joseph Moen, David Schnadower

Abstract:

Background: Injuries due to interpersonal violence are a common reason for emergency department (ED) visits amongst the American pediatric population. Gun violence, in particular, is associated with high morbidity, mortality as well as financial costs. Patterns of pediatric ED usage may be an indicator of risk for future violence, but very little data on the topic exists. Objective: The aims of this study were to assess for frequencies of ED usage for previous interpersonal violence, mental/behavioral issues, sexual/reproductive issues and concerns for abuse in youths presenting to EDs due to physical assault injuries (PAIs) compared to firearm injuries (FIs). Methods: In this retrospective case-control study, ED charts of children ages 8-19 years who presented with injuries due to interpersonal violent encounters from 2014-2017 were reviewed. Data was collected regarding all previous ED visits for injuries due to interpersonal violence (including physical assaults and firearm injuries), mental/behavioral health visits (including depression, suicidal ideation, suicide attempt, homicidal ideation and violent behavior), sexual/reproductive health visits (including sexually transmitted infections and pregnancy related issues), and concerns for abuse (including physical abuse or domestic violence, neglect, sexual abuse, sexual assault, and intimate partner violence). Logistic regression was used to identify predictors of gun violence based on previous ED visits amongst physical assault injured versus firearm injured youths. Results: A total of 407 patients presenting to the ED for an interpersonal violent encounter were analyzed, 251 (62%) of which were due to physical assault injuries (PAIs) and 156 (38%) due to firearm injuries (FIs). The majority of both PAI and FI patients had no previous history of ED visits for violence, mental/behavioral health, sexual/reproductive health or concern for abuse (60.8% PAI, 76.3% FI). 19.2% of PAI and 13.5% of FI youths had previous ED visits for physical assault injuries (OR 0.68, P=0.24, 95% CI 0.36 to 1.29). 1.6% of PAI and 3.2% of FI youths had a history of ED visits for previous firearm injuries (OR 3.6, P=0.34, 95% CI 0.04 to 2.95). 10% of PAI and 3.8% of FI youths had previous ED visits for mental/behavioral health issues (OR 0.91, P=0.80, 95% CI 0.43 to 1.93). 10% of PAI and 2.6% of FI youths had previous ED visits due to concerns for abuse (OR 0.76, P=0.55, 95% CI 0.31 to 1.86). Conclusions: There are no statistically significant differences between physical assault-injured and firearm-injured youths in terms of ED usage for previous violent injuries, mental/behavioral health visits, sexual/reproductive health visits or concerns for abuse. However, violently injured youths in this study have more than twice the number of previous ED usage for physical assaults and mental health visits than previous literature indicates. Data comparing ED usage of victims of interpersonal violence to nonviolent ED patients is needed, but this study supports the notion that EDs may be a useful place for identification of and enrollment in interventions for youths most at risk for future violence.

Keywords: child abuse, emergency department usage, pediatric gun violence, pediatric interpersonal violence, pediatric mental health, pediatric reproductive health

Procedia PDF Downloads 205
6794 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 443
6793 Prediction of Alzheimer's Disease Based on Blood Biomarkers and Machine Learning Algorithms

Authors: Man-Yun Liu, Emily Chia-Yu Su

Abstract:

Alzheimer's disease (AD) is the public health crisis of the 21st century. AD is a degenerative brain disease and the most common cause of dementia, a costly disease on the healthcare system. Unfortunately, the cause of AD is poorly understood, furthermore; the treatments of AD so far can only alleviate symptoms rather cure or stop the progress of the disease. Currently, there are several ways to diagnose AD; medical imaging can be used to distinguish between AD, other dementias, and early onset AD, and cerebrospinal fluid (CSF). Compared with other diagnostic tools, blood (plasma) test has advantages as an approach to population-based disease screening because it is simpler, less invasive also cost effective. In our study, we used blood biomarkers dataset of The Alzheimer’s disease Neuroimaging Initiative (ADNI) which was funded by National Institutes of Health (NIH) to do data analysis and develop a prediction model. We used independent analysis of datasets to identify plasma protein biomarkers predicting early onset AD. Firstly, to compare the basic demographic statistics between the cohorts, we used SAS Enterprise Guide to do data preprocessing and statistical analysis. Secondly, we used logistic regression, neural network, decision tree to validate biomarkers by SAS Enterprise Miner. This study generated data from ADNI, contained 146 blood biomarkers from 566 participants. Participants include cognitive normal (healthy), mild cognitive impairment (MCI), and patient suffered Alzheimer’s disease (AD). Participants’ samples were separated into two groups, healthy and MCI, healthy and AD, respectively. We used the two groups to compare important biomarkers of AD and MCI. In preprocessing, we used a t-test to filter 41/47 features between the two groups (healthy and AD, healthy and MCI) before using machine learning algorithms. Then we have built model with 4 machine learning methods, the best AUC of two groups separately are 0.991/0.709. We want to stress the importance that the simple, less invasive, common blood (plasma) test may also early diagnose AD. As our opinion, the result will provide evidence that blood-based biomarkers might be an alternative diagnostics tool before further examination with CSF and medical imaging. A comprehensive study on the differences in blood-based biomarkers between AD patients and healthy subjects is warranted. Early detection of AD progression will allow physicians the opportunity for early intervention and treatment.

Keywords: Alzheimer's disease, blood-based biomarkers, diagnostics, early detection, machine learning

Procedia PDF Downloads 296
6792 Patient Agitation and Violence in Medical-Surgical Settings at BronxCare Hospital, Before and During COVID-19 Pandemic; A Retrospective Chart Review

Authors: Soroush Pakniyat-Jahromi, Jessica Bucciarelli, Souparno Mitra, Neda Motamedi, Ralph Amazan, Samuel Rothman, Jose Tiburcio, Douglas Reich, Vicente Liz

Abstract:

Violence is defined as an act of physical force that is intended to cause harm and may lead to physical and/or psychological damage. Violence toward healthcare workers (HCWs) is more common in psychiatric settings, emergency departments, and nursing homes; however, healthcare workers in medical setting are not spared from such events. Workplace violence has a huge burden in the healthcare industry and has a major impact on the physical and mental wellbeing of staff. The purpose of this study is to compare the prevalence of patient agitation and violence in medical-surgical settings in BronxCare Hospital (BCH) Bronx, New York, one year before and during the COVID-19 pandemic. Data collection occurred between June 2021 and August 2021, while the sampling time was from 2019 to 2021. The data were separated into two separate time categories: pre-COVID-19 (03/2019-03/2020) and COVID-19 (03/2020-03/2021). We created frequency tables for 19 variables. We used a chi-square test to determine a variable's statistical significance. We tested all variables against “restraint type”, determining if a patient was violent or became violent enough to restrain. The restraint types were “chemical”, “physical”, or both. This analysis was also used to determine if there was a statistical difference between the pre-COVID-19 and COVID-19 timeframes. Our data shows that there was an increase in incidents of violence in COVID-19 era (03/2020-03/2021), with total of 194 (62.8%) reported events, compared to pre COVID-19 era (03/2019-03/2020) with 115 (37.2%) events (p: 0.01). Our final analysis, completed using a chi-square test, determined the difference in violence in patients between pre-COVID-19 and COVID-19 era. We then tested the violence marker against restraint type. The result was statistically significant (p: 0.01). This is the first paper to systematically review the prevalence of violence in medical-surgical units in a hospital in New York, pre COVID-19 and during the COVID-19 era. Our data is in line with the global trend of increased prevalence of patient agitation and violence in medical settings during the COVID-19 pandemic. Violence and its management is a challenge in healthcare settings, and the COVID-19 pandemic has brought to bear a complexity of circumstances, which may have increased its incidence. It is important to identify and teach healthcare workers the best preventive approaches in dealing with patient agitation, to decrease the number of restraints in medical settings, and to create a less restrictive environment to deliver care.

Keywords: COVID-19 pandemic, patient agitation, restraints, violence

Procedia PDF Downloads 111
6791 Study of Early Diagnosis of Oral Cancer by Non-invasive Saliva-On-Chip Device: A Microfluidic Approach

Authors: Ragini Verma, J. Ponmozhi

Abstract:

The oral cavity is home to a wide variety of microorganisms that lead to various diseases and even oral cancer. Despite advancements in the diagnosis and detection at the initial phase, the situation hasn’t improved much. Saliva-on-a-chip is an innovative point-of-care platform for early diagnosis of oral cancer and other oral diseases in live and dead cells using a microfluidic device with a current perspective. Some of the major challenges, like real-time imaging of the oral cancer microbes, high throughput values, obtaining a high spatiotemporal resolution, etc. were faced by the scientific community. Integrated microfluidics and microscopy provide powerful approaches to studying the dynamics of oral pathology, microbe interaction, and the oral microenvironment. Here we have developed a saliva-on-chip (salivary microbes) device to monitor the effect on oral cancer. Adhesion of cancer-causing F. nucleatum; subsp. Nucleatum and Prevotella intermedia in the device was observed. We also observed a significant reduction in the oral cancer growth rate when mortality and morbidity were induced. These results show that this approach has the potential to transform the oral cancer and early diagnosis study.

Keywords: microfluidic device, oral cancer microbes, early diagnosis, saliva-on-chip

Procedia PDF Downloads 55
6790 Moroccan Ultra Groups of Football: From Tifos to Street Politics

Authors: Yassir Yousfi

Abstract:

The Ultras phenomena have become the most spectacular form of football fandom in the early twenty-first century. Yet, since their appearance in Morocco, they have been associated with violence and vandalism. This paper aims to explain the political dimension of Moroccan ultra group in terms of their chants in Morocco post-February 20thera. It seeks to analyze their narratives which have shifted to a form of social Hirak, or, using AsefBayat’s term, non-movement. The paper focuses on the dynamics of two nationally and universally notorious groups located in Casablanca, Morocco’s biggest and most densely populated city, namely the “Winners” (supporters of the Wydad Athletic Club) and the “Green Boys” (supporters of the Raja Club Athletic) of Casablanca. The paper adopts a critical perspective analysis that attempts to sketch out some examples of their “political” chants to understand their discourses, spaces of their activities, levels of their impact on the street protests, and their prospects in the political scene. It also seeks to deconstruct the concept of “social movement” while referring to the Ultras as well as discussing their political transition.

Keywords: ultra groups, transition, political chants, football violence, cultural movement

Procedia PDF Downloads 111
6789 A Paradox in the Issue of Sexual Violence: A Study on Sexual Violence Perpetrated against Men and Boys by Women: A Case Study of the Municipality of Ibanda, Town of Bukavu, Province of South Kivu, Democratic Republic of Congo, Africa

Authors: Sylvie Ekanga Lumumba

Abstract:

Background and Significance of the Study: Over the past three decades, the perception of sexual violence has changed significantly, it is now recognized that men and boys are victims of sexual violence. However, the body of research on male victims and particularly on their attackers is much more limited. Research on the above is thus more than required. To contribute to the above quest for further studies, the researcher conducted this study on sexual violence perpetrated against men and boys by women, in the Municipality of Ibanda, Town of Bukavu, Province of South Kivu, Democratic Republic of Congo. The main study objectives were the following: to investigate on the statement of sexual violence perpetrated against men and boys in the Municipality of Ibanda, to investigate into its consequences and the statement of medical and psycho-social care given to victims. Methodology: Data were collected using valid and reliable Survey Questionnaire and Interview Schedule. Study population: the 85,882 men and boys from the Municipality of Ibanda. Sampling: led to 150 men and boys, received discreetly by the researcher during November-December 2015. Major findings: First, findings related to sexual abuse and its procedure: 74.2% of men and boys were victims of sexual violence perpetrated by a woman, more than a year ago. 13.3% however, were victims for less than a year now. 79.7% of victims have experienced sexual violence by a sexual act; 3.9% through the intention of the woman to cause the death of the victim, by serious injury to the genitals. The Second group of findings related to the consequences of sexual violence revealed that HIV/AIDS is the most important physical consequence experienced by 77.3 % of victims. Physical psychological consequences are: urinary or defecation problems (72.7%); while key psycho-emotional and behavioral consequence is: living a state of deep shame and humiliation: 68.8%. As for sexual consequences: 71.1% indicated a chronic avoidance of sexual activity and 57% reported sexual dysfunctions. The third group of findings is related to medical and psycho-social care: repetitively, more than 80% of male victims affirmed that with the help of friends and traditional healers, they took care of themselves for all the eight WHO phases of clinical care of rape victims, this was hence not effectively done. Concluding Statement: for this study, the statement of sexual violence of men and boys by women in the Eastern Congo and its consequences are not researched upon and are underestimated; the study also revealed that the care of male victims is grossly ill-conducted, as opposed to female victims care. It therefore calls for further research and further vulgarization of the research results, to convince other stakeholders (politicians for example) to immediately take action.

Keywords: sexual violence, men and boys, medical care, psycho-social care

Procedia PDF Downloads 195
6788 The Effect of Pixelation on Face Detection: Evidence from Eye Movements

Authors: Kaewmart Pongakkasira

Abstract:

This study investigated how different levels of pixelation affect face detection in natural scenes. Eye movements and reaction times, while observers searched for faces in natural scenes rendered in different ranges of pixels, were recorded. Detection performance for coarse visual detail at lower pixel size (3 x 3) was better than with very blurred detail carried by higher pixel size (9 x 9). The result is consistent with the notion that face detection relies on gross detail information of face-shape template, containing crude shape structure and features. In contrast, detection was impaired when face shape and features are obscured. However, it was considered that the degradation of scenic information might also contribute to the effect. In the next experiment, a more direct measurement of the effect of pixelation on face detection, only the embedded face photographs, but not the scene background, will be filtered.

Keywords: eye movements, face detection, face-shape information, pixelation

Procedia PDF Downloads 288
6787 Performance of Nakagami Fading Channel over Energy Detection Based Spectrum Sensing

Authors: M. Ranjeeth, S. Anuradha

Abstract:

Spectrum sensing is the main feature of cognitive radio technology. Spectrum sensing gives an idea of detecting the presence of the primary users in a licensed spectrum. In this paper we compare the theoretical results of detection probability of different fading environments like Rayleigh, Rician, Nakagami-m fading channels with the simulation results using energy detection based spectrum sensing. The numerical results are plotted as P_f Vs P_d for different SNR values, fading parameters. It is observed that Nakagami fading channel performance is better than other fading channels by using energy detection in spectrum sensing. A MATLAB simulation test bench has been implemented to know the performance of energy detection in different fading channel environment.

Keywords: spectrum sensing, energy detection, fading channels, probability of detection, probability of false alarm

Procedia PDF Downloads 499
6786 Territorial Influence of Religious Based Armed Conflicts in Africa

Authors: Badru Hasan Segujja, Nassiwa Shamim

Abstract:

This study “Territorial Influence of Religious Based Armed Conflicts in Africa” was in place to identify the influence of religious based armed conflicts, their parsistance and their impact on African societies. The study employed a qualitative research methodology, as data from respondents was descriptively recorded using random sampling technics. The study discovered that, the world is experiencing religious based armed violence where actors fight under the umbrella of freedom fighters where the African continent in particular has been at the pic of such armed violence almost since each countries independence to date. Because of this situation, the Continent is torn apart as families are traumatized by the memories of their dear ones who never survived in yesterdays’ faith based armed violence. The study disvovered that, some of these faith based armed conflicts are caused by factors ranging from undemocratic practices due to poor governance, poverty, Unemployment, religious extremism and radicalism which later turn into intractable violence. Religious armed groups such as, Holly Spirit Movement (HSM), Allied Democratic Forces (ADF) and Lords Resistance Army (LRA) in Uganda and now Eastern DRC and Central African Republic, ALSHABAB in East Africa, SELEKE and ANTI BALAKA in Central African Republic, BOKO HARAM in Nigeria, JANJAWEED in Sudan and Republic of Chad, Sudaneess Peoples Liberation Army (SPLA) in Southern Sudan, Alqaida Mission in Islamic Magreeb (AQIIM) in Mali coupled with acute racism of Hutu and Tutsi in Rwanda or Burundi and Xenophobic Nationalism in (South Africa). The study futher discovered that, the component of “freedom fighters” has strongly made these groups maintain the ground without fear of any repucation, which situation has resulted into children and women becoming disproportionally victims and the response of international communities to the violence is inadequate. The study concludes that, dialogue for peace is better than going for wars. The study recommends that, in order to restore peace on the African continent and elsewhere in the world, UN should recommend the teaching of peace values in schools, pre-conflict early warnings must be well attended, actors must refrain from using religious lebles, democracy, unemployment and poverty issues should as well be addressed to avoid unnessesary conflicts.

Keywords: influence, religious, armed, conflicts

Procedia PDF Downloads 57
6785 Signal Amplification Using Graphene Oxide in Label Free Biosensor for Pathogen Detection

Authors: Agampodi Promoda Perera, Yong Shin, Mi Kyoung Park

Abstract:

The successful detection of pathogenic bacteria in blood provides important information for early detection, diagnosis and the prevention and treatment of infectious diseases. Silicon microring resonators are refractive-index-based optical biosensors that provide highly sensitive, label-free, real-time multiplexed detection of biomolecules. We demonstrate the technique of using GO (graphene oxide) to enhance the signal output of the silicon microring optical sensor. The activated carboxylic groups in GO molecules bind directly to single stranded DNA with an amino modified 5’ end. This conjugation amplifies the shift in resonant wavelength in a real-time manner. We designed a capture probe for strain Staphylococcus aureus of 21 bp and a longer complementary target sequence of 70 bp. The mismatched target sequence we used was of Streptococcus agalactiae of 70 bp. GO is added after the complementary binding of the probe and target. GO conjugates to the unbound single stranded segment of the target and increase the wavelength shift on the silicon microring resonator. Furthermore, our results show that GO could successfully differentiate between the mismatched DNA sequences from the complementary DNA sequence. Therefore, the proposed concept could effectively enhance sensitivity of pathogen detection sensors.

Keywords: label free biosensor, pathogenic bacteria, graphene oxide, diagnosis

Procedia PDF Downloads 441
6784 Analysis of Detection Concealed Objects Based on Multispectral and Hyperspectral Signatures

Authors: M. Kastek, M. Kowalski, M. Szustakowski, H. Polakowski, T. Sosnowski

Abstract:

Development of highly efficient security systems is one of the most urgent topics for science and engineering. There are many kinds of threats and many methods of prevention. It is very important to detect a threat as early as possible in order to neutralize it. One of the very challenging problems is detection of dangerous objects hidden under human’s clothing. This problem is particularly important for safety of airport passengers. In order to develop methods and algorithms to detect hidden objects it is necessary to determine the thermal signatures of such objects of interest. The laboratory measurements were conducted to determine the thermal signatures of dangerous tools hidden under various clothes in different ambient conditions. Cameras used for measurements were working in spectral range 0.6-12.5 μm An infrared imaging Fourier transform spectroradiometer was also used, working in spectral range 7.7-11.7 μm. Analysis of registered thermograms and hyperspectral datacubes has yielded the thermal signatures for two types of guns, two types of knives and home-made explosive bombs. The determined thermal signatures will be used in the development of method and algorithms of image analysis implemented in proposed monitoring systems.

Keywords: hyperspectral detection, nultispectral detection, image processing, monitoring systems

Procedia PDF Downloads 321
6783 Infodemic Detection on Social Media with a Multi-Dimensional Deep Learning Framework

Authors: Raymond Xu, Cindy Jingru Wang

Abstract:

Social media has become a globally connected and influencing platform. Social media data, such as tweets, can help predict the spread of pandemics and provide individuals and healthcare providers early warnings. Public psychological reactions and opinions can be efficiently monitored by AI models on the progression of dominant topics on Twitter. However, statistics show that as the coronavirus spreads, so does an infodemic of misinformation due to pandemic-related factors such as unemployment and lockdowns. Social media algorithms are often biased toward outrage by promoting content that people have an emotional reaction to and are likely to engage with. This can influence users’ attitudes and cause confusion. Therefore, social media is a double-edged sword. Combating fake news and biased content has become one of the essential tasks. This research analyzes the variety of methods used for fake news detection covering random forest, logistic regression, support vector machines, decision tree, naive Bayes, BoW, TF-IDF, LDA, CNN, RNN, LSTM, DeepFake, and hierarchical attention network. The performance of each method is analyzed. Based on these models’ achievements and limitations, a multi-dimensional AI framework is proposed to achieve higher accuracy in infodemic detection, especially pandemic-related news. The model is trained on contextual content, images, and news metadata.

Keywords: artificial intelligence, fake news detection, infodemic detection, image recognition, sentiment analysis

Procedia PDF Downloads 205
6782 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 270
6781 Men's Intimate Violence: Theory and Practice Relationship

Authors: Omer Zvi Shaked

Abstract:

Intimate Partner Violence (IPV) is a widespread social problem. Since the 1970's, and due to political changes resulting from the feminist movement, western society has been changing its attitude towards the phenomenon and has been taking an active approach to reduce its magnitude. Enterprises in the form of legislation, awareness and prevention campaigns, women's shelters, and community intervention programs became more prevalent as years progressed. Although many initiatives were found to be productive, the effectiveness of one, however, remained questionable throughout the years: intervention programs for men's intimate violence. Surveys outline two main intervention models for men's intimate violence. The first is the Duluth model, which argued that men are socialized to be dominant - while women are socialized to be subordinate - and men are therefore required by social imperative to enforce, physically if necessary, their dominance. The Duluth model became the chief authorized intervention program, and some states in the US even regulated it as the standard criminal justice program for men's intimate violence. However, meta-analysis findings demonstrated that based on a partner's reports, Duluth treatment completers have 44% recidivism rate, and between 40% and 85% dropout range. The second model is the Cognitive-Behavioral Model (CBT), which is a highly accepted intervention worldwide. The model argues that cognitive misrepresentations of intimate situations precede violent behaviors frequently when anger predisposition exists. Since anger dysregulation mediates between one's cognitive schemes and violent response, anger regulation became the chief purpose of the intervention. Yet, a meta-analysis found only a 56% risk reduction for CBT interventions. It is, therefore, crucial to understand the background behind the domination of both the Duluth model and CBT interventions. This presentation will discuss the ways in which theoretical conceptualizations of men's intimate violence, as well as ideologies, had contributed to the above-mentioned interventions' wide acceptance, despite known lack of scientific and evidential support. First, the presentation will review the prominent interventions for male intimate violence, the Duluth model, and CBT. Second, the presentation will review the prominent theoretical models explaining men's intimate violence: The Patriarchal model, the Abusive Personality model, and the Post-Traumatic Stress model. Third, the presentation will discuss the interrelation between theory and practice, and the nature of affinity between research and practice regarding men's intimate violence. Finally, the presentation will set new directions for further research, aiming to improve intervention's efficiency with men's intimate violence and advance social work practice in the field.

Keywords: intimate partner violence, theory and practice relationship, Duluth, CBT, abusive personality, post-traumatic stress

Procedia PDF Downloads 107
6780 Impact of Crime on Women and Their Families in Rural Areas of Haryana State in India

Authors: Rashmi Tyagi, Savita Vermani

Abstract:

Violence against women is the result of long-standing power imbalance between men and women and thus seriously compromises the well-being, productivity and contribution of one half the population. The costs incurred to the family especially children and society at large in terms of physical, psychological, social and financial losses are huge. The communities’ native to the state of Haryana in India is primarily patriarchal, burdened with age old regressive mindset under the socio-cultural and religious structures which discriminates against women. Therefore it was important to bring to light the issues affecting women in this region. Therefore this study focused on studying the consequences of crime on victim women and their families. Two hundred women were randomly selected and out of those one hundred twenty, who were affected with some kind of violence were interviewed. Data was collected and statistically analyzed for physical, psychological, inter-family and societal consequences of violence on these women. Women reported physical injuries, gynecological problems, unwanted pregnancies, frigidity, phobia and sexual dysfunction. 58.9% women felt decreased work efficiency. Psychological problems encountered were anxiety, isolation, depression, suicidal tendencies. 66.7% respondents suffered from anxiety followed by 65.0% faced depression symptoms. At family levels, 40.0% respondents felt the atmosphere was unsuitable for children while 39.2% reported lack of interaction. The societal consequences reported were breakdown of interaction with friends and family (44.2%) and resulting humiliation and demeaning remarks from others (38.3%). The impact of violence on women had an adverse effect on children. 36.7% children felt responsible for abuse and powerless to stop it, 29.2% reported living with fear. Concerted efforts are required to curb violence against women in Haryana.

Keywords: impact of violence against women on children, patriarchal society, physical psychological and societal consequences, violence against women

Procedia PDF Downloads 283
6779 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 43
6778 Depression and Associated Factors among Adolescent Females in Riyadh, Kingdom of Saudi Arabia: A Cross‑Sectional Study

Authors: Hafsa Raheel

Abstract:

Background: Adolescents who suffer from depression early in life, have an increase in suicidal tendency, anxiety, conduct disorders, substance abuse, and continue to be depressed, later on in life. This study was conducted to identify the prevalence and correlates of depression among adolescent girls in Riyadh city in order to carry out early intervention. Methods: A cross‑sectional, school‑based survey was conducted among 1028 adolescent girls aged 15–19 years in secondary schools of Riyadh city. Riyadh was divided into clusters and within each cluster, both public and private schools were enrolled. From the selected schools students from grade 10–12 were surveyed. Survey was conducted using a structured questionnaire including the beck depression inventory‑II, and questions exploring the correlates of depression. Results: About 30% of participants were found to be depressed. Depression was more prevalent among female adolescents whose household income was inferior to 12,000 Saudi Riyal/month (odds ratio [OR] 2.17, confidence interval [CI] 0.97–6.84), did not have a good relationship with peers and family members (OR 4.63, CI 2.56–8.41), lived with single parent or alone (OR 1.77, CI 0.97–3.23), had been emotionally abused (OR 3.45, CI 2.56–8.41), and those who had been subjected to physical violence at least once (OR 3.34, CI 1.89–5.91). Conclusions: Strategies need to be developed to identify early signs and symptoms of depression among Saudi female adolescents. Training can be given to groups of students to help their peers, and also to the teachers to identify, and help students identify early signs of depression and provide them with better‑coping strategies to combat progression of depression and anxiety among such adolescents.

Keywords: adolescents, depression, Saudi Arabia, mental health

Procedia PDF Downloads 266
6777 Prototyping Exercise for the Construction of an Ancestral Violentometer in Buenaventura, Valle Del Cauca

Authors: Mariana Calderón, Paola Montenegro, Diana Moreno

Abstract:

Through this study, it was possible to identify the different levels and types of violence, both individual and collective, experienced by women, girls, and the sexually diverse population of Buenaventura translated from the different tensions and threats against ancestrality and accounting for a social and political context of violence related to race and geopolitical location. These threats are related to: the stigma and oblivion imposed on practices and knowledge; the imposition of the hegemonic culture; the imposition of external customs as a way of erasing ancestrality; the singling out and persecution of those who practice it; the violence that the health system has exercised against ancestral knowledge and practices, especially in the case of midwives; the persecution of the Catholic religion against this knowledge and practices; the difficulties in maintaining the practices in the displacement from rural to urban areas; the use and control of ancestral knowledge and practices by the armed actors; the rejection and stigma exercised by the public forces; and finally, the murder of the wise women at the hands of the armed actors. This research made it possible to understand the importance of using tools such as the violence meter to support processes of resistance to violence against women, girls, and sexually diverse people; however, it is essential that these tools be adapted to the specific contexts of the people. In the analysis of violence, it was possible to identify that these not only affect women, girls, and sexually diverse people individually but also have collective effects that threaten the territory and the ancestral culture to which they belong. Ancestrality has been the object of violence, but at the same time, it has been the place from which resistance has been organized. The identification of the violence suffered by women, girls, and sexually diverse people is also an opportunity to make visible the forms of resistance of women and communities in the face of this violence. This study examines how women, girls, and sexually diverse people in Buenaventura have been exposed to sexism and racism, which historically have been translated into specific forms of violence, in addition to the other forms of violence already identified by the traditional models of the violentometer. A qualitative approach was used in the study. The study included the participation of more than 40 people and two women's organizations from Buenaventura. The participants came from both urban and rural areas of the municipality of Buenaventura and were over 15 years of age. The participation of such a diverse group allowed for the exchange of knowledge and experiences, particularly between younger and older people. The instrument used for the exercise was previously defined with the leaders of the organizations and consisted of four moments that referred to i) ancestry, ii) threats to ancestry, iii) identification of resistance and iv) construction of the ancestral violentometer.

Keywords: violence against women, intersectionality, sexual and reproductive rights, black communities

Procedia PDF Downloads 48
6776 Public Space, Environmental Violence and Female Vulnerability in Radwa Ashour’s Specters and Betool Khadiri’s Absent

Authors: Jihan Zakarriya

Abstract:

This paper aims at examining the concepts of gender vulnerability, militarized spaces and environmental degradation in Egyptian novelist Radwa Ashour’s Specters (1999) and Iraqi novelist Betool Khadiri’s Absent (2005). Although the socio-economic, environmental and political conditions in the 1990s- Egypt and Iraq are different, this paper argues that Ashour’s Specters and Khadiri’s Absent show the two societies as sharing a concern with the politics of public participation, individual freedom and political violence. For example, while Specters exposes the planned processes of economic-political and cultural violence towards Egyptian environment and people that undermine concepts of justice, equality and democracy, Absent shows the destructive effects of the systematic, successive waves of (international) militarized interferences and socio-economic sanctions imposed on Iraq following the Gulf War that hinder efforts of social development and kindle ethnic-religious violence and polarization in the country. This paper investigates and relates issues of gender, environmental and political violence and repression in Ashour’s Specters and Khadiri’s Absent in relation to the concepts of public space and security in the two countries. The paper argues that the selected novels articulate a particular awareness of the political-international conflicts and difficulties in the 1990s-Egypt and Iraq, with the aim both to emphasize the issue of gender as a tool of oppression and power hierarchy worldwide and to figure out new notions of public participation and change.

Keywords: gender violence, public space, environment, change

Procedia PDF Downloads 113
6775 Making New Theoretical Insights into Violence: The Temporal and Spatial Relevance of Blood Spatter Crime Scene Investigations

Authors: Simone Jane Dennis

Abstract:

This paper leverages the spatial and temporal investigative strategy utilized by crime scene investigators – blood spatter work– to engage with the real and metaphorical memorialization of blood-soaked places. It uses this key trope with phenomenological sensibility, to trace the physical and temporal movement of blood outbound from the human body to sites beyond. Working backward, as crime scene investigators do, this paper traces the importance of both space and time and their confluence, to developing a comprehensive theory of violence. To do this work, the paper engages a range of geo-violent scales, from murder scenes to genocides, to both engage an extraordinarily replete literature of bloodshed across history and to move beyond analyses of how significance is assigned to the sites in which blood comes to rest to instead consider the importance of space and time to the structure of violence itself. It is in this regard that the kind of investigative work upon which blood spatter analysis depends is crucial: it engages time and space in reverse to understand the microscopic relations between bodies, places, and numerous (biological, clock, and seasonal) temporalities. Considering the circumstances under which blood escaped a body, the details of its destination in place, and the temporal circumstances of corporal departure, is crucial to making new knowledge about the peculiar temporality and spatiality of violence itself.

Keywords: blood, crime scenes, temporality, violence

Procedia PDF Downloads 31
6774 Cyber Violence Behaviors Among Social Media Users in Ghana: An Application of Self-Control Theory and Social Learning Theory

Authors: Aisha Iddrisu

Abstract:

The proliferation of cyberviolence in the wave of increased social media consumption calls for immediate attention both at the local and global levels. With over 4.70 billion social media users worldwide and 8.8 social media users in Ghana, various forms of violence have become the order of the day in most countries and communities. Cyber violence is defined as producing, retrieving, and sharing of hurtful or dangerous online content to cause emotional, psychological, or physical harm. The urgency and severity of cyber violence have led to the enactment of laws in various countries though lots still need to be done, especially in Ghana. In Ghana, studies on cyber violence have not been extensively dealt with. Existing studies concentrate only on one form or the other form of cyber violence, thus cybercrime and cyber bullying. Also, most studies in Africa have not explored cyber violence forms using empirical theories and the few that existed were qualitatively researched, whereas others examine the effect of cyber violence rather than examining why those who involve in it behave the way they behave. It is against this backdrop that this study aims to examine various cyber violence behaviour among social media users in Ghana by applying the theory of Self-control and Social control theory. This study is important for the following reasons. The outcome of this research will help at both national and international level of policymaking by adding to the knowledge of understanding cyberviolence and why people engage in various forms of cyberviolence. It will also help expose other ways by which such behaviours are enforced thereby serving as a guide in the enactment of the rightful rules and laws to curb such behaviours. It will add to literature on consequences of new media. This study seeks to confirm or reject to the following research hypotheses. H1 Social media usage has direct significant effect of cyberviolence behaviours. H2 Ineffective parental management has direct significant positive relation to Low self-control. H3 Low self-control has direct significant positive effect on cyber violence behaviours among social, H4 Differential association has significant positive effect on cyberviolence behaviour among social media users in Ghana. H5 Definitions have a significant positive effect on cyberviolence behaviour among social media users in Ghana. H6 Imitation has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H7 Differential reinforcement has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H8 Differential association has a significant positive effect on definitions. H9 Differential association has a significant positive effect on imitation. H10 Differential association has a significant positive effect on differential reinforcement. H11 Differential association has significant indirect positive effects on cyberviolence through the learning process.

Keywords: cyberviolence, social media users, self-control theory, social learning theory

Procedia PDF Downloads 46
6773 A Study of Effective Stereo Matching Method for Long-Wave Infrared Camera Module

Authors: Hyun-Koo Kim, Yonghun Kim, Yong-Hoon Kim, Ju Hee Lee, Myungho Song

Abstract:

In this paper, we have described an efficient stereo matching method and pedestrian detection method using stereo types LWIR camera. We compared with three types stereo camera algorithm as block matching, ELAS, and SGM. For pedestrian detection using stereo LWIR camera, we used that SGM stereo matching method, free space detection method using u/v-disparity, and HOG feature based pedestrian detection. According to testing result, SGM method has better performance than block matching and ELAS algorithm. Combination of SGM, free space detection, and pedestrian detection using HOG features and SVM classification can detect pedestrian of 30m distance and has a distance error about 30 cm.

Keywords: advanced driver assistance system, pedestrian detection, stereo matching method, stereo long-wave IR camera

Procedia PDF Downloads 372
6772 mKDNAD: A Network Flow Anomaly Detection Method Based On Multi-teacher Knowledge Distillation

Authors: Yang Yang, Dan Liu

Abstract:

Anomaly detection models for network flow based on machine learning have poor detection performance under extremely unbalanced training data conditions and also have slow detection speed and large resource consumption when deploying on network edge devices. Embedding multi-teacher knowledge distillation (mKD) in anomaly detection can transfer knowledge from multiple teacher models to a single model. Inspired by this, we proposed a state-of-the-art model, mKDNAD, to improve detection performance. mKDNAD mine and integrate the knowledge of one-dimensional sequence and two-dimensional image implicit in network flow to improve the detection accuracy of small sample classes. The multi-teacher knowledge distillation method guides the train of the student model, thus speeding up the model's detection speed and reducing the number of model parameters. Experiments in the CICIDS2017 dataset verify the improvements of our method in the detection speed and the detection accuracy in dealing with the small sample classes.

Keywords: network flow anomaly detection (NAD), multi-teacher knowledge distillation, machine learning, deep learning

Procedia PDF Downloads 88