Search results for: earnings call script
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 864

Search results for: earnings call script

684 Personal Data Protection: A Legal Framework for Health Law in Turkey

Authors: Veli Durmus, Mert Uydaci

Abstract:

Every patient who needs to get a medical treatment should share health-related personal data with healthcare providers. Therefore, personal health data plays an important role to make health decisions and identify health threats during every encounter between a patient and caregivers. In other words, health data can be defined as privacy and sensitive information which is protected by various health laws and regulations. In many cases, the data are an outcome of the confidential relationship between patients and their healthcare providers. Globally, almost all nations have own laws, regulations or rules in order to protect personal data. There is a variety of instruments that allow authorities to use the health data or to set the barriers data sharing across international borders. For instance, Directive 95/46/EC of the European Union (EU) (also known as EU Data Protection Directive) establishes harmonized rules in European borders. In addition, the General Data Protection Regulation (GDPR) will set further common principles in 2018. Because of close policy relationship with EU, this study provides not only information on regulations, directives but also how they play a role during the legislative process in Turkey. Even if the decision is controversial, the Board has recently stated that private or public healthcare institutions are responsible for the patient call system, for doctors to call people waiting outside a consultation room, to prevent unlawful processing of personal data and unlawful access to personal data during the treatment. In Turkey, vast majority private and public health organizations provide a service that ensures personal data (i.e. patient’s name and ID number) to call the patient. According to the Board’s decision, hospital or other healthcare institutions are obliged to take all necessary administrative precautions and provide technical support to protect patient privacy. However, this application does not effectively and efficiently performing in most health services. For this reason, it is important to draw a legal framework of personal health data by stating what is the main purpose of this regulation and how to deal with complicated issues on personal health data in Turkey. The research is descriptive on data protection law for health care setting in Turkey. Primary as well as secondary data has been used for the study. The primary data includes the information collected under current national and international regulations or law. Secondary data include publications, books, journals, empirical legal studies. Consequently, privacy and data protection regimes in health law show there are some obligations, principles and procedures which shall be binding upon natural or legal persons who process health-related personal data. A comparative approach presents there are significant differences in some EU member states due to different legal competencies, policies, and cultural factors. This selected study provides theoretical and practitioner implications by highlighting the need to illustrate the relationship between privacy and confidentiality in Personal Data Protection in Health Law. Furthermore, this paper would help to define the legal framework for the health law case studies on data protection and privacy.

Keywords: data protection, personal data, privacy, healthcare, health law

Procedia PDF Downloads 216
683 Electromagnetic Simulation Based on Drift and Diffusion Currents for Real-Time Systems

Authors: Alexander Norbach

Abstract:

The script in this paper describes the use of advanced simulation environment using electronic systems (Microcontroller, Operational Amplifiers, and FPGA). The simulation may be used for all dynamic systems with the diffusion and the ionisation behaviour also. By additionally required observer structure, the system works with parallel real-time simulation based on diffusion model and the state-space representation for other dynamics. The proposed deposited model may be used for electrodynamic effects, including ionising effects and eddy current distribution also. With the script and proposed method, it is possible to calculate the spatial distribution of the electromagnetic fields in real-time. For further purpose, the spatial temperature distribution may be used also. With upon system, the uncertainties, unknown initial states and disturbances may be determined. This provides the estimation of the more precise system states for the required system, and additionally, the estimation of the ionising disturbances that occur due to radiation effects. The results have shown that a system can be also developed and adopted specifically for space systems with the real-time calculation of the radiation effects only. Electronic systems can take damage caused by impacts with charged particle flux in space or radiation environment. In order to be able to react to these processes, it must be calculated within a shorter time that ionising radiation and dose is present. All available sensors shall be used to observe the spatial distributions. By measured value of size and known location of the sensors, the entire distribution can be calculated retroactively or more accurately. With the formation, the type of ionisation and the direct effect to the systems and thus possible prevent processes can be activated up to the shutdown. The results show possibilities to perform more qualitative and faster simulations independent of kind of systems space-systems and radiation environment also. The paper gives additionally an overview of the diffusion effects and their mechanisms. For the modelling and derivation of equations, the extended current equation is used. The size K represents the proposed charge density drifting vector. The extended diffusion equation was derived and shows the quantising character and has similar law like the Klein-Gordon equation. These kinds of PDE's (Partial Differential Equations) are analytically solvable by giving initial distribution conditions (Cauchy problem) and boundary conditions (Dirichlet boundary condition). For a simpler structure, a transfer function for B- and E- fields was analytically calculated. With known discretised responses g₁(k·Ts) and g₂(k·Ts), the electric current or voltage may be calculated using a convolution; g₁ is the direct function and g₂ is a recursive function. The analytical results are good enough for calculation of fields with diffusion effects. Within the scope of this work, a proposed model of the consideration of the electromagnetic diffusion effects of arbitrary current 'waveforms' has been developed. The advantage of the proposed calculation of diffusion is the real-time capability, which is not really possible with the FEM programs available today. It makes sense in the further course of research to use these methods and to investigate them thoroughly.

Keywords: advanced observer, electrodynamics, systems, diffusion, partial differential equations, solver

Procedia PDF Downloads 127
682 Mixed-Sub Fractional Brownian Motion

Authors: Mounir Zili

Abstract:

We will introduce a new extension of the Brownian motion, that could serve to get a good model of many natural phenomena. It is a linear combination of a finite number of sub-fractional Brownian motions; that is why we will call it the mixed sub-fractional Brownian motion. We will present some basic properties of this process. Among others, we will check that our process is non-markovian and that it has non-stationary increments. We will also give the conditions under which it is a semi-martingale. Finally, the main features of its sample paths will be specified.

Keywords: fractal dimensions, mixed gaussian processes, sample paths, sub-fractional brownian motion

Procedia PDF Downloads 413
681 African Personhood and the Regulation of Brain-Computer Interface (BCI) Technologies: A South African view

Authors: Meshandren Naidoo, Amy Gooden

Abstract:

Implantable brain-computer interface (BCI) technologies have developed to the point where brain-computer communication is possible. This has great potential in the medical field, as it allows persons who have lost capacities. However, ethicists and regulators call for a strict approach to these technologies due to the impact on personhood. This research demonstrates that the personhood debate is more nuanced and that where an African approach to personhood is used, it may produce results more favorable to the development and use of this technology.

Keywords: artificial intelligence, law, neuroscience, ethics

Procedia PDF Downloads 122
680 Improving English by Reading Local Literature: The Case for Thai Primary Children

Authors: Wipada Prasansaph

Abstract:

The aim of this research is twofold: to develop a local literature (simplified English translation version) reading booklet for Thai primary school children (the fourth graders) and to encourage the love of reading in English by reading local literature. An excerpt from Thai literature namely Phra-apaimani, the reading requirement for Primary 4 was selected to be translated into English in simplified language with cartoon pictures to illustrate the key happenings of the story. After the first draft of the booklet development, the samples of the booklets were distributed to 3 educator experts to call for validity and comments on 1) the appropriateness of the English language, 2) the organization of the booklet, 3) the comprehension of the story, and 4) the relevance to the core curriculum of Basic Education of Thailand (B.E.2551). The IOC (Index of Item – Objective Congruence) was 0.9 indicated that the material is applicable (with some comments and suggestions). After the first amendment, the booklets were distributed to 30 fourth graders (in 3 schools – 10 in each school), 10 English teachers of Primary 4, and 10 educational supervisors for English subjects (in primary level) to call for comments on 1) the comprehension of the story 2) the organization of the booklet, and 3) the encouragement for the love of reading in English. The English reading booklet on Phra-apaimani for Thai primary children, the IOC questionnaire (with the open-ended questions) for the educator experts, and the rating scales for the students, the teachers, and the educational supervisors were used as the instruments of the research. The findings revealed that most students rated ‘positive’ level for the comprehension of the story, while the teachers and the educational supervisors rated ‘highly positive’. The 3 groups rated ‘highly positive’ for both the organization of the booklet and for the encouragement for the love of reading in English. It is recommended that there should be more production of English reading texts for children, especially the texts that children already have some background knowledge. Moreover, illustration is the most crucial part for the children’s reading texts.

Keywords: English language, reading skill, primary children, Thai literature

Procedia PDF Downloads 362
679 Revenge: Dramaturgy and the Tragedy of Jihad

Authors: Myriam Benraad

Abstract:

On 5 July 2016, just days before the bloody terrorist attack on the Promenade des Anglais in Nice, the Al-Hayat media centre, one of the official propaganda branches of the Islamic State, broadcast a French nasheed which paid tribute to the Paris and Brussels attacks of November 2015 and March 2016. Entitled 'My Revenge', the terrorist anthem was of rare vehemence. It mentioned, sequentially, 'huddled bodies', in a reference to the civilian casualties of Western air strikes in the Iraqi-Syrian zone, 'explosive belts', 'sharp knives', 'large-calibre weapons' as well as 'localised targets'. France was accused of bearing the responsibility for the wave of attacks on its territory since the Charlie Hebdo massacre of January 2015 due to its 'ruthless war' against the Muslim world. Evoking an 'old aggression' and the 'crimes and spoliations' of which France has made itself guilty, the jihadist hymn depicted the rebirth of the caliphate as 'laudable revenge'. The notion of revenge has always been central to contemporary jihadism, understood both as a revolutionary ideology and a global militant movement. In recent years, the attacks carried out in Europe and elsewhere in the world have, for most, been claimed in its name. Whoever says jihad, says drama, yet few studies, if any, have looked at its dramatic and emotional elements, most notably its tragic vengefulness. This seems all the more astonishing that jihad is filled with drama; it could even be seen as a drama in its own right. The jihadists perform a script and take on roles inspired by their respective group’s culture (norms, values, beliefs, and symbols). The militants stage and perform such a script for a designated audience, either partisan, sympathising or hostile towards them and their cause. This research paper will examine the dramaturgy of jihadism and in particular, the genre that best characterises its violence: revenge tragedy. Theoretically, the research will rely on the tools of social movement theory and the sociology of emotions. Methodologically, it will draw from dramaturgical analysis and a combination of qualitative and quantitative tools to attain valuable observations of a number of developments, trends, and patterns. The choice has been made to focus mainly – however not exclusively – on the attacks which have taken place since 2001 in the European Union and more specific member states that have been significantly hit by jihadist terrorism. The research looks at a number of representative longitudinal samples identifying continuities and discontinuities, similarities, but also substantial differences. The preliminary findings tend to establish the relevance and validity of this approach in helping make better sense of sensitisation, mobilisation, and survival dynamics within jihadist groups, and motivations among individuals who have embraced violence. Besides, they illustrate their pertinence for counterterrorism policymakers and practitioners. Through drama, jihadist groups ensure the unceasing regeneration of their militant cause as well as their legitimation among their partisans. Without drama, and without the spectacular ideological staging of reality, they would not be able to maintain their attraction potential and power of persuasion.

Keywords: Jihadism, dramaturgy, revenge, tragedy

Procedia PDF Downloads 128
678 Foucault and the Archaeology of Transhumanism

Authors: Michel Foucault, Friedrich Nietzsche, Max More, Natasha Vita-More, Francesca Ferrando

Abstract:

During the early part of his intellectual and academic career (1950s and 1960s), Michel Foucault developed an interest for what we can call the ‘anthropological question’, or how our modernity deals with human nature from an epistemological standpoint. The great originality of Foucault’s thought here lies in the fact that he approaches this question not from the perspective of this ‘sovereign subject’ (that has characterized the History of Western thought) he wishes to disclose and ‘denounce’, but rather at the level of discourses and the way they constitute who we are, so to speak. This led him, in turn, to formulate a series of though-provoking statements during his so-called ‘archaeological period’ of the 1960s concerning what we call ‘man’ in the West, such as that he is an ‘invention of recent date’ (as a proper object of concern and reflection), and, perhaps more importantly, that he might disappear in the near future, ‘like a face drawn in sand at the edge of the sea’. Foucault is following on the footsteps of Nietzsche in that regard, who had famously announced in the 19th ce. the ‘death of God’ and the need for the future generations to surpass (so to speak) the traditional ‘Christian-centred’ Western conception of the human. While Foucault exposed such insights more than half a century ago, they appear to be more actual than ever today with the development and rise in popularity of intellectual movements such as Transhumanism and Posthumanism, which seek to question and propose an alternative to the concepts of ‘man’ or ‘human nature’ in our culture. They rely for that on the same assumption as Foucault and Nietzsche that those concepts (and the meaning we attribute to them) have become ‘obsolete’ as it is and thus must be overcome (at a conceptual, but also a more practical level). Hence, those movements not only echo the important Foucauldian reflection of the 1950s and 1960s on the ‘anthropological question’ but seem to have been literally announced by it, so to speak. The aim of this paper will therefore be to show the relevance of Foucault (and in particular his archaeological method) in understanding the nature of Transhumanism (and Posthumanism), for instance, by analysing and assessing it as a form of discourse that is literally reshaping the way we understand ourselves as human beings in our (post)modern age, drawing for that on a number of key texts including from the early productions of Foucault.

Keywords: foucault, nietzsche, archaeology, transhumanism, posthumanism

Procedia PDF Downloads 64
677 The Optimization Process of Aortic Heart Valve Stent Geometry

Authors: Arkadiusz Mezyk, Wojciech Klein, Mariusz Pawlak, Jacek Gnilka

Abstract:

The aortic heart valve stents should fulfill many criterions. These criteria have a strong impact on the geometrical shape of the stent. Usually, the final construction of stent is a result of many year experience and knowledge. Depending on patents claims, different stent shapes are produced by different companies. This causes difficulties for biomechanics engineers narrowing the domain of feasible solutions. The paper present optimization method for stent geometry defining by a specific analytical equation based on various mathematical functions. This formula was implemented as APDL script language in ANSYS finite element environment. For the purpose of simulation tests, a few parameters were separated from developed equation. The application of the genetic algorithms allows finding the best solution due to selected objective function. Obtained solution takes into account parameters such as radial force, compression ratio and coefficient of expansion on the transverse axial.

Keywords: aortic stent, optimization process, geometry, finite element method

Procedia PDF Downloads 275
676 Aesthetic and Social Vision in Abubakar Gimba’s a Toast in the Cemetery

Authors: James Funsho Tope

Abstract:

Being the prolific writer that he is, Gimba’s collection of Short Stories, A Toast in the Cemetery, brings out the themes of decay and corruption in the urban setting through the use of images, symbols, setting and character. Gimba seeks through these media to reveal the decay and corruption in the society. Gimba uses aesthetics to convey his message, thus making a call for change in the fabrics of society.

Keywords: corruption, decay, character, setting, symbolism, images, society

Procedia PDF Downloads 597
675 Mental Well-Being and Quality of Life: A Comparative Study of Male Leather Tannery and Non-Tannery Workers of Kanpur City, India

Authors: Gyan Kashyap, Shri Kant Singh

Abstract:

Improved mental health can be articulated as a good physical health and quality of life. Mental health plays an important role in survival of any one’s life. In today’s time people living with stress in life due to their personal matters, health problems, unemployment, work environment, living environment, substance use, life style and many more important reasons. Many studies confirmed that the significant proportion of mental health people increasing in India. This study is focused on mental well-being of male leather tannery workers in Kanpur city, India. Environment at work place as well as living environment plays an important health risk factors among leather tannery workers. Leather tannery workers are more susceptible to many chemicals and physical hazards, just because they are liable to be affected by their exposure to lots of hazardous materials and processes during tanning work in very hazardous work environment. The aim of this study to determine the level of mental health disorder and quality of life among male leather tannery and non-tannery workers in Kanpur city, India. This study utilized the primary data from the cross- sectional household study which was conducted from January to June, 2015 on tannery and non-tannery workers as a part of PhD program from the Jajmau area of Kanpur city, India. The sample of 286 tannery and 295 non-tannery workers has been collected from the study area. We have collected information from the workers of age group 15-70 those who were working at the time of survey for at least one year. This study utilized the general health questionnaire (GHQ-12) and work related stress scale to test the mental wellbeing of male tannery and non-tannery workers. By using GHQ-12 and work related stress scale, Polychoric factor analysis method has been used for best threshold and scoring. Some of important question like ‘How would you rate your overall quality of life’ on Likert scale to measure the quality of life, their earnings, education, family size, living condition, household assets, media exposure, health expenditure, treatment seeking behavior and food habits etc. Results from the study revealed that around one third of tannery workers had severe mental health problems then non-tannery workers. Mental health problem shown the statistically significant association with wealth quintile, 56 percent tannery workers had severe mental health problem those belong to medium wealth quintile. And 42 percent tannery workers had moderate mental health problem among those from the low wealth quintile. Work related stress scale found the statistically significant results for tannery workers. Large proportion of tannery and non-tannery workers reported they are unable to meet their basic needs from their earnings and living in worst condition. Important result from the study, tannery workers who were involved in beam house work in tannery (58%) had severe mental health problem. This study found the statistically significant association with tannery work and mental health problem among tannery workers.

Keywords: GHQ-12, mental well-being, factor analysis, quality of life, tannery workers

Procedia PDF Downloads 379
674 Incorporating Spatial Transcriptome Data into Ligand-Receptor Analyses to Discover Regional Activation in Cells

Authors: Eric Bang

Abstract:

Interactions between receptors and ligands are crucial for many essential biological processes, including neurotransmission and metabolism. Ligand-receptor analyses that examine cell behavior and interactions often utilize cell type-specific RNA expressions from single-cell RNA sequencing (scRNA-seq) data. Using CellPhoneDB, a public repository consisting of ligands, receptors, and ligand-receptor interactions, the cell-cell interactions were explored in a specific scRNA-seq dataset from kidney tissue and portrayed the results with dot plots and heat maps. Depending on the type of cell, each ligand-receptor pair was aligned with the interacting cell type and calculated the positori probabilities of these associations, with corresponding P values reflecting average expression values between the triads and their significance. Using single-cell data (sample kidney cell references), genes in the dataset were cross-referenced with ones in the existing CellPhoneDB dataset. For example, a gene such as Pleiotrophin (PTN) present in the single-cell data also needed to be present in the CellPhoneDB dataset. Using the single-cell transcriptomics data via slide-seq and reference data, the CellPhoneDB program defines cell types and plots them in different formats, with the two main ones being dot plots and heat map plots. The dot plot displays derived measures of the cell to cell interaction scores and p values. For the dot plot, each row shows a ligand-receptor pair, and each column shows the two interacting cell types. CellPhoneDB defines interactions and interaction levels from the gene expression level, so since the p-value is on a -log10 scale, the larger dots represent more significant interactions. By performing an interaction analysis, a significant interaction was discovered for myeloid and T-cell ligand-receptor pairs, including those between Secreted Phosphoprotein 1 (SPP1) and Fibronectin 1 (FN1), which is consistent with previous findings. It was proposed that an effective protocol would involve a filtration step where cell types would be filtered out, depending on which ligand-receptor pair is activated in that part of the tissue, as well as the incorporation of the CellPhoneDB data in a streamlined workflow pipeline. The filtration step would be in the form of a Python script that expedites the manual process necessary for dataset filtration. Being in Python allows it to be integrated with the CellPhoneDB dataset for future workflow analysis. The manual process involves filtering cell types based on what ligand/receptor pair is activated in kidney cells. One limitation of this would be the fact that some pairings are activated in multiple cells at a time, so the manual manipulation of the data is reflected prior to analysis. Using the filtration script, accurate sorting is incorporated into the CellPhoneDB database rather than waiting until the output is produced and then subsequently applying spatial data. It was envisioned that this would reveal wherein the cell various ligands and receptors are interacting with different cell types, allowing for easier identification of which cells are being impacted and why, for the purpose of disease treatment. The hope is this new computational method utilizing spatially explicit ligand-receptor association data can be used to uncover previously unknown specific interactions within kidney tissue.

Keywords: bioinformatics, Ligands, kidney tissue, receptors, spatial transcriptome

Procedia PDF Downloads 135
673 Oil-price Volatility and Economic Prosperity in Nigeria: Empirical Evidence

Authors: Yohanna Panshak

Abstract:

The impact of macroeconomic instability on economic growth and prosperity has been at forefront in many discourses among researchers and policy makers and has generated a lot of controversies over the years. This has generated series of research efforts towards understanding the remote causes of this phenomenon; its nature, determinants and how it can be targeted and mitigated. While others have opined that the root cause of macroeconomic flux in Nigeria is attributed to Oil-Price volatility, others viewed the issue as resulting from some constellation of structural constraints both within and outside the shores of the country. Research works of scholars such as [Akpan (2009), Aliyu (2009), Olomola (2006), etc] argue that oil volatility can determine economic growth or has the potential of doing so. On the contrary, [Darby (1982), Cerralo (2005) etc] share the opinion that it can slow down growth. The earlier argument rest on the understanding that for a net balance of oil exporting economies, price upbeat directly increases real national income through higher export earnings, whereas, the latter allude to the case of net-oil importing countries (which experience price rises, increased input costs, reduced non-oil demand, low investment, fall in tax revenues and ultimately an increase in budget deficit which will further reduce welfare level). Therefore, assessing the precise impact of oil price volatility on virtually any economy is a function of whether it is an oil-exporting or importing nation. Research on oil price volatility and its outcome on the growth of the Nigerian economy are evolving and in a march towards resolving Nigeria’s macroeconomic instability as long as oil revenue still remain the mainstay and driver of socio-economic engineering. Recently, a major importer of Nigeria’s oil- United States made a historic breakthrough in more efficient source of energy for her economy with the capacity of serving significant part of the world. This undoubtedly suggests a threat to the exchange earnings of the country. The need to understand fluctuation in its major export commodity is critical. This paper leans on the Renaissance growth theory with greater focus on theoretical work of Lee (1998); a leading proponent of this school who makes a clear cut of difference between oil price changes and oil price volatility. Based on the above background, the research seeks to empirically examine the impact oil-price volatility on government expenditure using quarterly time series data spanning 1986:1 to 2014:4. Vector Auto Regression (VAR) econometric approach shall be used. The structural properties of the model shall be tested using Augmented Dickey-Fuller and Phillips-Perron. Relevant diagnostics tests of heteroscedasticity, serial correlation and normality shall also be carried out. Policy recommendation shall be offered on the empirical findings and believes it assist policy makers not only in Nigeria but the world-over.

Keywords: oil-price, volatility, prosperity, budget, expenditure

Procedia PDF Downloads 264
672 R Software for Parameter Estimation of Spatio-Temporal Model

Authors: Budi Nurani Ruchjana, Atje Setiawan Abdullah, I. Gede Nyoman Mindra Jaya, Eddy Hermawan

Abstract:

In this paper, we propose the application package to estimate parameters of spatiotemporal model based on the multivariate time series analysis using the R open-source software. We build packages mainly to estimate the parameters of the Generalized Space Time Autoregressive (GSTAR) model. GSTAR is a combination of time series and spatial models that have parameters vary per location. We use the method of Ordinary Least Squares (OLS) and use the Mean Average Percentage Error (MAPE) to fit the model to spatiotemporal real phenomenon. For case study, we use oil production data from volcanic layer at Jatibarang Indonesia or climate data such as rainfall in Indonesia. Software R is very user-friendly and it is making calculation easier, processing the data is accurate and faster. Limitations R script for the estimation of model parameters spatiotemporal GSTAR built is still limited to a stationary time series model. Therefore, the R program under windows can be developed either for theoretical studies and application.

Keywords: GSTAR Model, MAPE, OLS method, oil production, R software

Procedia PDF Downloads 236
671 Hidden Hot Spots: Identifying and Understanding the Spatial Distribution of Crime

Authors: Lauren C. Porter, Andrew Curtis, Eric Jefferis, Susanne Mitchell

Abstract:

A wealth of research has been generated examining the variation in crime across neighborhoods. However, there is also a striking degree of crime concentration within neighborhoods. A number of studies show that a small percentage of street segments, intersections, or addresses account for a large portion of crime. Not surprisingly, a focus on these crime hot spots can be an effective strategy for reducing community level crime and related ills, such as health problems. However, research is also limited in an important respect. Studies tend to use official data to identify hot spots, such as 911 calls or calls for service. While the use of call data may be more representative of the actual level and distribution of crime than some other official measures (e.g. arrest data), call data still suffer from the 'dark figure of crime.' That is, there is most certainly a degree of error between crimes that occur versus crimes that are reported to the police. In this study, we present an alternative method of identifying crime hot spots, that does not rely on official data. In doing so, we highlight the potential utility of neighborhood-insiders to identify and understand crime dynamics within geographic spaces. Specifically, we use spatial video and geo-narratives to record the crime insights of 36 police, ex-offenders, and residents of a high crime neighborhood in northeast Ohio. Spatial mentions of crime are mapped to identify participant-identified hot spots, and these are juxtaposed with calls for service (CFS) data. While there are bound to be differences between these two sources of data, we find that one location, in particular, a corner store, emerges as a hot spot for all three groups of participants. Yet it does not emerge when we examine CFS data. A closer examination of the space around this corner store and a qualitative analysis of narrative data reveal important clues as to why this store may indeed be a hot spot, but not generate disproportionate calls to the police. In short, our results suggest that researchers who rely solely on official data to study crime hot spots may risk missing some of the most dangerous places.

Keywords: crime, narrative, video, neighborhood

Procedia PDF Downloads 236
670 Evaluation of Top-down and Bottom-up Leadership Development Programs in a Finnish Company

Authors: Kati Skarp, Keijo Varis, Juha Kettunen

Abstract:

The purpose of this paper is to examine and evaluate the top-down and bottom-up leadership development programs focused on human capital that improve the performance of a company. This study reports on the external top-down leadership development program supported by a consulting company and the internal participatory action research of the bottom-up program. The sickness rate and the lost time incident failure rate decreased and the ideas produced for cost savings improved, leading to increased earnings during the top-down program. The estimated cost savings potential of the bottom-up program was 3.8 million euro based on the cost savings of meeting habits, maintenance practices and the way of working in production. The results of this study are useful for those who plan and evaluate leadership development and human capital productivity consultation programs to improve the performance of a company.

Keywords: leadership, development, human resources, company, indicators, evaluation

Procedia PDF Downloads 324
669 Degraded Document Analysis and Extraction of Original Text Document: An Approach without Optical Character Recognition

Authors: L. Hamsaveni, Navya Prakash, Suresha

Abstract:

Document Image Analysis recognizes text and graphics in documents acquired as images. An approach without Optical Character Recognition (OCR) for degraded document image analysis has been adopted in this paper. The technique involves document imaging methods such as Image Fusing and Speeded Up Robust Features (SURF) Detection to identify and extract the degraded regions from a set of document images to obtain an original document with complete information. In case, degraded document image captured is skewed, it has to be straightened (deskew) to perform further process. A special format of image storing known as YCbCr is used as a tool to convert the Grayscale image to RGB image format. The presented algorithm is tested on various types of degraded documents such as printed documents, handwritten documents, old script documents and handwritten image sketches in documents. The purpose of this research is to obtain an original document for a given set of degraded documents of the same source.

Keywords: grayscale image format, image fusing, RGB image format, SURF detection, YCbCr image format

Procedia PDF Downloads 372
668 The Integration and Automation of EDA Tools in an Integrated Circuit Design Environment

Authors: Rohaya Abdul Wahab, Raja Mohd Fuad Tengku Aziz, Nazaliza Othman, Sharifah Saleh, Nabihah Razali, Rozaimah Baharim, M. Hanif M. Nasir

Abstract:

This paper will discuss how EDA tools are integrated and automated in an Integrated Circuit Design Environment. Some of the problems face in our current environment is that users need to configure manually on the library paths, start-up files and project directories. Certain manual processes that happen between the users and applications can be automated but they must be transparent to the users. For example, the users can run the applications directly after login without knowing the library paths and start-up files locations. The solution to these problems is to automate the processes using standard configuration files which will benefit the users and EDA support. This paper will discuss how the implementation is done to automate the process using scripting languages such as Perl, Tcl, Scheme and Shell Script. These scripting tools are great assets for design engineers to build a robust and powerful design flow and this technique is widely used to integrate all the tools together.

Keywords: EDA tools, Integrated Circuits, scripting, integration, automation

Procedia PDF Downloads 320
667 Evolutional Substitution Cipher on Chaotic Attractor

Authors: Adda Ali-Pacha, Naima Hadj-Said

Abstract:

Nowadays, the security of information is primarily founded on the calculation of algorithms that confidentiality depend on the number of bits necessary to define a cryptographic key. In this work, we introduce a new chaotic cryptosystem that we call evolutional substitution cipher on a chaotic attractor. In this research paper, we take the Henon attractor. The evolutional substitution cipher on Henon attractor is based on the principle of monoalphabetic cipher and it associates the plaintext at a succession of real numbers calculated from the attractor equations.

Keywords: cryptography, substitution cipher, chaos theory, Henon attractor, evolutional substitution cipher

Procedia PDF Downloads 424
666 Irish Film Tourism, Neocolonialism and Star Wars: Charting a Course Towards Ecologically and Culturally Considered Representation and Tourism on Skellig Michael

Authors: Rachel Gough

Abstract:

In 2014, Skellig Michael, an island off Ireland’s western seaboard and UNESCO world heritage site became a major setting in Disney’s Star Wars franchise. The subsequent influx of tourists to the site has proven to be a point of contention nationally. The increased visitor numbers have uplifted certain areas of the local economy, the mainland, but have caused irreparable damage to historic monuments and to endangered bird populations who breed on the island. Recent research carried out by a state body suggests far-reaching and longterm negative impacts on the island’s culture and environment, should the association with the Star Wars franchise persist. In spite of this, the film has been widely endorsed by the Irish government as providing a vital economic boost to historically marginalised rural areas through film tourism. This paper argues quite plainly that what is taking place on Skellig is neocolonialism. Skellig Michael’s unique resources, its aesthetic qualities, its ecosystem, and its cultural currency have been sold by the state to a multinational corporation, who profit from their use. Meanwhile, locals are left to do their best to turn a market trend into sustainable business at the expense of culture ecology and community. This paper intends to be the first dedicated study into the psychogeographic and cultural impact of Skellig Michael’s deterioration as a result of film tourism. It will discuss the projected impact of this incident on Irish culture more broadly and finally will attempt to lay out a roadmap for more collaborative filmmaking and touristic approach, which allows local cultures and ecosystem’s to thrive without drastically inhibiting cultural production. This paper will ultimately find that the consequences of this representation call for a requirement to read tourism as a split concept — namely into what we might loosely call “eco-tourism” and more capital-based “profit-bottom-line tourism.”

Keywords: ecology, film tourism, neocolonialism, sustainability

Procedia PDF Downloads 199
665 Legislator’s Liability – Sovereign Immunity and Rule of Law

Authors: Isabel Mousinho de Figueiredo

Abstract:

Traditionally it was held that the king can do no wrong. History has proved otherwise, and both the rule of law and the open society call for a diversification of checks and balances, including civil liability in tort. Most jurisdictions are right to fear the excessive cost of such liability for the innocent taxpayer. There are notwithstanding extreme instances where refusing compensation is perceived to be outrageous. Many public bodies end up handing out on a voluntary basis, which leaves room to question its legality and merit. Instead, some criteria can shed light on the fairness of an underlying rationale of such compensation and cordon it off within reasonable limits.

Keywords: comparative law, liability of legislators, public bodies, tort law

Procedia PDF Downloads 94
664 An Integrated Web-Based Workflow System for Design of Computational Pipelines in the Cloud

Authors: Shuen-Tai Wang, Yu-Ching Lin

Abstract:

With more and more workflow systems adopting cloud as their execution environment, it presents various challenges that need to be addressed in order to be utilized efficiently. This paper introduces a method for resource provisioning based on our previous research of dynamic allocation and its pipeline processes. We present an abstraction for workload scheduling in which independent tasks get scheduled among various available processors of distributed computing for optimization. We also propose an integrated web-based workflow designer by taking advantage of the HTML5 technology and chaining together multiple tools. In order to make the combination of multiple pipelines executing on the cloud in parallel, we develop a script translator and an execution engine for workflow management in the cloud. All information is known in advance by the workflow engine and tasks are allocated according to the prior knowledge in the repository. This proposed effort has the potential to provide support for process definition, workflow enactment and monitoring of workflow processes. Users would benefit from the web-based system that allows creation and execution of pipelines without scripting knowledge.

Keywords: workflow systems, resources provisioning, workload scheduling, web-based, workflow engine

Procedia PDF Downloads 153
663 A Recognition Method of Ancient Yi Script Based on Deep Learning

Authors: Shanxiong Chen, Xu Han, Xiaolong Wang, Hui Ma

Abstract:

Yi is an ethnic group mainly living in mainland China, with its own spoken and written language systems, after development of thousands of years. Ancient Yi is one of the six ancient languages in the world, which keeps a record of the history of the Yi people and offers documents valuable for research into human civilization. Recognition of the characters in ancient Yi helps to transform the documents into an electronic form, making their storage and spreading convenient. Due to historical and regional limitations, research on recognition of ancient characters is still inadequate. Thus, deep learning technology was applied to the recognition of such characters. Five models were developed on the basis of the four-layer convolutional neural network (CNN). Alpha-Beta divergence was taken as a penalty term to re-encode output neurons of the five models. Two fully connected layers fulfilled the compression of the features. Finally, at the softmax layer, the orthographic features of ancient Yi characters were re-evaluated, their probability distributions were obtained, and characters with features of the highest probability were recognized. Tests conducted show that the method has achieved higher precision compared with the traditional CNN model for handwriting recognition of the ancient Yi.

Keywords: recognition, CNN, Yi character, divergence

Procedia PDF Downloads 160
662 Relevance of the Tokyo Trial: A Comparative Perspective

Authors: Nalanda Roy

Abstract:

The project will offer a fresh and critical perspective into the Tokyo Trial judgment led by the Indian Jurist Dr. Radha Binod Pal. The project will focus on the Third World Approach to International Law (TWAIL) methodology to examine the relevance of international law from the post-colonial perspectives. The project will analyze Pal’s dissenting arguments from a new and comparative perspective, apply for work from other disciplines, and create an understanding of the significance of the historic judgment considering its contemporary relevance, and fill in the gaps that exist in the call for global justice.

Keywords: Tokyo trial, third world, judgment, international law

Procedia PDF Downloads 86
661 A Mechanism of Reusable, Portable, and Reliable Script Generator on Android

Authors: Kuei-Chun Liu, Yu-Yu Lai, Ching-Hong Wu

Abstract:

A good automated testing tool could reduce as much as possible the manual work done by testers. Traditional record-replay testing tool provides an automated testing solution by recording mouse coordinates as test scripts, but it will be easily broken if any change of resolutions. Therefore, more and more testers design multiple test scripts to automate the testing process for different devices. In order to improve the traditional record-replay approach and reduce the effort that the testers spending on writing test scripts, we propose an approach for generating the Android application test scripts based on accessibility service without connecting to a computer. This approach simulates user input actions and replays them correctly even at the different conditions such as the internet connection is unstable when the device under test, the different resolutions on Android devices. In this paper, we describe how to generate test scripts automatically and make a comparison with existing tools for Android such as Robotium, Appium, UIAutomator, and MonkeyTalk.

Keywords: accessibility service, Appium, automated testing, MonkeyTalk, Robotium, testing, UIAutomator

Procedia PDF Downloads 371
660 Waad Bil Mourabaha Pricing

Authors: Dchieche Amina, Aboulaich Rajae

Abstract:

In this work, we will modelize Waad Bil Mourabaha contract. This islamic contract provides the right to buy goods at a future date with a Mourabaha. Waad is a promise of sale or purchase of goods, declared in a unilateral way. In spite of the divergence between some schools of Islamic law about the Waad, this contract will allow us to study sophisticated and interesting contract: Waad Bil Mourabaha that can be used for hedging. In order to price Waad Bil Mourabaha contract, we will use an adapted Black and Scholes model using the Shariah compliant assumptions.

Keywords: Islamic finance, Black-Scholes model, call option, risks, hedging

Procedia PDF Downloads 505
659 miCoRe: Colorectal Cancer miRNAs Database

Authors: Rahul Agarwal, Ashutosh Singh

Abstract:

Colorectal cancer (CRC) also refers as bowel cancer or colon cancer. It involves the development of abnormal growth of cells in colon or rectum part of the body. This work leads to the development of a miRNA database in colorectal cancer. We named this database- miCoRe. This database comprises of all validated colon-rectal cancer miRNAs information from various published literature with an effectual knowledge based information retrieval system. miRNAs have been collected from various published literature reports. MySQL is used for main-framework of miCoRe while the front-end was developed in PHP script. The aim of developing miCoRe is to create a comprehensive central repository of colorectal carcinoma miRNAs with all germane information of miRNAs and their target genes. The current version of miCoRe consists of 238 miRNAs which are known to be implicated in malignancy of CRC. Alongside with miRNA information, miCoRe also contains the information related to the target genes of these miRNA. miCoRe furnishes the information about the mechanism of incidence and progression of the disease, which would further help the researchers to look for colorectal specific miRNAs therapies and CRC specific targeted drug designing. Moreover, it will also help in development of biomarkers for the better and early detection of CRC and will help in better clinical management of the disease.

Keywords: colorectal cancer, database, miCoRe, miRNAs

Procedia PDF Downloads 270
658 Key Transfer Protocol Based on Non-invertible Numbers

Authors: Luis A. Lizama-Perez, Manuel J. Linares, Mauricio Lopez

Abstract:

We introduce a method to perform remote user authentication on what we call non-invertible cryptography. It exploits the fact that the multiplication of an invertible integer and a non-invertible integer in a ring Zn produces a non-invertible integer making infeasible to compute factorization. The protocol requires the smallest key size when is compared with the main public key algorithms as Diffie-Hellman, Rivest-Shamir-Adleman or Elliptic Curve Cryptography. Since we found that the unique opportunity for the eavesdropper is to mount an exhaustive search on the keys, the protocol seems to be post-quantum.

Keywords: invertible, non-invertible, ring, key transfer

Procedia PDF Downloads 172
657 Political Connections, Business Strategy and Tax Aggressiveness: Evidence from China

Authors: Liqiang Chen

Abstract:

This study investigates the effects of political connections on the association between firms’ business strategy and their tax aggressiveness in an emerging economy such as China. By studying all public Chinese firms in the period from 2011 to 2017, we find that firms adopting innovative business strategy are more tax aggressive overall, but innovative firms with political connections are less tax aggressive compared to those without political connections. Moreover, we document several channels through which political connections affect the association between innovative business strategy and tax aggressiveness. In particular, we show that the mitigation effect of political connections on tax aggressiveness is stronger for innovative firms located in areas with a lower marketization index and for innovative firms with a lower leverage level or with less earnings management. Our results are robust to an instrumental variable approach to account for possible endogenous bias. Our study contributes to the understanding of firms’ tax behaviors in an emerging economy setting and suggests that there are costs associated with political connections, such as foregone tax saving opportunities, which are understudied in the prior literature.

Keywords: tax aggressiveness, business strategy, political connections, emerging economy

Procedia PDF Downloads 120
656 Using “Eckel” Model to Measure Income Smoothing Practices: The Case of French Companies

Authors: Feddaoui Amina

Abstract:

Income smoothing represents an attempt on the part of the company's management to reduce variations in earnings through the manipulation of the accounting principles. In this study, we aimed to measure income smoothing practices in a sample of 30 French joint stock companies during the period (2007-2009), we used Dummy variables method and “ECKEL” model to measure income smoothing practices and Binomial test accourding to SPSS program, to confirm or refute our hypothesis. This study concluded that there are no significant statistical indicators of income smoothing practices in the sample studied of French companies during the period (2007-2009), so the income series in the same sample studied of is characterized by stability and non-volatility without any intervention of management through accounting manipulation. However, this type of accounting manipulation should be taken into account and efforts should be made by control bodies to apply Eckel model and generalize its use at the global level.

Keywords: income, smoothing, 'Eckel', French companies

Procedia PDF Downloads 147
655 Resocializing Corporate Mindfulness and Meditation: A Relational-Sociological Account of Mindfulness Course Curricula in the Workplace

Authors: Katie Temple

Abstract:

This paper investigates how corporate actors forge commensurability between Buddhist-based mindfulness techniques and day-to-day organizational life. In-depth interviews were conducted with mindfulness instructors certified through Google’s Search Inside Yourself Leadership Institute (SIYLI), an organization that designs corporate mindfulness program curricula based on their experiences guiding courses in Fortune 500 companies. Drawing from anti-essentialist sociology and interpretive data analysis, this paper describes instructors’ use of their standardized teacher guidebooks, a regulatory script all SIYLI-certified instructors must adhere to, and instructors’ reinterpretations of teaching protocols at the local level. Instructors mediate standardized rules through their embodied knowledge, perceived receptivity and effect of a given audience, and their political values. Instructors also resist standardizing practices by developing creative, under-the-radar tactics to deviate from the guidebook and assert their own spiritual autonomy. This research contributes to growing debates challenging critical and neoliberal accounts of capitalist abstraction.

Keywords: anti-essentialism, corporate culture, interpretive methods, mindfulness and meditation, relational sociology

Procedia PDF Downloads 85