Search results for: illicit
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 53

Search results for: illicit

23 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 332
22 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 113
21 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution

Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla

Abstract:

The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.

Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad

Procedia PDF Downloads 57
20 Child Trafficking for Adoption Purposes: A Study into the Criminogenic Factors of the German Intercountry Adoption System

Authors: Elvira Loibl

Abstract:

In Western countries, the demand for adoptable children, especially healthy babies, has been considerably high for several years. Rising infertility rates, liberal abortion politics, the widespread use of contraception, and the increasing acceptance of unmarried motherhood are factors that have decreased the number of infants available for domestic adoption in the U.S. and Europe. As a consequence, many involuntarily childless couples turn to intercountry adoption as a viable alternative to have a child of their own. However, the demand for children far outpaces the supply of orphans with the desired characteristics. The imbalance between the number of prospective adopters and the children available for intercountry adoption results in long waiting lists and high prices. The inordinate sums of money involved in the international adoption system have created a commercial ‘underbelly’ where unethical and illicit practices are employed to provide the adoption market with adoptable children. Children are being purchased or abducted from their families, hospitals or child care institutions and then trafficked to receiving countries as ‘orphans’. This paper aims to uncover and explain the factors of the German adoption system that are conducive to child trafficking for adoption purposes. It explains that the tension between money and integrity as experienced by German adoption agencies, blind trust in the authorities in the sending countries as well as a lenient control system encourage and facilitate the trafficking in children to Germany.

Keywords: child trafficking, intercountry adoption, market in adoptable babies, German adoption system

Procedia PDF Downloads 263
19 Prediction of Marijuana Use among Iranian Early Youth: an Application of Integrative Model of Behavioral Prediction

Authors: Mehdi Mirzaei Alavijeh, Farzad Jalilian

Abstract:

Background: Marijuana is the most widely used illicit drug worldwide, especially among adolescents and young adults, which can cause numerous complications. The aim of this study was to determine the pattern, motivation use, and factors related to marijuana use among Iranian youths based on the integrative model of behavioral prediction Methods: A cross-sectional study was conducted among 174 youths marijuana user in Kermanshah County and Isfahan County, during summer 2014 which was selected with the convenience sampling for participation in this study. A self-reporting questionnaire was applied for collecting data. Data were analyzed by SPSS version 21 using bivariate correlations and linear regression statistical tests. Results: The mean marijuana use of respondents was 4.60 times at during week [95% CI: 4.06, 5.15]. Linear regression statistical showed, the structures of integrative model of behavioral prediction accounted for 36% of the variation in the outcome measure of the marijuana use at during week (R2 = 36% & P < 0.001); and among them attitude, marijuana refuse, and subjective norms were a stronger predictors. Conclusion: Comprehensive health education and prevention programs need to emphasize on cognitive factors that predict youth’s health-related behaviors. Based on our findings it seems, designing educational and behavioral intervention for reducing positive belief about marijuana, marijuana self-efficacy refuse promotion and reduce subjective norms encourage marijuana use has an effective potential to protect youths marijuana use.

Keywords: marijuana, youth, integrative model of behavioral prediction, Iran

Procedia PDF Downloads 533
18 Electrochemical Behavior of Cocaine on Carbon Paste Electrode Chemically Modified with Cu(II) Trans 3-MeO Salcn Complex

Authors: Alex Soares Castro, Matheus Manoel Teles de Menezes, Larissa Silva de Azevedo, Ana Carolina Caleffi Patelli, Osmair Vital de Oliveira, Aline Thais Bruni, Marcelo Firmino de Oliveira

Abstract:

Considering the problem of the seizure of illicit drugs, as well as the development of electrochemical sensors using chemically modified electrodes, this work shows the study of the electrochemical activity of cocaine in carbon paste electrode chemically modified with Cu (II) trans 3-MeO salcn complex. In this context, cyclic voltammetry was performed on 0.1 mol.L⁻¹ KCl supporting electrolyte at a scan speed of 100 mV s⁻¹, using an electrochemical cell composed of three electrodes: Ag /AgCl electrode (filled KCl 3 mol.L⁻¹) from Metrohm® (reference electrode); a platinum spiral electrode, as an auxiliary electrode, and a carbon paste electrode chemically modified with Cu (II) trans 3-MeO complex (as working electrode). Two forms of cocaine were analyzed: cocaine hydrochloride (pH 3) and cocaine free base form (pH 8). The PM7 computational method predicted that the hydrochloride form is more stable than the free base form of cocaine, so with cyclic voltammetry, we found electrochemical signal only for cocaine in the form of hydrochloride, with an anodic peak at 1.10 V, with a linearity range between 2 and 20 μmol L⁻¹ had LD and LQ of 2.39 and 7.26x10-5 mol L⁻¹, respectively. The study also proved that cocaine is adsorbed on the surface of the working electrode, where through an irreversible process, where only anode peaks are observed, we have the oxidation of cocaine, which occurs in the hydrophilic region due to the loss of two electrons. The mechanism of this reaction was confirmed by the ab-inito quantum method.

Keywords: ab-initio computational method, analytical method, cocaine, Schiff base complex, voltammetry

Procedia PDF Downloads 166
17 Investigating the Effect of the Psychoactive Substances Act 2016 on the Incidence of Adverse Medical Events in Her Majesty’s Prison (HMP) Leeds

Authors: Hayley Boal, Chloe Bromley, John Fairfield

Abstract:

Novel Psychoactive Substances (NPS) are synthetic compounds designed to reproduce effects of illicit drugs. Cheap, potent, and readily available on UK highstreets from so-called ‘head shops’, in recent years their use has surged and with it have emerged side effects including seizures, aggression, palpitations, coma, and death. Rapid development of new substances has vastly outpaced pre-existing drug legislation but the Psychoactive Substances Act 2016 rendered all but tobacco, alcohol, and amyl nitrates, illegal. Drug use has long been rife within prisons, but the absence of a reliable screening tool alongside the availability of NPS makes them ideal for prison use. Here we examine the occurrence of NPS-related adverse side effects within HMP Leeds, comparing May-September of 2015 and 2017 using daily reports distributed amongst prison staff summarising medical and behavioural incidents of the previous day. There was a statistically-significant rise of over 200% in the use of NPS between 2015 and 2017: 0.562 and 1.149 incidents per day respectively. In 2017, 38.46% incidents required ambulances, fallen from 51.02% in 2015. Although the most common descriptions in both years were ‘seizure’ and ‘unresponsive’, by 2017 ‘inhalation by staff’ had emerged. Patterns of NPS consumption mirrored the prison regime, peaking when cell doors opened, and prisoners could socialise. Despite limited data, the Psychoactive Substances Act has clearly been an insufficient deterrent to the prison population; more must be done to understand and address substance misuse in prison. NPS remains a significant risk to prisoners’ health and wellbeing.

Keywords: legislation, novel psychoactive substances, prison, spice

Procedia PDF Downloads 156
16 Dirty Martini vs Martini: The Contrasting Duality Between Big Bang and BTS Public Image and Their Latest MVs Analysis

Authors: Patricia Portugal Marques de Carvalho Lourenco

Abstract:

Big Bang is like a dirty martini embroiled in a stew of personal individual scandals that have rocked the group’s image and perception, from G-Dragon’s and T.O.P. marijuana episodes in 2011 and 2016, respectively, to Daesung’s building illicit entertainment activities in 2018to the Burning Sun shebang that led to the Titanic sink of Big Bang’s youngest member Seungri in 2019 and the positive sentiment migration to the antithetical side. BTS, on the other hand, are like a martini, clear, clean, attracting as many crowds to their performances and online content as the Pope attracts believers to Sunday Mass in the Vatican, as exemplified by their latest MVs. Big Bang’s 2022 Still Life achieved 16.4 million views on Youtube in 24hours, whilst BTS Permission to Dance achieved 68.5 million in the same period of time. The difference is significant when added Big Bang’s and BTS overall award wins, a total of 117 in contrast to 460. Both groups are uniquely talented and exceptional performers that have been contributing greatly to the dissemination of Korean Pop Music on a global scale in their own inimitable ways. Both are exceptional in their own right and while the artists cannot, ought not, should not be compared for the grave injustice made in comparing one individual planet with one solar system, a contrast is merited and hence done. The reality, nonetheless, is about disengagement from a group that lives life humanly, learning and evolving with each challenge and mistake without a clean, perfect tag attached to it, demonstrating not only an inability to disassociate the person from the artist and the music but also an inability to understand the difference between a private and public life.

Keywords: K-Pop, big bang, BTS, music, public image, entertainment, korean entertainment

Procedia PDF Downloads 74
15 Leadership, Resource Based Conflicts and Its Resolution Practices among the Pastoral Groups in Eastern Ethiopia

Authors: Bamlaku Tadesse Mengistu

Abstract:

Resource-based inter-ethnic conflicts are common in eastern Ethiopia among the Afar, Ittu-Oromo, and Issa-Somali pastoral groups. The qualitative data required for the study were collected from community leaders, ordinary members of the communities, and administrative and political bodies at various levels through one-on-one interviews, focus group discussions and field observations. The quantitative data were also collected through a household survey from the 128 households drawn from the three districts of Meiso-Mullu, Meiso, and Amibara. This research tried to assess the triggering factors of inter-ethnic violent conflicts and tensions observed and other motivating factors that encourage the rival groups to instigate the recent conflicts. The research revealed some of the triggering factors that instigate violent conflicts among the rival groups such as the bad actions of conflict entrepreneurs/rent seekers, the incidence of plunder (banditry), the encroachment of farmers’ to pastoral lands/vice versa, the destruction of farmers’ crops by pastoralists’ livestock, and among others. The roles of conflict entrepreneurs such as low and medium level administrators/leaders, illicit arms traffickers, local level elites, and among others are very much significant in fueling up inter-ethnic conflicts and tensions. Leaders of various levels wrongly agitate the politicization of ethnicity and ethnic identity as well as regional boundaries as they are political boundaries rather than administrative boundaries.

Keywords: eastern ethiopia, resource competition, ethnic conflict, AFAR, ISSA and ITTU.

Procedia PDF Downloads 126
14 Weapon Collection Initiatives and the Threat of Small Arms and Light Weapons Proliferation in Volatile Areas of North-Eastern Nigeria as a Way Forward for National Security and Development

Authors: Halilu Babaji, Adamu Buba

Abstract:

The proliferation of small arms and light weapons (SALW) and its illicit trafficking in West Africa and Nigeria in particular, pose a major threat to peace, security and development in the Sub-region. The high circulation of these weapons in the region is a product of the interplay of several factors, which derives principally from the internal socio-economic and political dynamics compounded by globalization. The process of globalization has congealed both time and space making it easier for ideas, goods, persons, services, information, products and money to move across borders with fewer restrictions. And this has a negative effect in the entire region making it easier for arms, ammunition, insurgents, criminal and drugs to flow within national boundaries. The failure of public security in most parts of Nigeria has lead communities to indulge in different forms of ‘self-help ‘security measures, ranging from vigilante groups to community-owned arms stockpiling. Having lost confidence in the Nigerian state, parties to some of these conflicts have become entangled in a security dilemma. The quest to procure more arms to guarantee personal and community protection from perceived and real enemies is fuelling the ‘domestic arms race ‘. Therefore, as small arms remain-and proliferate – development is impeded. The impact of SALW on economic well being and national development in Nigeria is of vast significant. Therefore the need to collect these arms in circulation in Nigeria particularly the volatile area of North-east is of very important. This will hopefully contribute to government effort in building a free, secured and peaceful society.

Keywords: arms, development, proliferation, security

Procedia PDF Downloads 281
13 Exclusive Breastfeeding Abandonment among Adolescent Mothers: A Cohort Study

Authors: Maria I. Nuñez-Hernández, Maria L. Riesco

Abstract:

Background: Exclusive breastfeeding (EBF) up to 6 months old infant have been considered one of the most important factors in the overall development of children. Nevertheless, as resources are scarce, it is essential to identify the most vulnerable groups that have major risk of EBF abandonment, in order to deliver the best strategies. Children of adolescent mothers are within these groups. Aims: To determine the EBF abandonment rate among adolescent mothers and to analyze the associated factors. Methods: Prospective cohort study of adolescent mothers in the southern area of Santiago, Chile, conducted in primary care services of public health system. The cohort was established from 2014 to 2015, with a sample of 105 adolescent mothers and their children at 2 months of life. The inclusion criteria were: adolescent mother from 14 to 19 years old; not twin babies; mother and baby leaving the hospital together after birthchild; correct attachment of the baby to the breast; no difficulty understanding the Spanish language or communicating. Follow-up was performed at 4 and 6 months old infant. Data were collected by interviews, considering EBF as breastfeeding only, without adding other milk, tea, juice, water or other product that not breast milk, except drugs. Data were analyzed by descriptive and inferential statistics, by Kaplan-Meier estimator and Log-Rank test, admitting the probability of occurrence of type I error of 5% (p-value = 0.05). Results: The cumulative EBF abandonment rate at 2, 4 and 6 months was 33.3%, 52.2% and 63.8%, respectively. Factors associated with EBF abandonment were maternal perception of the quality of milk as poor (p < 0.001), maternal perception that the child was not satisfied after breastfeeding (p < 0.001), use of pacifier (p < 0.001), maternal consumption of illicit drugs after delivery (p < 0.001), mother return to school (p = 0.040) and presence of nipple trauma (p = 0.045). Conclusion: EBF abandonment rate was higher in the first 4 months of life and is superior to the population of women who breastfeed. Among the EBF abandonment factors, one of them is related to the adolescent condition, and two are related to the maternal subjective perception.

Keywords: adolescent, breastfeeding, midwifery, nursing

Procedia PDF Downloads 299
12 A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection

Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay

Abstract:

With the increase of credit card usage, the volume of credit card misuse also has significantly increased, which may cause appreciable financial losses for both credit card holders and financial organizations issuing credit cards. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and their customers. Compounding on the complex nature of such adverse strategies, credit card fraudulent activities are rare events compared to the number of legitimate transactions. Hence, the challenge to develop fraud detection that are accurate and efficient is substantially intensified and, as a consequence, credit card fraud detection has lately become a very active area of research. In this work, we provide a survey of current techniques most relevant to the problem of credit card fraud detection. We carry out our survey in two main parts. In the first part, we focus on studies utilizing classical machine learning models, which mostly employ traditional transnational features to make fraud predictions. These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting with his/her electronic devices. These approaches rely on how people behave (instead of what they do), which cannot be easily forged. By providing an overview of current approaches and the results reported in the literature, this survey aims to drive the future research agenda for the community in order to develop more accurate, reliable and scalable models of credit card fraud detection.

Keywords: Credit Card Fraud Detection, User Authentication, Behavioral Biometrics, Machine Learning, Literature Survey

Procedia PDF Downloads 89
11 Localization of Radioactive Sources with a Mobile Radiation Detection System using Profit Functions

Authors: Luís Miguel Cabeça Marques, Alberto Manuel Martinho Vale, José Pedro Miragaia Trancoso Vaz, Ana Sofia Baptista Fernandes, Rui Alexandre de Barros Coito, Tiago Miguel Prates da Costa

Abstract:

The detection and localization of hidden radioactive sources are of significant importance in countering the illicit traffic of Special Nuclear Materials and other radioactive sources and materials. Radiation portal monitors are commonly used at airports, seaports, and international land borders for inspecting cargo and vehicles. However, these equipment can be expensive and are not available at all checkpoints. Consequently, the localization of SNM and other radioactive sources often relies on handheld equipment, which can be time-consuming. The current study presents the advantages of real-time analysis of gamma-ray count rate data from a mobile radiation detection system based on simulated data and field tests. The incorporation of profit functions and decision criteria to optimize the detection system's path significantly enhances the radiation field information and reduces survey time during cargo inspection. For source position estimation, a maximum likelihood estimation algorithm is employed, and confidence intervals are derived using the Fisher information. The study also explores the impact of uncertainties, baselines, and thresholds on the performance of the profit function. The proposed detection system, utilizing a plastic scintillator with silicon photomultiplier sensors, boasts several benefits, including cost-effectiveness, high geometric efficiency, compactness, and lightweight design. This versatility allows for seamless integration into any mobile platform, be it air, land, maritime, or hybrid, and it can also serve as a handheld device. Furthermore, integration of the detection system into drones, particularly multirotors, and its affordability enable the automation of source search and substantial reduction in survey time, particularly when deploying a fleet of drones. While the primary focus is on inspecting maritime container cargo, the methodologies explored in this research can be applied to the inspection of other infrastructures, such as nuclear facilities or vehicles.

Keywords: plastic scintillators, profit functions, path planning, gamma-ray detection, source localization, mobile radiation detection system, security scenario

Procedia PDF Downloads 76
10 Synthesis of MIPs towards Precursors and Intermediates of Illicit Drugs and Their following Application in Sensing Unit

Authors: K. Graniczkowska, N. Beloglazova, S. De Saeger

Abstract:

The threat of synthetic drugs is one of the most significant current drug problems worldwide. The use of drugs of abuse has increased dramatically during the past three decades. Among others, Amphetamine-Type Stimulants (ATS) are globally the second most widely used drugs after cannabis, exceeding the use of cocaine and heroin. ATS are potent central nervous system (CNS) stimulants, capable of inducing euphoric static similar to cocaine. Recreational use of ATS is widespread, even though warnings of irreversible damage of the CNS were reported. ATS pose a big problem and their production contributes to the pollution of the environment by discharging big volumes of liquid waste to sewage system. Therefore, there is a demand to develop robust and sensitive sensors that can detect ATS and their intermediates in environmental water samples. A rapid and simple test is required. Analysis of environmental water samples (which sometimes can be a harsh environment) using antibody-based tests cannot be applied. Therefore, molecular imprinted polymers (MIPs), which are known as synthetic antibodies, have been chosen for that approach. MIPs are characterized with a high mechanical and thermal stability, show chemical resistance in a broad pH range and various organic or aqueous solvents. These properties make them the preferred type of receptors for application in the harsh conditions imposed by environmental samples. To the best of our knowledge, there are no existing MIPs-based sensors toward amphetamine and its intermediates. Also not many commercial MIPs for this application are available. Therefore, the aim of this study was to compare different techniques to obtain MIPs with high specificity towards ATS and characterize them for following use in a sensing unit. MIPs against amphetamine and its intermediates were synthesized using a few different techniques, such as electro-, thermo- and UV-initiated polymerization. Different monomers, cross linkers and initiators, in various ratios, were tested to obtain the best sensitivity and polymers properties. Subsequently, specificity and selectivity were compared with commercially available MIPs against amphetamine. Different linkers, such as lipoic acid, 3-mercaptopioponic acid and tyramine were examined, in combination with several immobilization techniques, to select the best procedure for attaching particles on sensor surface. Performed experiments allowed choosing an optimal method for the intended sensor application. Stability of MIPs in extreme conditions, such as highly acidic or basic was determined. Obtained results led to the conclusion about MIPs based sensor applicability in sewage system testing.

Keywords: amphetamine type stimulants, environment, molecular imprinted polymers, MIPs, sensor

Procedia PDF Downloads 223
9 The Role of Health Beliefs in Predicting and Explaining Risky Health Behaviours within Cystic Fibrosis

Authors: Rebecca Keyte, Helen Egan, Michail Mantzios

Abstract:

It is well acknowledged that ongoing adherence is a major concern within CF. However recently literature has indicated that non-adherence should not be viewed just in terms of medical regimens. There are other damaging behaviours that some chronically ill patients engage in which can be viewed as a form of non-adherence, such as risky behaviours. Risky behaviours are a major concern within CF, as they can have adverse health effects on patients regardless of patients adherence to medical regimens. The risky behaviours this research is predominantly focusing on are smoking, excessive alcohol consumption, illicit drug use and risky sexual behaviour. This research investigates patient’s beliefs about their CF and the impact their CF has upon their life, exploring rationales for why some patients engage in risky behaviours. This research utilises qualitative semi-structured interviews taking an interpretive perspective. Twenty-four adult participants have been recruited (16 male, age range 19–66 yrs) from two UK regional CF centres, with a median FEV1 61.77% predicted. Participants were recruited via clinician guidance, with 13 participants identified by clinicians as partaking in risky behaviours. However, during the interviews 17 participants were identified as partaking in risky behaviours, illustrating that not all patients offer full disclosure of engagement in such behaviours to their clinicians. Preliminary findings illustrate a variety of reasons as to why some CF patients engage in risky behaviours, with many participants stating that one challenge in terms of living with CF is accepting their illness. Disclosure of illness was also an issue, the desire to be seen as ‘normal’ was important to many. It is often possible for CF patients to hide their illness as they do not always appear to be unwell. However, literature indicates a desire for normalcy can be accompanied with the engagement of normalised risky behaviours, enabling patients to retaliate against their illness identity. There was also evidence of a life-orientated perspective amongst participants, with some reporting that their desire for fun and enjoyment was the reason for why they were engaging in risky behaviours. Some participants did not acknowledge the impact their risky behaviours could have upon their CF, and others rationalised their continuation with the behaviours by suggesting that they were in fact beneficial to their health. There was an apparent lack of knowledge around the implications of risky behaviours, with participants indicating that they had not been informed of such potential consequences by their clinicians. Given the adverse health effects of risky behaviours within CF, more effective health promotion measures are needed to both reduce and more importantly prevent these behaviours. Due to the initiation of risky behaviours within the CF population commonly occurring during adolescence, the researcher now proposes to conduct semi-structured interviews with paediatric patients to investigate their awareness and beliefs towards risky behaviours. Overall, this research will highlight reasons why some CF patients engage in risky behaviours, in order to inform interventions aimed to prevent the initiation in risky behaviours by increasing patient awareness.

Keywords: cystic fibrosis, health beliefs, preliminary findings, risky health behaviours

Procedia PDF Downloads 272
8 Hybridization of Mathematical Transforms for Robust Video Watermarking Technique

Authors: Harpal Singh, Sakshi Batra

Abstract:

The widespread and easy accesses to multimedia contents and possibility to make numerous copies without loss of significant fidelity have roused the requirement of digital rights management. Thus this problem can be effectively solved by Digital watermarking technology. This is a concept of embedding some sort of data or special pattern (watermark) in the multimedia content; this information will later prove ownership in case of a dispute, trace the marked document’s dissemination, identify a misappropriating person or simply inform user about the rights-holder. The primary motive of digital watermarking is to embed the data imperceptibly and robustly in the host information. Extensive counts of watermarking techniques have been developed to embed copyright marks or data in digital images, video, audio and other multimedia objects. With the development of digital video-based innovations, copyright dilemma for the multimedia industry increases. Video watermarking had been proposed in recent years to serve the issue of illicit copying and allocation of videos. It is the process of embedding copyright information in video bit streams. Practically video watermarking schemes have to address some serious challenges as compared to image watermarking schemes like real-time requirements in the video broadcasting, large volume of inherently redundant data between frames, the unbalance between the motion and motionless regions etc. and they are particularly vulnerable to attacks, for example, frame swapping, statistical analysis, rotation, noise, median and crop attacks. In this paper, an effective, robust and imperceptible video watermarking algorithm is proposed based on hybridization of powerful mathematical transforms; Fractional Fourier Transform (FrFT), Discrete Wavelet transforms (DWT) and Singular Value Decomposition (SVD) using redundant wavelet. This scheme utilizes various transforms for embedding watermarks on different layers by using Hybrid systems. For this purpose, the video frames are portioned into layers (RGB) and the watermark is being embedded in two forms in the video frames using SVD portioning of the watermark, and DWT sub-band decomposition of host video, to facilitate copyright safeguard as well as reliability. The FrFT orders are used as the encryption key that allows the watermarking method to be more robust against various attacks. The fidelity of the scheme is enhanced by introducing key generation and wavelet based key embedding watermarking scheme. Thus, for watermark embedding and extraction, same key is required. Therefore the key must be shared between the owner and the verifier via some safe network. This paper demonstrates the performance by considering different qualitative metrics namely Peak Signal to Noise ratio, Structure similarity index and correlation values and also apply some attacks to prove the robustness. The Experimental results are presented to demonstrate that the proposed scheme can withstand a variety of video processing attacks as well as imperceptibility.

Keywords: discrete wavelet transform, robustness, video watermarking, watermark

Procedia PDF Downloads 209
7 Risk Factors Associated with Increased Emergency Department Visits and Hospital Admissions Among Child and Adolescent Patients

Authors: Lalanthica Yogendran, Manassa Hany, Saira Pasha, Benjamin Chaucer, Simarpreet Kaur, Christopher Janusz

Abstract:

Children and adolescent patients visit the Psychiatric Emergency Department (ED) for multiple reasons. Visiting the Psychiatric ED itself can be a traumatic experience that can affect an adolescents mental well-being, regardless of a history of mental illness. Despite this, limited research exists in this domain. Prospective studies have correlated adverse psychosocial determinants among adolescents to risk factors for poor well-being and unfavorable behavior outcomes. Studies have also shown that physiological stress is a contributor in the development of health problems and an increase in substance abuse in adolescents. This study aimed to retrospectively determine which psychosocial factors are associated with an increase in psychiatric ED visits. 600 charts of patients who had a psychiatric ED and inpatient admission visit from January 2014 through December 2014 were reviewed. Sociodemographics, diagnoses, ED visits and inpatient admissions were collected. Descriptive statistics, chi-square tests and independent t-test analyses were utilized to examine differences in the sample to determine which factors affected ED visits and admissions. The sample was 50% female, 35.2% self-identified black, and had a mean age of 13 years. The majority, 85%, went to public school and 17% were in special education. Attention Deficit Hyperactivity Disorder was the most common admitting diagnosis, found in 132(23%) responders. Most patients came from single parent household 305 (53%). The mean ages of patients that were sexually active, with legal issues, and reporting marijuana substance abuse were 15, 14.35, and 15 years respectively. Patients from two biological parent households had significantly fewer ED visits (1.2 vs. 1.7, p < 0.01) and admissions (0.09 vs. 0.26, p < 0.01). Among social factors, those who reported sexual, physical or emotional abuse had a significantly greater number of ED visits (2.1 vs. 1.5, p < 0.01) and admissions (0.61 vs. 0.14, p < 0.01) than those who did not. Patients that were sexually active or had legal issues or substance abuse with marijuana had a significantly greater number of admissions (0.43 vs. 0.17, p < 0.01), (0.54 vs. .18, p < 0.01) and (0.46 vs. 0.18, p < 0.01) respectively. This data supports the theory of the stability of a two parent home. Dual parenting plays a role in creating a safe space where a child can develop; this is shown by subsequent decreases in psychiatric ED visits and admissions. This may highlight the psychological protective role of a two parent household. Abuse can exacerbate existing psychiatric illness or initiate the onset of new disease. Substance abuse and legal issues result in early induction to the criminal system. Results show that this causes an increase in frequency of visits and severity of symptoms. Only marijuana, but not other illicit substances, correlated with higher incidence of psychiatric ED visits. This may speak to the psychotropic nature of tetrahydrocannabinols and their role in mental illness. This study demonstrates the array of psychosocial factors that lead to increased ED visits and admissions in children and adolescents.

Keywords: adolescent, child psychiatry, emergency department, substance abuse

Procedia PDF Downloads 306
6 The Moral Geography of Entertainment Businesses: Boundary Work and Respectability Politics in Global City Singapore

Authors: Tiffany Chuang

Abstract:

The study of inequality in urban space has typically emphasized class and race as dimensions of stratification, but a small and growing body of work also pays attention to exclusionary processes based on moral grounds, as is the case with mainstream disapproval of sexually oriented businesses and red-light districts. However, many sexually-oriented businesses co-exist with similar non-sexually oriented businesses in the tourism and broader entertainment industries. Furthermore, regulators and tourism- and entertainment industries are acknowledged by regulators and ordinary citizens as important contributors to the economy, and in the case of aspiring global cities, to urban prestige. Under such circumstances, it is important to examine how policymakers, residents, and other stakeholders distinguish between sexually oriented and non-sexually oriented businesses, as well as how such efforts shape moral geographies in urban settings. To address this question, this paper introduces the concept of permeable industries to describe businesses that, by their very nature of providing adult entertainment along with a measure of privacy and discretion, facilitate easy interchange between their officially sanctioned purposes and illicit or stigmatised uses, most notably by the sex industry. The permeability and ambiguity surrounding the sexual- and non-sexual activities in such establishments is in fact, a source of tension that generates energetic boundary-drawing exercises that designate legitimate from illegitimate establishments. This paper draws on three years of ethnographic fieldwork, qualitative research, and archival research (1920—2020) on Joo Chiat, a neighborhood in the city-state of Singapore. It then analyzes how middle-class residents reacted to the sudden influx of sexually oriented businesses in the early 2000s, turning the once-quiet residential and commercial neighborhood into a semi-red-light district staffed by migrant Asian women. Ironically, the red-light district had been inadvertently precipitated by the state’s neoliberal policies in the 1990s to cultivate suburban neighborhoods as decentralized tourist attractions while loosening social regulations in pursuit of global city ambitions. Residents mobilized around the discourse of “sleaze”, using it to draw symbolic boundaries while advocating for regulatory boundaries between sexually oriented and non-sexually oriented businesses in the neighborhood. Since the concept of “sleaze” was informed by middle-class distaste for low-status sex work, the result of residents’ efforts was a state-endorsed moral geography that excluded sexually-oriented businesses while tolerating adult-oriented entertainment businesses that dovetailed with global city aspirations. This study contributes to the study of urban inequality by demonstrating the importance of boundary work in reproducing respectability politics, which in turn shapes the urban geographies of moral worth.

Keywords: moral geography, boundary work, respectability politics, entertainment businesses

Procedia PDF Downloads 50
5 Quantification of the Non-Registered Electrical and Electronic Equipment for Domestic Consumption and Enhancing E-Waste Estimation: A Case Study on TVs in Vietnam

Authors: Ha Phuong Tran, Feng Wang, Jo Dewulf, Hai Trung Huynh, Thomas Schaubroeck

Abstract:

The fast increase and complex components have made waste of electrical and electronic equipment (or e-waste) one of the most problematic waste streams worldwide. Precise information on its size on national, regional and global level has therefore been highlighted as prerequisite to obtain a proper management system. However, this is a very challenging task, especially in developing countries where both formal e-waste management system and necessary statistical data for e-waste estimation, i.e. data on the production, sale and trade of electrical and electronic equipment (EEE), are often lacking. Moreover, there is an inflow of non-registered electronic and electric equipment, which ‘invisibly’ enters the EEE domestic market and then is used for domestic consumption. The non-registration/invisibility and (in most of the case) illicit nature of this flow make it difficult or even impossible to be captured in any statistical system. The e-waste generated from it is thus often uncounted in current e-waste estimation based on statistical market data. Therefore, this study focuses on enhancing e-waste estimation in developing countries and proposing a calculation pathway to quantify the magnitude of the non-registered EEE inflow. An advanced Input-Out Analysis model (i.e. the Sale–Stock–Lifespan model) has been integrated in the calculation procedure. In general, Sale-Stock-Lifespan model assists to improve the quality of input data for modeling (i.e. perform data consolidation to create more accurate lifespan profile, model dynamic lifespan to take into account its changes over time), via which the quality of e-waste estimation can be improved. To demonstrate the above objectives, a case study on televisions (TVs) in Vietnam has been employed. The results show that the amount of waste TVs in Vietnam has increased four times since 2000 till now. This upward trend is expected to continue in the future. In 2035, a total of 9.51 million TVs are predicted to be discarded. Moreover, estimation of non-registered TV inflow shows that it might on average contribute about 15% to the total TVs sold on the Vietnamese market during the whole period of 2002 to 2013. To tackle potential uncertainties associated with estimation models and input data, sensitivity analysis has been applied. The results show that both estimations of waste and non-registered inflow depend on two parameters i.e. number of TVs used in household and the lifespan. Particularly, with a 1% increase in the TV in-use rate, the average market share of non-register inflow in the period 2002-2013 increases 0.95%. However, it decreases from 27% to 15% when the constant unadjusted lifespan is replaced by the dynamic adjusted lifespan. The effect of these two parameters on the amount of waste TV generation for each year is more complex and non-linear over time. To conclude, despite of remaining uncertainty, this study is the first attempt to apply the Sale-Stock-Lifespan model to improve the e-waste estimation in developing countries and to quantify the non-registered EEE inflow to domestic consumption. It therefore can be further improved in future with more knowledge and data.

Keywords: e-waste, non-registered electrical and electronic equipment, TVs, Vietnam

Procedia PDF Downloads 220
4 Conceptualizing Health-Seeking Behavior among Adolescents and Youth with Substance Use Disorder in Urban Kwazulu-Natal. A Candidacy Framework Analysis

Authors: Siphesihle Hlongwane

Abstract:

Background: Globally, alcohol consumption, smoking, and the use of illicit drugs kill more than 11.8 million people each year. In sub-Saharan Africa, substance abuse is responsible for more than 6.4% of all deaths recorded and about 4.7% of all Disability Adjusted Life Years (DALYs), with numbers still expected to grow if no drastic measures are taken to curb and address drug use. In a setting where substance use is rife, understanding contextual factors that influence an individual’s perceived eligibility to seek rehabilitation is paramount. Using the candidacy framework, we unpack how situational factors influence an individual’s perceived eligibility for healthcare uptake in adolescents and youth with substance use disorder (SUD). Methods: The candidacy framework is concerned with how people consider their eligibility for accessing a health service. The study collected and analyzed primary qualitative data to answer the research question. Data were collected between January and July 2022 on participants aged between 18 and 35 for drug users and 18 to 60 for family members. Participants include 20 previous and current drug users and 20 family members that experience the effects of addiction. A pre-drafted semi-structured interview guide was administered to a conveniently sampled population supplemented with a referral sampling method. Data were thematically analyzed using the NVivo 12pro software to manage the data. Findings: Our findings show that people with substance use disorders are aware of their drug use habits and acknowledge their candidacy for health services. Candidacy for health services is also acknowledged by those around them, such as family members and peers, and as such, information on the navigation of health services for drug users is shared by those who have attended health services, those affected by drug use, and this includes health service research by family members to identify accessible health services. While participants reported willingness to quit drug use if assistance is provided, the permeability of health care services is hindered by both individual determinations to quit drug use from long-time use and the availability of health services for drug users, such as rehabilitation centers. Our findings also show that drug users are conscious and can articulate their ailments; however, the hunt for the next dose of drugs and long waiting cues for health service acquisition overshadows their claim to health services. Participants reported a mixture of treatments prescribed, with some more gruesome than others prescribed, thus serving as both a facilitator and barrier for health service uptake. Despite some unorthodox forms of treatments prescribed in health care, the majority of those who enter treatment complete the process of treatment, although some are met with setbacks and sometimes relapse after treatment has finished. Conclusion: Drug users are able to ascertain their candidacy for health services; however, individual and environmental characteristics relating to drug use hinder the use of health services. Drug use interventions need to entice health service uptake as a way to improve candidacy for health use.

Keywords: substance use disorder, rehabilitation, drug use, relapse, South Africa, candidacy framework

Procedia PDF Downloads 67
3 Statistical Models and Time Series Forecasting on Crime Data in Nepal

Authors: Dila Ram Bhandari

Abstract:

Throughout the 20th century, new governments were created where identities such as ethnic, religious, linguistic, caste, communal, tribal, and others played a part in the development of constitutions and the legal system of victim and criminal justice. Acute issues with extremism, poverty, environmental degradation, cybercrimes, human rights violations, crime against, and victimization of both individuals and groups have recently plagued South Asian nations. Everyday massive number of crimes are steadfast, these frequent crimes have made the lives of common citizens restless. Crimes are one of the major threats to society and also for civilization. Crime is a bone of contention that can create a societal disturbance. The old-style crime solving practices are unable to live up to the requirement of existing crime situations. Crime analysis is one of the most important activities of the majority of intelligent and law enforcement organizations all over the world. The South Asia region lacks such a regional coordination mechanism, unlike central Asia of Asia Pacific regions, to facilitate criminal intelligence sharing and operational coordination related to organized crime, including illicit drug trafficking and money laundering. There have been numerous conversations in recent years about using data mining technology to combat crime and terrorism. The Data Detective program from Sentient as a software company, uses data mining techniques to support the police (Sentient, 2017). The goals of this internship are to test out several predictive model solutions and choose the most effective and promising one. First, extensive literature reviews on data mining, crime analysis, and crime data mining were conducted. Sentient offered a 7-year archive of crime statistics that were daily aggregated to produce a univariate dataset. Moreover, a daily incidence type aggregation was performed to produce a multivariate dataset. Each solution's forecast period lasted seven days. Statistical models and neural network models were the two main groups into which the experiments were split. For the crime data, neural networks fared better than statistical models. This study gives a general review of the applied statistics and neural network models. A detailed image of each model's performance on the available data and generalizability is provided by a comparative analysis of all the models on a comparable dataset. Obviously, the studies demonstrated that, in comparison to other models, Gated Recurrent Units (GRU) produced greater prediction. The crime records of 2005-2019 which was collected from Nepal Police headquarter and analysed by R programming. In conclusion, gated recurrent unit implementation could give benefit to police in predicting crime. Hence, time series analysis using GRU could be a prospective additional feature in Data Detective.

Keywords: time series analysis, forecasting, ARIMA, machine learning

Procedia PDF Downloads 137
2 The Role of Creative Works Dissemination Model in EU Copyright Law Modernization

Authors: Tomas Linas Šepetys

Abstract:

In online content-sharing service platforms, the ability of creators to restrict illicit use of audiovisual creative works has effectively been abolished, largely due to specific infrastructure where a huge volume of copyrighted audiovisual content can be made available to the public. The European Union legislator has attempted to strengthen the positions of creators in the realm of online content-sharing services. Article 17 of the new Digital Single Market Directive considers online content-sharing service providers to carry out acts of communication to the public of any creative content uploaded to their platforms by users and posits requirements to obtain licensing agreements. While such regulation intends to assert authors‘ ability to effectively control the dissemination of their creative works, it also creates threats of parody content overblocking through automated content monitoring. Such potentially paradoxical outcome of the efforts of the EU legislator to deliver economic safeguards for the creators in the online content-sharing service platforms leads to presume lack of informity on legislator‘s part regarding creative works‘ economic exploitation opportunities provided to creators in the online content-sharing infrastructure. Analysis conducted in this scientific research discloses that the aforementioned irregularities of parody and other creative content dissemination are caused by EU legislators‘ lack of assessment of value extraction conditions for parody creators in the online content-sharing service platforms. Historical and modeling research method application reveals the existence of two creative content dissemination models and their unique mechanisms of commercial value creation. Obligations to obtain licenses and liability over creative content uploaded to their platforms by users set in Article 17 of the Digital Single Market Directive represent technological replication of the proprietary dissemination model where the creator is able to restrict access to creative content apart from licensed retail channels. The online content-sharing service platforms represent an open dissemination model where the economic potential of creative content is based on the infrastructure of unrestricted access by users and partnership with advertising services offered by the platform. Balanced modeling of proprietary dissemination models in such infrastructure requires not only automated content monitoring measures but also additional regulatory monitoring solutions to separate parody and other types of creative content. An example of the Digital Single Market Directive proves that regulation can dictate not only the technological establishment of a proprietary dissemination model but also a partial reduction of the open dissemination model and cause a disbalance between the economic interests of creators relying on such models. The results of this scientific research conclude an informative role of the creative works dissemination model in the EU copyright law modernization process. A thorough understanding of the commercial prospects of the open dissemination model intrinsic to the online content-sharing service platform structure requires and encourages EU legislators to regulate safeguards for parody content dissemination. Implementing such safeguards would result in a common application of proprietary and open dissemination models in the online content-sharing service platforms and balanced protection of creators‘ economic interests explicitly based on those creative content dissemination models.

Keywords: copyright law, creative works dissemination model, digital single market directive, online content-sharing services

Procedia PDF Downloads 48
1 Acute Severe Hyponatremia in Patient with Psychogenic Polydipsia, Learning Disability and Epilepsy

Authors: Anisa Suraya Ab Razak, Izza Hayat

Abstract:

Introduction: The diagnosis and management of severe hyponatremia in neuropsychiatric patients present a significant challenge to physicians. Several factors contribute, including diagnostic shadowing and attributing abnormal behavior to intellectual disability or psychiatric conditions. Hyponatraemia is the commonest electrolyte abnormality in the inpatient population, ranging from mild/asymptomatic, moderate to severe levels with life-threatening symptoms such as seizures, coma and death. There are several documented fatal case reports in the literature of severe hyponatremia secondary to psychogenic polydipsia, often diagnosed only in autopsy. This paper presents a case study of acute severe hyponatremia in a neuropsychiatric patient with early diagnosis and admission to intensive care. Case study: A 21-year old Caucasian male with known epilepsy and learning disability was admitted from residential living with generalized tonic-clonic self-terminating seizures after refusing medications for several weeks. Evidence of superficial head injury was detected on physical examination. His laboratory data demonstrated mild hyponatremia (125 mmol/L). Computed tomography imaging of his brain demonstrated no acute bleed or space-occupying lesion. He exhibited abnormal behavior - restlessness, drinking water from bathroom taps, inability to engage, paranoia, and hypersexuality. No collateral history was available to establish his baseline behavior. He was loaded with intravenous sodium valproate and leveritircaetam. Three hours later, he developed vomiting and a generalized tonic-clonic seizure lasting forty seconds. He remained drowsy for several hours and regained minimal recovery of consciousness. A repeat set of blood tests demonstrated profound hyponatremia (117 mmol/L). Outcomes: He was referred to intensive care for peripheral intravenous infusion of 2.7% sodium chloride solution with two-hourly laboratory monitoring of sodium concentration. Laboratory monitoring identified dangerously rapid correction of serum sodium concentration, and hypertonic saline was switched to a 5% dextrose solution to reduce the risk of acute large-volume fluid shifts from the cerebral intracellular compartment to the extracellular compartment. He underwent urethral catheterization and produced 8 liters of urine over 24 hours. Serum sodium concentration remained stable after 24 hours of correction fluids. His GCS recovered to baseline after 48 hours with improvement in behavior -he engaged with healthcare professionals, understood the importance of taking medications, admitted to illicit drug use and drinking massive amounts of water. He was transferred from high-dependency care to ward level and was initiated on multiple trials of anti-epileptics before achieving seizure-free days two weeks after resolution of acute hyponatremia. Conclusion: Psychogenic polydipsia is often found in young patients with intellectual disability or psychiatric disorders. Patients drink large volumes of water daily ranging from ten to forty liters, resulting in acute severe hyponatremia with mortality rates as high as 20%. Poor outcomes are due to challenges faced by physicians in making an early diagnosis and treating acute hyponatremia safely. A low index of suspicion of water intoxication is required in this population, including patients with known epilepsy. Monitoring urine output proved to be clinically effective in aiding diagnosis. Early referral and admission to intensive care should be considered for safe correction of sodium concentration while minimizing risk of fatal complications e.g. central pontine myelinolysis.

Keywords: epilepsy, psychogenic polydipsia, seizure, severe hyponatremia

Procedia PDF Downloads 101