CINXE.COM

Search results for: spying on calls

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: spying on calls</title> <meta name="description" content="Search results for: spying on calls"> <meta name="keywords" content="spying on calls"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="spying on calls" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="spying on calls"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 470</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: spying on calls</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">470</span> Independent Encryption Technique for Mobile Voice Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nael%20Hirzalla">Nael Hirzalla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The legality of some countries or agencies’ acts to spy on personal phone calls of the public became a hot topic to many social groups’ talks. It is believed that this act is considered an invasion to someone’s privacy. Such act may be justified if it is singling out specific cases but to spy without limits is very unacceptable. This paper discusses the needs for not only a simple and light weight technique to secure mobile voice calls but also a technique that is independent from any encryption standard or library. It then presents and tests one encrypting algorithm that is based of frequency scrambling technique to show fair and delay-free process that can be used to protect phone calls from such spying acts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=frequency%20scrambling" title="frequency scrambling">frequency scrambling</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title=" mobile applications"> mobile applications</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20voice%20encryption" title=" real-time voice encryption"> real-time voice encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls" title=" spying on calls"> spying on calls</a> </p> <a href="https://publications.waset.org/abstracts/34059/independent-encryption-technique-for-mobile-voice-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34059.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">479</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">469</span> Warfield Spying Robot Using LoRa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Madhavi%20T.">Madhavi T.</a>, <a href="https://publications.waset.org/abstracts/search?q=Sireesha%20Sakhamuri"> Sireesha Sakhamuri</a>, <a href="https://publications.waset.org/abstracts/search?q=Hema%20Sri%20A."> Hema Sri A.</a>, <a href="https://publications.waset.org/abstracts/search?q=Harika%20K."> Harika K.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today as technological advancements are taking place, these advancements are being used by the armed forces to reduce the risk of their losses and to defeat their enemies. The development of sophisticated technology relies mostly on the use of high- tech weapons or machinery. Robotics is one of the hot spheres of the modern age in which nations concentrate on the state of war and peace for military purposes. They have been in use for demining and rescue operations for some time now but are being propelled by using them for combat and spy missions. This project focuses on creating a LoRa-based spying robot with a wireless IP camera attached to it that can rising the human target. This robot transmits the signal via an IP camera to the base station. One of this project’s major applications can be analyzed using a PC that can be used to control the robot’s movement. The robot sends the signal through the LoRa transceiver at the base station to the LoRa transceiver mounted on the robot. With this function, the, robot can relay videos in real- time along with anti-collision capabilities and the enemies in the war zone cannot recognize them. More importantly, this project focuses on increasing communication using LoRa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=lora" title="lora">lora</a>, <a href="https://publications.waset.org/abstracts/search?q=IP%20cam" title=" IP cam"> IP cam</a>, <a href="https://publications.waset.org/abstracts/search?q=metal%20detector" title=" metal detector"> metal detector</a>, <a href="https://publications.waset.org/abstracts/search?q=laser%20shoot" title=" laser shoot"> laser shoot</a> </p> <a href="https://publications.waset.org/abstracts/165994/warfield-spying-robot-using-lora" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165994.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">468</span> The Journey of a Malicious HTTP Request </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Mansouri">M. Mansouri</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Jaklitsch"> P. Jaklitsch</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Teiniker"> E. Teiniker</a> </p> <p class="card-text"><strong>Abstract:</strong></p> SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls" title="Linux system calls">Linux system calls</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20attack%20detection" title=" web attack detection"> web attack detection</a>, <a href="https://publications.waset.org/abstracts/search?q=interception" title=" interception"> interception</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL" title=" SQL "> SQL </a> </p> <a href="https://publications.waset.org/abstracts/13242/the-journey-of-a-malicious-http-request" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">467</span> Teleconsultations and The Need of Onsite Additional Medical Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cristina%20Hotoleanu">Cristina Hotoleanu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: The recent Covid-19 pandemic accelerated the development of e-health, including telemedicine, smartphone applications, and medical wearable devices. Providing remote teleconsultations supposes challenges which may require further face-to-face medical interactions. The aim of this study was to assess the correlation between the types of teleconsultations and the need of onsite medical services (investigations and medical visits) for the diagnosis and treatment. Methods: a retrospective study including all the teleconsultations using the platform offered by a telehealth provider in Romania (Telios Care SA) between May 1, 2021- April 30, 2022, was performed. Binary data were analysed using the chi-square test with a significance level of p < 0.05. Results: out of 7163 consultations, 3961 were phone calls, 1981 were online messages, and 1221 were video calls. Onsite medical services were indicated in 3327 (46.44%) cases; the onsite investigations or the onsite visits were recommended for 2908 patients as follows: 2326 in case of phone calls, 582 in case of online messages, none in case of video calls. Both onsite investigations and visits were indicated for 419 patients. The need for onsite additional medical services was significantly higher in the case of phone calls than in the other 2 types of teleconsultations (Chi square= 1207.06, p= 0.00001). The indication for onsite services was done mainly after teleconsultations covering medical specialties (87.34%), significantly higher than the other specialties (Chi square=914.59, p=0.00001). Teleconsultations in surgical specialties and other fields (pharmacy, dentistry, psychology, wellbeing- nutrition, fitness) resulted in 12.13%, respective less than 1%, indication for onsite investigations or visits, explained by using of video calls in most of the cases. Conclusion: a further onsite medical service was necessary in less than a half of the teleconsultations. This indication was done mainly after phone calls and teleconsultations in medical specialties. Video calls were used mostly in psychology, nutrition, and fitness teleconsultations and did not require a further onsite medical service. Other studies are necessary to assess better the types of teleconsultations and the specialties bringing the biggest benefit for the patients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=onsite%20medical%20services" title="onsite medical services">onsite medical services</a>, <a href="https://publications.waset.org/abstracts/search?q=phone%20calls" title=" phone calls"> phone calls</a>, <a href="https://publications.waset.org/abstracts/search?q=teleconsultations" title=" teleconsultations"> teleconsultations</a>, <a href="https://publications.waset.org/abstracts/search?q=telemedicine" title=" telemedicine"> telemedicine</a> </p> <a href="https://publications.waset.org/abstracts/151975/teleconsultations-and-the-need-of-onsite-additional-medical-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">101</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">466</span> Financial Reports and Common Ownership: An Analysis of the Mechanisms Common Owners Use to Induce Anti-Competitive Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kevin%20Smith">Kevin Smith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Publicly traded company in the US are legally obligated to host earnings calls that discuss their most recent financial reports. During these calls, investors are able to ask these companies questions about these financial reports and on the future direction of the company. This paper examines whether common institutional owners use these calls as a way to indirectly signal to companies in their portfolio to not take actions that could hurt the common owner's interests. This paper uses transcripts taken from the earnings calls of the six largest health insurance companies in the US from 2014 to 2019. This data is analyzed using text analysis and sentiment analysis to look for patterns in the statements made by common owners. The analysis found that common owners where more likely to recommend against direct price competition and instead redirect the insurance companies towards more passive actions, like investing in new technologies. This result indicates a mechanism that common owners use to reduce competition in the health insurance market. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=common%20ownership" title="common ownership">common ownership</a>, <a href="https://publications.waset.org/abstracts/search?q=text%20analysis" title=" text analysis"> text analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=sentiment%20analysis" title=" sentiment analysis"> sentiment analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/172014/financial-reports-and-common-ownership-an-analysis-of-the-mechanisms-common-owners-use-to-induce-anti-competitive-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172014.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">74</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">465</span> Malware Detection in Mobile Devices by Analyzing Sequences of System Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jorge%20Maestre%20Vidal">Jorge Maestre Vidal</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20Lucila%20Sandoval%20Orozco"> Ana Lucila Sandoval Orozco</a>, <a href="https://publications.waset.org/abstracts/search?q=Luis%20Javier%20Garc%C3%ADa%20Villalba"> Luis Javier García Villalba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20systems" title=" intrusion detection systems"> intrusion detection systems</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/70344/malware-detection-in-mobile-devices-by-analyzing-sequences-of-system-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70344.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">302</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">464</span> Clinical Advice Services: Using Lean Chassis to Optimize Nurse-Driven Telephonic Triage of After-Hour Calls from Patients</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eric%20Lee%20G.%20Escobedo-Wu">Eric Lee G. Escobedo-Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Nidhi%20Rohatgi"> Nidhi Rohatgi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fouzel%20Dhebar"> Fouzel Dhebar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is challenging for patients to navigate through healthcare systems after-hours. This leads to delays in care, patient/provider dissatisfaction, inappropriate resource utilization, readmissions, and higher costs. It is important to provide patients and providers with effective clinical decision-making tools to allow seamless connectivity and coordinated care. In August 2015, patient-centric Stanford Health Care established Clinical Advice Services (CAS) to provide clinical decision support after-hours. CAS is founded on key Lean principles: Value stream mapping, empathy mapping, waste walk, takt time calculations, standard work, plan-do-check-act cycles, and active daily management. At CAS, Clinical Assistants take the initial call and manage all non-clinical calls (e.g., appointments, directions, general information). If the patient has a clinical symptom, the CAS nurses take the call and utilize standardized clinical algorithms to triage the patient to home, clinic, urgent care, emergency department, or 911. Nurses may also contact the on-call physician based on the clinical algorithm for further direction and consultation. Since August 2015, CAS has managed 228,990 calls from 26 clinical specialties. Reporting is built into the electronic health record for analysis and data collection. 65.3% of the after-hours calls are clinically related. Average clinical algorithm adherence rate has been 92%. An average of 9% of calls was escalated by CAS nurses to the physician on call. An average of 5% of patients was triaged to the Emergency Department by CAS. Key learnings indicate that a seamless connectivity vision, cascading, multidisciplinary ownership of the problem, and synergistic enterprise improvements have contributed to this success while striving for continuous improvement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=after%20hours%20phone%20calls" title="after hours phone calls">after hours phone calls</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%20advice%20services" title=" clinical advice services"> clinical advice services</a>, <a href="https://publications.waset.org/abstracts/search?q=nurse%20triage" title=" nurse triage"> nurse triage</a>, <a href="https://publications.waset.org/abstracts/search?q=Stanford%20Health%20Care" title=" Stanford Health Care"> Stanford Health Care</a> </p> <a href="https://publications.waset.org/abstracts/90272/clinical-advice-services-using-lean-chassis-to-optimize-nurse-driven-telephonic-triage-of-after-hour-calls-from-patients" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90272.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">174</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">463</span> Gender Differences in Communication Styles: An Analysis of the Language of Earnings Conference Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chiara%20De%20Amicis">Chiara De Amicis</a>, <a href="https://publications.waset.org/abstracts/search?q=Sonia%20Falconieri"> Sonia Falconieri</a>, <a href="https://publications.waset.org/abstracts/search?q=Mesut%20Tastan"> Mesut Tastan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, we analyze the language employed by Chief Executive Officers (CEOs) and Chief Financial Officers (CFOs) during earnings conference calls from a gender perspective. We find evidences that conference calls held by female CEOs and/or CFOs exhibit a higher level of optimism compared to conference calls held by male CEOs and/or CFOs. Moreover, female managers tend to present and discuss firm performances with less vagueness as compared to their male colleagues. We then observe the market reaction around each earnings conference call: while manager optimism is perceived as a good signal by investors, manager vagueness significantly dampens the market reaction around the call. Whether the gender of the CEO and/or the CFO delivering the conference call affects investors’ perceptions about the firm performance is still an open question. Some evidences show that the language employed by female managers conveys more valuable information for market participants as compared to the language employed by their male counterparts. This study contributes to a growing literature in finance and accounting that uses textual analysis to assess the informativeness of corporate disclosure. To our knowledge, this is the first paper that aims at answering the question whether the gender of firm’s top managers does matter when it comes to assess the informativeness of corporate spoken communication. We believe that our results will be of relevance for future research in the field. Moreover, our evidence may be used in support of the debate if a larger participation by women in the management of companies should be encouraged or not. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conference%20calls" title="conference calls">conference calls</a>, <a href="https://publications.waset.org/abstracts/search?q=even%20study" title=" even study"> even study</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=market%20reaction" title=" market reaction"> market reaction</a>, <a href="https://publications.waset.org/abstracts/search?q=textual%20analysis" title=" textual analysis"> textual analysis</a> </p> <a href="https://publications.waset.org/abstracts/93086/gender-differences-in-communication-styles-an-analysis-of-the-language-of-earnings-conference-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93086.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">462</span> Invisible Aircraft Using Plasma Display</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20Ramamoorthy">C. Ramamoorthy</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Ranga%20Raj"> R. Ranga Raj</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In olden days the Ramayana epic depicts the usage of invisible and fuel less aircraft named pushpavimana. The change of color in the reptile family chameleon paves way for the concept of color change phenomenon available in nature. In present scenario the aircrafts are visible so it is easily identified. So there are too many problems from the threatening. Research is still going on about this problem by using Liquid Crystal Display (LCD). Objective of this paper is to find much better to use the concept of invisible aircraft using plasma display through Couple Charged Device camera (CCD), which has a high resolution and can be used for many purposes like spying, defense, etc. Moreover it is cost wise cheap then, escaping the foe viewing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CCD%20camera" title="CCD camera">CCD camera</a>, <a href="https://publications.waset.org/abstracts/search?q=chameleon" title=" chameleon"> chameleon</a>, <a href="https://publications.waset.org/abstracts/search?q=invisible" title=" invisible"> invisible</a>, <a href="https://publications.waset.org/abstracts/search?q=plasma%20display" title=" plasma display"> plasma display</a> </p> <a href="https://publications.waset.org/abstracts/14559/invisible-aircraft-using-plasma-display" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14559.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">403</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">461</span> Outcome of Emergency Response Team System in In-Hospital Cardiac Arrest</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jirapat%20Suriyachaisawat">Jirapat Suriyachaisawat</a>, <a href="https://publications.waset.org/abstracts/search?q=Ekkit%20Surakarn"> Ekkit Surakarn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: To improve early detection and mortality rate of In- Hospital Cardiac arrest, Emergency Response Team (ERT) system was planned and implemented since June 2009 to detect pre-arrest conditions and for any concerns. The ERT consisted of on duty physicians and nurses from emergency department. ERT calling criteria consisted of acute change of HR < 40 or > 130 beats per minute, systolic blood pressure < 90mmHg, respiratory rate <8 or > 28 breaths per minute, O2 saturation < 90%, acute change in conscious state, acute chest pain or worried about the patients. From the data on ERT system implementation in our hospital in early phase (during June 2009-2011), there was no statistic significance in difference in In-Hospital cardiac arrest incidence and overall hospital mortality rate. Since the introduction of the ERT service in our hospital, we have conducted continuous educational campaign to improve awareness in an attempt to increase use of the service. Methods: To investigate outcome of ERT system in In-Hospital cardiac arrest and overall hospital mortality rate. We conducted a prospective, controlled before-and after examination of the long term effect of a ERT system on the incidence of cardiac arrest. We performed Chi -square analysis to find statistic significance. Results: Of a total 623 ERT cases from June 2009 until December 2012, there were 72 calls in 2009, 196 calls in 2010 ,139 calls in 2011 and 245 calls in 2012.The number of ERT calls per 1000 admissions in year 2009-10 was 7.69, 5.61 in 2011 and 9.38 in 2013. The number of Code blue calls per 1000 admissions decreased significantly from 2.28 to 0.99 per 1000 admissions (P value < 0.001). The incidence of cardiac arrest decreased progressively from 1.19 to 0.34 per 1000 admissions and significant in difference in year 2012 (P value < 0.001). The overall hospital mortality rate decreased by 8 % from 15.43 to 14.43 per 1000 admissions (P value 0.095). Conclusions: ERT system implementation was associated with progressive reduction in cardiac arrests over three year period, especially statistic significant in difference in 4th year after implementation. We also found an inverse association between number of ERT use and the risk of occurrence of cardiac arrests, But we have not found difference in overall hospital mortality rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emergency%20response%20team" title="emergency response team">emergency response team</a>, <a href="https://publications.waset.org/abstracts/search?q=ERT" title=" ERT"> ERT</a>, <a href="https://publications.waset.org/abstracts/search?q=cardiac%20arrest" title=" cardiac arrest"> cardiac arrest</a>, <a href="https://publications.waset.org/abstracts/search?q=emergency%20medicine" title=" emergency medicine "> emergency medicine </a> </p> <a href="https://publications.waset.org/abstracts/13824/outcome-of-emergency-response-team-system-in-in-hospital-cardiac-arrest" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13824.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">310</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">460</span> Long-Term Outcome of Emergency Response Team System in In-Hospital Cardiac Arrest</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jirapat%20Suriyachaisawat">Jirapat Suriyachaisawat</a>, <a href="https://publications.waset.org/abstracts/search?q=Ekkit%20Surakarn"> Ekkit Surakarn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: To improve early detection and mortality rate of in-hospital cardiac arrest, Emergency Response Team (ERT) system was planned and implemented since June 2009 to detect pre-arrest conditons and for any concerns. The ERT consisted of on duty physicians and nurses from emergency department. ERT calling criteria consisted of acute change of HR < 40 or > 130 beats per minute, systolic blood pressure < 90 mmHg, respiratory rate <8 or >28 breaths per minute, O2 saturation <90%, acute change in conscious state, acute chest pain or worry about the patients. From the data on ERT system implementation in our hospital in early phase (during June 2009-2011), there was no statistic significance in difference in in-hospital cardiac arrest incidence and overall hospital mortality rate. Since the introduction of the ERT service in our hospital, we have conducted continuous educational campaign to improve awareness in an attempt to increase use of the service. Methods: To investigate outcome of ERT system in in-hospital cardiac arrest and overall hospital mortality rate, we conducted a prospective, controlled before-and after examination of the long term effect of a ERT system on the incidence of cardiac arrest. We performed chi-square analysis to find statistic significance. Results: Of a total 623 ERT cases from June 2009 until December 2012, there were 72 calls in 2009, 196 calls in 2010, 139 calls in 2011 and 245 calls in 2012. The number of ERT calls per 1000 admissions in year 2009-10 was 7.69; 5.61 in 2011 and 9.38 in 2013. The number of code blue calls per 1000 admissions decreased significantly from 2.28 to 0.99 per 1000 admissions (P value < 0.001). The incidence of cardiac arrest decreased progressively from 1.19 to 0.34 per 1000 admissions and significant in difference in year 2012 (P value < 0.001 ). The overall hospital mortality rate decreased by 8 % from 15.43 to 14.43 per 1000 admissions (P value 0.095). Conclusions: ERT system implementation was associated with progressive reduction in cardiac arrests over three year period, especially statistic significant in difference in 4th year after implementation. We also found an inverse association between number of ERT use and the risk of occurrence of cardiac arrests, but we have not found difference in overall hospital mortality rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cardiac%20arrest" title="cardiac arrest">cardiac arrest</a>, <a href="https://publications.waset.org/abstracts/search?q=outcome" title=" outcome"> outcome</a>, <a href="https://publications.waset.org/abstracts/search?q=in-hospital" title=" in-hospital"> in-hospital</a>, <a href="https://publications.waset.org/abstracts/search?q=ERT" title=" ERT"> ERT</a> </p> <a href="https://publications.waset.org/abstracts/16350/long-term-outcome-of-emergency-response-team-system-in-in-hospital-cardiac-arrest" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16350.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">198</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">459</span> Automatic Intelligent Analysis of Malware Behaviour</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hermann%20Dornhackl">Hermann Dornhackl</a>, <a href="https://publications.waset.org/abstracts/search?q=Konstantin%20Kadletz"> Konstantin Kadletz</a>, <a href="https://publications.waset.org/abstracts/search?q=Robert%20Luh"> Robert Luh</a>, <a href="https://publications.waset.org/abstracts/search?q=Paul%20Tavolato"> Paul Tavolato</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=malware%20behaviour" title="malware behaviour">malware behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=modelling" title=" modelling"> modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=parsing" title=" parsing"> parsing</a>, <a href="https://publications.waset.org/abstracts/search?q=search" title=" search"> search</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20matching" title=" pattern matching"> pattern matching</a> </p> <a href="https://publications.waset.org/abstracts/3774/automatic-intelligent-analysis-of-malware-behaviour" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">458</span> Phone Number Spoofing Attack in VoLTE 4G</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joo-Hyung%20Oh">Joo-Hyung Oh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=LTE" title="LTE">LTE</a>, <a href="https://publications.waset.org/abstracts/search?q=4G" title=" 4G"> 4G</a>, <a href="https://publications.waset.org/abstracts/search?q=VoLTE" title=" VoLTE"> VoLTE</a>, <a href="https://publications.waset.org/abstracts/search?q=phone%20number%20spoofing" title=" phone number spoofing"> phone number spoofing</a> </p> <a href="https://publications.waset.org/abstracts/22199/phone-number-spoofing-attack-in-volte-4g" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22199.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">432</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">457</span> Phone Number Spoofing Attack in VoLTE</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joo-Hyung%20Oh">Joo-Hyung Oh</a>, <a href="https://publications.waset.org/abstracts/search?q=Sekwon%20Kim"> Sekwon Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Myoungsun%20Noh"> Myoungsun Noh</a>, <a href="https://publications.waset.org/abstracts/search?q=Chaetae%20Im"> Chaetae Im</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=LTE" title="LTE">LTE</a>, <a href="https://publications.waset.org/abstracts/search?q=4G" title=" 4G"> 4G</a>, <a href="https://publications.waset.org/abstracts/search?q=VoLTE" title=" VoLTE"> VoLTE</a>, <a href="https://publications.waset.org/abstracts/search?q=phone%20number%20spoofing" title=" phone number spoofing"> phone number spoofing</a> </p> <a href="https://publications.waset.org/abstracts/21718/phone-number-spoofing-attack-in-volte" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21718.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">522</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">456</span> The Modification of Convolutional Neural Network in Fin Whale Identification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiahao%20Cui">Jiahao Cui</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the past centuries, due to climate change and intense whaling, the global whale population has dramatically declined. Among the various whale species, the fin whale experienced the most drastic drop in number due to its popularity in whaling. Under this background, identifying fin whale calls could be immensely beneficial to the preservation of the species. This paper uses feature extraction to process the input audio signal, then a network based on AlexNet and three networks based on the ResNet model was constructed to classify fin whale calls. A mixture of the DOSITS database and the Watkins database was used during training. The results demonstrate that a modified ResNet network has the best performance considering precision and network complexity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=convolutional%20neural%20network" title="convolutional neural network">convolutional neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=ResNet" title=" ResNet"> ResNet</a>, <a href="https://publications.waset.org/abstracts/search?q=AlexNet" title=" AlexNet"> AlexNet</a>, <a href="https://publications.waset.org/abstracts/search?q=fin%20whale%20preservation" title=" fin whale preservation"> fin whale preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20extraction" title=" feature extraction"> feature extraction</a> </p> <a href="https://publications.waset.org/abstracts/155185/the-modification-of-convolutional-neural-network-in-fin-whale-identification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155185.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">455</span> Predicting the Success of Bank Telemarketing Using Artificial Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mokrane%20Selma">Mokrane Selma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The shift towards decision making (DM) based on artificial intelligence (AI) techniques will change the way in which consumer markets and our societies function. Through AI, predictive analytics is being used by businesses to identify these patterns and major trends with the objective to improve the DM and influence future business outcomes. This paper proposes an Artificial Neural Network (ANN) approach to predict the success of telemarketing calls for selling bank long-term deposits. To validate the proposed model, we uses the bank marketing data of 41188 phone calls. The ANN attains 98.93% of accuracy which outperforms other conventional classifiers and confirms that it is credible and valuable approach for telemarketing campaign managers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bank%20telemarketing" title="bank telemarketing">bank telemarketing</a>, <a href="https://publications.waset.org/abstracts/search?q=prediction" title=" prediction"> prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20making" title=" decision making"> decision making</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20network" title=" artificial neural network"> artificial neural network</a> </p> <a href="https://publications.waset.org/abstracts/114375/predicting-the-success-of-bank-telemarketing-using-artificial-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114375.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">159</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">454</span> The Transformation of the Workplace through Robotics, Artificial Intelligence, and Automation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Javed%20Mohammed">Javed Mohammed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Robotics is the fastest growing industry in the world, poised to become the largest in the next decade. The use of robots requires design, application and implementation of the appropriate safety controls in order to avoid creating hazards to production personnel, programmers, maintenance specialists and systems engineers. The increasing use of artificial intelligence (AI) and related technologies in the workplace are dramatically changing the employment landscape. The impact of robotics technology on workplace policy is dramatic and complex. The robotics revolution calls for a comprehensive approach to job training, and retraining, to mitigate worker displacement and enable workers to benefit from the new jobs that the technology will generate. It calls for a thoughtful, forward-thinking approach by lawmakers, regulators and employers to prepare for the oncoming transformation of the workplace and workforce. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design" title="design">design</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=programmers" title=" programmers"> programmers</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20engineers" title=" system engineers"> system engineers</a>, <a href="https://publications.waset.org/abstracts/search?q=robotics" title=" robotics"> robotics</a>, <a href="https://publications.waset.org/abstracts/search?q=transformation" title=" transformation"> transformation</a> </p> <a href="https://publications.waset.org/abstracts/23294/the-transformation-of-the-workplace-through-robotics-artificial-intelligence-and-automation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23294.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">473</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">453</span> Voice over IP Quality of Service Evaluation for Mobile Ad Hoc Network in an Indoor Environment for Different Voice Codecs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lina%20Abou%20Haibeh">Lina Abou Haibeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Nadir%20Hakem"> Nadir Hakem</a>, <a href="https://publications.waset.org/abstracts/search?q=Ousama%20Abu%20Safia"> Ousama Abu Safia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, the performance and quality of Voice over IP (VoIP) calls carried over a Mobile Ad Hoc Network (MANET) which has a number of SIP nodes registered on a SIP Proxy are analyzed. The testing campaigns are carried out in an indoor corridor structure having a well-defined channel’s characteristics and model for the different voice codecs, G.711, G.727 and G.723.1. These voice codecs are commonly used in VoIP technology. The calls’ quality are evaluated using four Quality of Service (QoS) metrics, namely, mean opinion score (MOS), jitter, delay, and packet loss. The relationship between the wireless channel’s parameters and the optimum codec is well-established. According to the experimental results, the voice codec G.711 has the best performance for the proposed MANET topology <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20channel%20modelling" title="wireless channel modelling">wireless channel modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=Voip" title=" Voip"> Voip</a>, <a href="https://publications.waset.org/abstracts/search?q=MANET" title=" MANET"> MANET</a>, <a href="https://publications.waset.org/abstracts/search?q=session%20initiation%20protocol%20%28SIP%29" title=" session initiation protocol (SIP)"> session initiation protocol (SIP)</a>, <a href="https://publications.waset.org/abstracts/search?q=QoS" title=" QoS"> QoS</a> </p> <a href="https://publications.waset.org/abstracts/74102/voice-over-ip-quality-of-service-evaluation-for-mobile-ad-hoc-network-in-an-indoor-environment-for-different-voice-codecs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74102.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">227</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">452</span> On the Market Prospects of Long-Term Electricity Storages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reinhard%20Haas">Reinhard Haas</a>, <a href="https://publications.waset.org/abstracts/search?q=Amela%20Ajanovic"> Amela Ajanovic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years especially electricity generation from intermittent sources like wind and solar has increased remarkably. To balance electricity supply over time calls for storages has been launched. Because intermittency also exists over longer periods – months, years, especially the need for long-term electricity storages is discussed. The major conclusions of our analysis are: (i) Despite many calls for a prophylactic construction of new storage capacities with respect to all centralized long-term storage technologies the future perspectives will be much less promising than currently indicated in several papers and discussions; (ii) new long term hydro storages will not become economically attractive in general in the next decades; however, daily storages will remain the cheapest option and the most likely to be competitive; (iii) For PtG-technologies it will also become very hard to compete in the electricity markets despite a high technological learning potential. Yet, for hydrogen and methane there are prospects for use in the transport sector. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=storages" title="storages">storages</a>, <a href="https://publications.waset.org/abstracts/search?q=electricity%20markets" title=" electricity markets"> electricity markets</a>, <a href="https://publications.waset.org/abstracts/search?q=power-to-gas" title=" power-to-gas"> power-to-gas</a>, <a href="https://publications.waset.org/abstracts/search?q=hydro%20pump%20storages" title=" hydro pump storages"> hydro pump storages</a>, <a href="https://publications.waset.org/abstracts/search?q=economics" title=" economics"> economics</a> </p> <a href="https://publications.waset.org/abstracts/18255/on-the-market-prospects-of-long-term-electricity-storages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18255.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">484</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">451</span> A Holistic Analysis of the Emergency Call: From in Situ Negotiation to Policy Frameworks and Back</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jo%20Angouri">Jo Angouri</a>, <a href="https://publications.waset.org/abstracts/search?q=Charlotte%20Kennedy"> Charlotte Kennedy</a>, <a href="https://publications.waset.org/abstracts/search?q=Shawnea%20Ting"> Shawnea Ting</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Rawlinson"> David Rawlinson</a>, <a href="https://publications.waset.org/abstracts/search?q=Matthew%20Booker"> Matthew Booker</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigel%20Rees"> Nigel Rees</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ambulance services need to balance the large volume of emergency (999 in the UK) calls they receive (e.g., West Midlands Ambulance Service reports per day about 4,000 999 calls; about 679,000 calls per year are received in Wales), with dispatching limited resource for on-site intervention to the most critical cases. The process by which Emergency Medical Dispatch (EMD) decisions are made is related to risk assessment and involves the caller and call-taker as well as clinical teams negotiating risk levels on a case-by-case basis. Medical Priority Dispatch System (MPDS – also referred to as Advanced Medical Priority Dispatch System AMPDS) are used in the UK by NHS Trusts (e.,g WAST) to process and prioritise 999 calls. MPDS / AMPDS provide structured protocols for call prioritisation and call management. Protocols/policy frameworks have not been examined before in the way we propose in our project. In more detail, the risk factors that play a role in the EMD negotiation between the caller and call-taker have been analysed in both medical and social science research. Research has focused on the structural, morphological and phonological aspects that could improve, and train, human-to-human interaction or automate risk detection, as well as the medical factors that need to be captured from the caller to inform the dispatch decision. There are two significant gaps in our knowledge that we address in our work: 1. the role of backstage clinical teams in translating the caller/call-taker interaction in their internal risk negotiation and, 2. the role of policy frameworks, protocols and regulations in the framing of institutional priorities and resource allocation. We take a multi method approach and combine the analysis of 999 calls with the analysis of policy documents. We draw on interaction analysis, corpus methodologies and thematic analysis. In this paper, we report on our preliminary findings and focus in particular on the risk factors we have identified and the relationship with the regulations that create the frame within which teams operate. We close the paper with implications of our study for providing evidence-based policy intervention and recommendations for further research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emergency%20%28999%29%20call" title="emergency (999) call">emergency (999) call</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction%20analysis" title=" interaction analysis"> interaction analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=discourse%20analysis" title=" discourse analysis"> discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=ambulance%20dispatch" title=" ambulance dispatch"> ambulance dispatch</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20discourse" title=" medical discourse"> medical discourse</a> </p> <a href="https://publications.waset.org/abstracts/168977/a-holistic-analysis-of-the-emergency-call-from-in-situ-negotiation-to-policy-frameworks-and-back" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168977.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">450</span> A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoqing%20Wang">Xiaoqing Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Junfeng%20Wang"> Junfeng Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaolan%20Zhu"> Xiaolan Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=API%20Calls" title=" API Calls"> API Calls</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=permissions%20combination" title=" permissions combination"> permissions combination</a> </p> <a href="https://publications.waset.org/abstracts/51217/a-static-android-malware-detection-based-on-actual-used-permissions-combination-and-api-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51217.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">329</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">449</span> Hidden Hot Spots: Identifying and Understanding the Spatial Distribution of Crime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lauren%20C.%20Porter">Lauren C. Porter</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Curtis"> Andrew Curtis</a>, <a href="https://publications.waset.org/abstracts/search?q=Eric%20Jefferis"> Eric Jefferis</a>, <a href="https://publications.waset.org/abstracts/search?q=Susanne%20Mitchell"> Susanne Mitchell</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A wealth of research has been generated examining the variation in crime across neighborhoods. However, there is also a striking degree of crime concentration within neighborhoods. A number of studies show that a small percentage of street segments, intersections, or addresses account for a large portion of crime. Not surprisingly, a focus on these crime hot spots can be an effective strategy for reducing community level crime and related ills, such as health problems. However, research is also limited in an important respect. Studies tend to use official data to identify hot spots, such as 911 calls or calls for service. While the use of call data may be more representative of the actual level and distribution of crime than some other official measures (e.g. arrest data), call data still suffer from the 'dark figure of crime.' That is, there is most certainly a degree of error between crimes that occur versus crimes that are reported to the police. In this study, we present an alternative method of identifying crime hot spots, that does not rely on official data. In doing so, we highlight the potential utility of neighborhood-insiders to identify and understand crime dynamics within geographic spaces. Specifically, we use spatial video and geo-narratives to record the crime insights of 36 police, ex-offenders, and residents of a high crime neighborhood in northeast Ohio. Spatial mentions of crime are mapped to identify participant-identified hot spots, and these are juxtaposed with calls for service (CFS) data. While there are bound to be differences between these two sources of data, we find that one location, in particular, a corner store, emerges as a hot spot for all three groups of participants. Yet it does not emerge when we examine CFS data. A closer examination of the space around this corner store and a qualitative analysis of narrative data reveal important clues as to why this store may indeed be a hot spot, but not generate disproportionate calls to the police. In short, our results suggest that researchers who rely solely on official data to study crime hot spots may risk missing some of the most dangerous places. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime" title="crime">crime</a>, <a href="https://publications.waset.org/abstracts/search?q=narrative" title=" narrative"> narrative</a>, <a href="https://publications.waset.org/abstracts/search?q=video" title=" video"> video</a>, <a href="https://publications.waset.org/abstracts/search?q=neighborhood" title=" neighborhood"> neighborhood</a> </p> <a href="https://publications.waset.org/abstracts/76986/hidden-hot-spots-identifying-and-understanding-the-spatial-distribution-of-crime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76986.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">238</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">448</span> An Observational Study Assessing the Baseline Communication Behaviors among Healthcare Professionals in an Inpatient Setting in Singapore</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pin%20Yu%20Chen">Pin Yu Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Puay%20Chuan%20Lee"> Puay Chuan Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu%20Jen%20Loo"> Yu Jen Loo</a>, <a href="https://publications.waset.org/abstracts/search?q=Ju%20Xia%20Zhang"> Ju Xia Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Deborah%20Teo"> Deborah Teo</a>, <a href="https://publications.waset.org/abstracts/search?q=Jack%20Wei%20Chieh%20Tan"> Jack Wei Chieh Tan</a>, <a href="https://publications.waset.org/abstracts/search?q=Biauw%20Chi%20Ong"> Biauw Chi Ong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Synchronous communication, such as telephone calls, remains the standard communication method between nurses and other healthcare professionals in Singapore public hospitals despite advances in asynchronous technological platforms, such as instant messaging. Although miscommunication is one of the most common causes of lapses in patient care, there is a scarcity of research characterizing baseline inter-professional healthcare communications in a hospital setting due to logistic difficulties. Objective: This study aims to characterize the frequency and patterns of communication behaviours among healthcare professionals. Methods: The one-week observational study was conducted on Monday through Sunday at the nursing station of a cardiovascular medicine and cardiothoracic surgery inpatient ward at the National Heart Centre Singapore. Subjects were shadowed by two physicians for sixteen hours or consecutive morning and afternoon nursing shifts. Communications were logged and characterized by type, duration, caller, and recipient. Results: A total of 1,023 communication events involving the attempted use of the common telephones at the nursing station were logged over a period of one week, corresponding to a frequency of one event every 5.45 minutes (SD 6.98, range 0-56 minutes). Nurses initiated the highest proportion of outbound calls (38.7%) via the nursing station common phone. A total of 179 face-to-face communications (17.5%), 362 inbound calls (35.39%), 481 outbound calls (47.02%), and 1 emergency alert (0.10%) were captured. Average response time for task-oriented communications was 159 minutes (SD 387.6, range 86-231). Approximately 1 in 3 communications captured aimed to clarify patient-related information. The total duration of time spent on synchronous communication events over one week, calculated from total inbound and outbound calls, was estimated to be a total of 7 hours. Conclusion: The results of our study showed that there is a significant amount of time spent on inter-professional healthcare communications via synchronous channels. Integration of patient-related information and use of asynchronous communication channels may help to reduce the redundancy of communications and clarifications. Future studies should explore the use of asynchronous mobile platforms to address the inefficiencies observed in healthcare communications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=healthcare%20communication" title="healthcare communication">healthcare communication</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare%20management" title=" healthcare management"> healthcare management</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing" title=" nursing"> nursing</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20observational%20study" title=" qualitative observational study"> qualitative observational study</a> </p> <a href="https://publications.waset.org/abstracts/93226/an-observational-study-assessing-the-baseline-communication-behaviors-among-healthcare-professionals-in-an-inpatient-setting-in-singapore" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93226.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">447</span> An AI Based Smart Conference Calling System Using Bluetooth Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ankita%20Dixit">Ankita Dixit</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A conference call using a mobile refers to a telephonic call in which several people talks to each other simultaneously. This is one of the most eminent features nowadays. This concept is already existing using LTE technology for mobile phones supporting SIM cards. Hence, currently, a conference call is possible only with the support of a SIM card, i.e., a Mobile operator. Bluetooth is a short-range wireless technology that is used for exchanging data between devices placed over short distances (up to 240 meters). This is a booming technology that is easily and freely available and has no dependency on network operators. Our study work proposes a smart system to enable conference calls with more than two mobile users without SIM support to communicate with each other simultaneously. The AI-based proposed solution will be self–governed, self-learned and will be intelligent enough to smartly switch between all callers connected via Bluetooth in a conference call. This proposed solution system will greatly increase the potential of using Bluetooth technology from a wider applicability perspective of conference calls, which is currently only possible over LTE mobiles. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conference%20call" title="conference call">conference call</a>, <a href="https://publications.waset.org/abstracts/search?q=bluetooth" title=" bluetooth"> bluetooth</a>, <a href="https://publications.waset.org/abstracts/search?q=AI" title=" AI"> AI</a>, <a href="https://publications.waset.org/abstracts/search?q=frequency%20hopping" title=" frequency hopping"> frequency hopping</a>, <a href="https://publications.waset.org/abstracts/search?q=piconet" title=" piconet"> piconet</a>, <a href="https://publications.waset.org/abstracts/search?q=scatter%20net" title=" scatter net"> scatter net</a> </p> <a href="https://publications.waset.org/abstracts/168925/an-ai-based-smart-conference-calling-system-using-bluetooth-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168925.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">446</span> Stock Price Prediction with &#039;Earnings&#039; Conference Call Sentiment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sungzoon%20Cho">Sungzoon Cho</a>, <a href="https://publications.waset.org/abstracts/search?q=Hye%20Jin%20Lee"> Hye Jin Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Sungwhan%20Jeon"> Sungwhan Jeon</a>, <a href="https://publications.waset.org/abstracts/search?q=Dongyoung%20Min"> Dongyoung Min</a>, <a href="https://publications.waset.org/abstracts/search?q=Sungwon%20Lyu"> Sungwon Lyu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Major public corporations worldwide use conference calls to report their quarterly earnings. These 'earnings' conference calls allow for questions from stock analysts. We investigated if it is possible to identify sentiment from the call script and use it to predict stock price movement. We analyzed call scripts from six companies, two each from Korea, China and Indonesia during six years 2011Q1 – 2017Q2. Random forest with Frequency-based sentiment scores using Loughran MacDonald Dictionary did better than control model with only financial indicators. When the stock prices went up 20 days from earnings release, our model predicted correctly 77% of time. When the model predicted 'up,' actual stock prices went up 65% of time. This preliminary result encourages us to investigate advanced sentiment scoring methodologies such as topic modeling, auto-encoder, and word2vec variants. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=earnings%20call%20script" title="earnings call script">earnings call script</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forest" title=" random forest"> random forest</a>, <a href="https://publications.waset.org/abstracts/search?q=sentiment%20analysis" title=" sentiment analysis"> sentiment analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=stock%20price%20prediction" title=" stock price prediction"> stock price prediction</a> </p> <a href="https://publications.waset.org/abstracts/86655/stock-price-prediction-with-earnings-conference-call-sentiment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">445</span> Lessons Learned from Implementation of Remote Pregnant and Newborn Care Service for Vulnerable Women and Children During COVID-19 and Political Crisis in Myanmar</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wint%20Wint%20Thu">Wint Wint Thu</a>, <a href="https://publications.waset.org/abstracts/search?q=Htet%20Ko%20Ko%20Win"> Htet Ko Ko Win</a>, <a href="https://publications.waset.org/abstracts/search?q=Myat%20Mon%20San"> Myat Mon San</a>, <a href="https://publications.waset.org/abstracts/search?q=Zaw%20Lin%20Tun"> Zaw Lin Tun</a>, <a href="https://publications.waset.org/abstracts/search?q=Nandar%20Than%20Aye"> Nandar Than Aye</a>, <a href="https://publications.waset.org/abstracts/search?q=Khin%20Nyein%20Myat"> Khin Nyein Myat</a>, <a href="https://publications.waset.org/abstracts/search?q=Hayman%20Nyo%20Oo"> Hayman Nyo Oo</a>, <a href="https://publications.waset.org/abstracts/search?q=Nay%20Aung%20Lin"> Nay Aung Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Kusum%20Thapa"> Kusum Thapa</a>, <a href="https://publications.waset.org/abstracts/search?q=Kyaw%20Htet%20Aung"> Kyaw Htet Aung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: In Myanmar, the intense political instability happened to start in Feb-2021, while the COVID-19 pandemic waves are also threatening the public health system, which subsequently led to severe health sector crisis, including difficulties in accessing maternal and newborn health care for vulnerable women and children. The Remote Pregnant and Newborn Care (RPNC) uses a telehealth approach United States Agency for International Development (USAID)-funded Essential Health Project. Implementation: The Remote Pregnant and Newborn Care (RPNC) service has adapted to the MNCH needs of vulnerable pregnant women and was implemented to mitigate the risk of limited access to essential quality MNH care in Yangon, Myanmar, under women, and the project trained 13 service providers on a telehealth care package for pregnancy and newborn developed Jhpiego to ensure understanding of evidence-based MNCH care practices. The phone numbers of the pregnant women were gathered through the preexisting and functioning community volunteers, who reach the most vulnerable pregnant women in the project's targeted area. A total of 212 pregnant women have been reached by service providers for RPNC during the implementation period. The trained service providers offer quality antenatal and postnatal care, including newborn care, via telephone calls. It includes 24/7 incoming calls and time-allotted outgoing calls to the pregnant women during antenatal and postnatal periods, including the newborn care. The required data were collected daily in time with the calls, and the quality of the medical services is made assured with the track of the calls, ensuring data privacy and patient confidentiality. Lessons learned: The key lessons are 1) cost-effectiveness: RPNC service could reduce out of pocket expenditure of pregnant women as it only costs 1.6 United States dollars (USD) per one telehealth call while it costs 8 to 10 USD per one time in-person care service at private service providers, including transportation cost, 2) network of care: telehealth call could not replace the in-person antenatal and postnatal care services, and integration of telehealth calls with in-person care by local healthcare providers with the support of the community is crucial for accessibility to essential MNH services by poor and vulnerable women, and 3) sharing information on health access points: most of the women seem to have financial barriers in accessing private health facilities while public health system collapse and telehealthcare could provide information on low-cost facilities and connect women to relevant health facilities. These key lessons are important for future efforts regarding the implementation of remote pregnancy and newborn care in Myanmar, especially during the political crisis and COVID-19 pandemic situation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=telehealth" title="telehealth">telehealth</a>, <a href="https://publications.waset.org/abstracts/search?q=accessibility" title=" accessibility"> accessibility</a>, <a href="https://publications.waset.org/abstracts/search?q=maternal%20care" title=" maternal care"> maternal care</a>, <a href="https://publications.waset.org/abstracts/search?q=newborn%20care" title=" newborn care"> newborn care</a> </p> <a href="https://publications.waset.org/abstracts/149171/lessons-learned-from-implementation-of-remote-pregnant-and-newborn-care-service-for-vulnerable-women-and-children-during-covid-19-and-political-crisis-in-myanmar" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149171.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">101</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">444</span> Analytical Validity Of A Tech Transfer Solution To Internalize Genetic Testing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lesley%20Northrop">Lesley Northrop</a>, <a href="https://publications.waset.org/abstracts/search?q=Justin%20DeGrazia"> Justin DeGrazia</a>, <a href="https://publications.waset.org/abstracts/search?q=Jessica%20Greenwood"> Jessica Greenwood</a> </p> <p class="card-text"><strong>Abstract:</strong></p> ASPIRA Labs now offers an en-suit and ready-to-implement technology transfer solution to enable labs and hospitals that lack the resources to build it themselves to offer in-house genetic testing. This unique platform employs a patented Molecular Inversion Probe (MIP) technology that combines the specificity of a hybrid capture protocol with the ease of an amplicon-based protocol and utilizes an advanced bioinformatics analysis pipeline based on machine learning. To demonstrate its efficacy, two independent genetic tests were validated on this technology transfer platform: expanded carrier screening (ECS) and hereditary cancer testing (HC). The analytical performance of ECS and HC was validated separately in a blinded manner for calling three different types of variants: SNVs, short indels (typically, <50 bp), and large indels/CNVs defined as multi-exonic del/dup events. The reference set was constructed using samples from Coriell Institute, an external clinical genetic testing laboratory, Maine Molecular Quality Controls Inc. (MMQCI), SeraCare and GIAB Consortium. Overall, the analytical performance showed a sensitivity and specificity of >99.4% for both ECS and HC in detecting SNVs. For indels, both tests reported specificity of 100%, and ECS demonstrated a sensitivity of 100%, whereas HC exhibited a sensitivity of 96.5%. The bioinformatics pipeline also correctly called all reference CNV events resulting in a sensitivity of 100% for both tests. No additional calls were made in the HC panel, leading to a perfect performance (specificity and F-measure of 100%). In the carrier panel, however, three additional positive calls were made outside the reference set. Two of these calls were confirmed using an orthogonal method and were re-classified as true positives leaving only one false positive. The pipeline also correctly identified all challenging carrier statuses, such as positive cases for spinal muscular atrophy and alpha-thalassemia, resulting in 100% sensitivity. After confirmation of additional positive calls via long-range PCR and MLPA, specificity for such cases was estimated at 99%. These performance metrics demonstrate that this tech-transfer solution can be confidently internalized by clinical labs and hospitals to offer mainstream ECS and HC as part of their test catalog, substantially increasing access to quality germline genetic testing for labs of all sizes and resources levels. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=clinical%20genetics" title="clinical genetics">clinical genetics</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20testing" title=" genetic testing"> genetic testing</a>, <a href="https://publications.waset.org/abstracts/search?q=molecular%20genetics" title=" molecular genetics"> molecular genetics</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20transfer" title=" technology transfer"> technology transfer</a> </p> <a href="https://publications.waset.org/abstracts/139070/analytical-validity-of-a-tech-transfer-solution-to-internalize-genetic-testing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139070.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">443</span> Convectory Policing-Reconciling Historic and Contemporary Models of Police Service Delivery</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mark%20Jackson">Mark Jackson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Description: This paper is based on an theoretical analysis of the efficacy of the dominant model of policing in western jurisdictions. Those results are then compared with a similar analysis of a traditional reactive model. It is found that neither model provides for optimal delivery of services. Instead optimal service can be achieved by a synchronous hybrid model, termed the Convectory Policing approach. Methodology and Findings: For over three decades problem oriented policing (PO) has been the dominant model for western police agencies. Initially based on the work of Goldstein during the 1970s the problem oriented framework has spawned endless variants and approaches, most of which embrace a problem solving rather than a reactive approach to policing. This has included the Area Policing Concept (APC) applied in many smaller jurisdictions in the USA, the Scaled Response Policing Model (SRPM) currently under trial in Western Australia and the Proactive Pre-Response Approach (PPRA) which has also seen some success. All of these, in some way or another, are largely based on a model that eschews a traditional reactive model of policing. Convectory Policing (CP) is an alternative model which challenges the underpinning assumptions which have seen proliferation of the PO approach in the last three decades and commences by questioning the economics on which PO is based. It is argued that in essence, the PO relies on an unstated, and often unrecognised assumption that resources will be available to meet demand for policing services, while at the same time maintaining the capacity to deploy staff to develop solutions to the problems which were ultimately manifested in those same calls for service. The CP model relies on the observations from a numerous western jurisdictions to challenge the validity of that underpinning assumption, particularly in fiscally tight environment. In deploying staff to pursue and develop solutions to underpinning problems, there is clearly an opportunity cost. Those same staff cannot be allocated to alternative duties while engaged in a problem solution role. At the same time, resources in use responding to calls for service are unavailable, while committed to that role, to pursue solutions to the problems giving rise to those same calls for service. The two approaches, reactive and PO are therefore dichotomous. One cannot be optimised while the other is being pursued. Convectory Policing is a pragmatic response to the schism between the competing traditional and contemporary models. If it is not possible to serve either model with any real rigour, it becomes necessary to taper an approach to deliver specific outcomes against which success or otherwise might be measured. CP proposes that a structured roster-driven approach to calls for service, combined with the application of what is termed a resource-effect response capacity has the potential to resolve the inherent conflict between traditional and models of policing and the expectations of the community in terms of community policing based problem solving models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=policing" title="policing">policing</a>, <a href="https://publications.waset.org/abstracts/search?q=reactive" title=" reactive"> reactive</a>, <a href="https://publications.waset.org/abstracts/search?q=proactive" title=" proactive"> proactive</a>, <a href="https://publications.waset.org/abstracts/search?q=models" title=" models"> models</a>, <a href="https://publications.waset.org/abstracts/search?q=efficacy" title=" efficacy"> efficacy</a> </p> <a href="https://publications.waset.org/abstracts/24672/convectory-policing-reconciling-historic-and-contemporary-models-of-police-service-delivery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24672.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">483</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">442</span> Environment-Specific Political Risk Discourse, Environmental Reputation, and Stock Price Crash Risk</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sohanur%20Rahman">Sohanur Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Elisabeth%20Sinnewe"> Elisabeth Sinnewe</a>, <a href="https://publications.waset.org/abstracts/search?q=Larelle%20%28Ellie%29%E2%80%AFChapple"> Larelle (Ellie) Chapple</a>, <a href="https://publications.waset.org/abstracts/search?q=Sarah%20Osborne"> Sarah Osborne</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Greater political attention to global climate change exposes firms to a higher level of political uncertainty, which can lead to adverse capital market consequences. However, a higher level of discourse on environment-specific political risk (EPR) between management and investors can mitigate information asymmetry, followed by less stock price crash risk. This study examines whether EPR discourse in discourse in the earnings conference calls (ECC) reduces firm-level stock price crash risk in the US market. This research also explores if adverse disclosures via media channels further moderates the association between EPR on crash risk. Employing a dataset of 28,933 firm-year observations from 2002 to 2020, the empirical analysis reveals that EPR discourse in ECC reduces future stock price crash risk. However, adverse disclosures via media channels can offset the favourable effect of EPR discourse on crash risk. The results are robust to the potential endogeneity concern in a quasi-natural experiment setting. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=earnings%20conference%20calls" title="earnings conference calls">earnings conference calls</a>, <a href="https://publications.waset.org/abstracts/search?q=environment" title=" environment"> environment</a>, <a href="https://publications.waset.org/abstracts/search?q=environment-specific%20political%20risk%20discourse" title=" environment-specific political risk discourse"> environment-specific political risk discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20disclosures" title=" environmental disclosures"> environmental disclosures</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20asymmetry" title=" information asymmetry"> information asymmetry</a>, <a href="https://publications.waset.org/abstracts/search?q=reputation%20risk" title=" reputation risk"> reputation risk</a>, <a href="https://publications.waset.org/abstracts/search?q=stock%20price%20crash%20risk" title=" stock price crash risk"> stock price crash risk</a> </p> <a href="https://publications.waset.org/abstracts/152590/environment-specific-political-risk-discourse-environmental-reputation-and-stock-price-crash-risk" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152590.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">441</span> Corporate Governance Reforms in a Developing Economy: Making a Case for Upstream and Downstream Interventions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Franklin%20Nakpodia">Franklin Nakpodia</a>, <a href="https://publications.waset.org/abstracts/search?q=Femi%20Olan"> Femi Olan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A blend of internal factors (firm performance, internal stakeholders) and external pressures (globalisation, technology, corporate scandals) have intensified calls for corporate governance reforms. While several countries and their governments have responded to these calls, the effect of such reforms on corporate governance systems across countries remains mixed. In particular, the literature reports that the effectiveness of corporate governance interventions in many developing economies is limited. Relying on the corporate governance system in Africa’s largest economy (Nigeria), this research addresses two issues. First, this study explores why previous corporate governance reforms have failed and second, the article investigates what reforms could improve corporate governance practices in the country. In addressing the above objectives, this study adopts a qualitative approach that permits data collection via semi-structured interviews with 21 corporate executives. The data supports the articulation of two sequential levels of reforms (i.e., the upstream and downstream reforms). The upstream reforms focus on two crucial but often overlooked areas that undermine reform effectiveness, i.e., the extent of government commitment and an enabling environment. The downstream reforms combine awareness and regulatory elements to proffer a path to robust corporate governance in the country. Furthermore, findings from this study stress the need to consider the use of a bottom-up approach to corporate governance practice and policymaking in place of the dominant top-down strategy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bottom-up%20approach" title="bottom-up approach">bottom-up approach</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance" title=" corporate governance"> corporate governance</a>, <a href="https://publications.waset.org/abstracts/search?q=reforms" title=" reforms"> reforms</a>, <a href="https://publications.waset.org/abstracts/search?q=regulation" title=" regulation"> regulation</a> </p> <a href="https://publications.waset.org/abstracts/139257/corporate-governance-reforms-in-a-developing-economy-making-a-case-for-upstream-and-downstream-interventions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139257.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">201</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=15">15</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=16">16</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spying%20on%20calls&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10