CINXE.COM

Search results for: intrusion prevention

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: intrusion prevention</title> <meta name="description" content="Search results for: intrusion prevention"> <meta name="keywords" content="intrusion prevention"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="intrusion prevention" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="intrusion prevention"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1759</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: intrusion prevention</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1519</span> Evaluation of the Trauma System in a District Hospital Setting in Ireland</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmeda%20Ali">Ahmeda Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Mary%20Codd"> Mary Codd</a>, <a href="https://publications.waset.org/abstracts/search?q=Susan%20Brundage"> Susan Brundage</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Importance: This research focuses on devising and improving Health Service Executive (HSE) policy and legislation and therefore improving patient trauma care and outcomes in Ireland. Objectives: The study measures components of the Trauma System in the district hospital setting of the Cavan/Monaghan Hospital Group (CMHG), HSE, Ireland, and uses the collected data to identify the strengths and weaknesses of the CMHG Trauma System organisation, to include governance, injury data, prevention and quality improvement, scene care and facility-based care, and rehabilitation. The information will be made available to local policy makers to provide objective situational analysis to assist in future trauma service planning and service provision. Design, setting and participants: From 28 April to May 28, 2016 a cross-sectional survey using World Health Organisation (WHO) Trauma System Assessment Tool (TSAT) was conducted among healthcare professionals directly involved in the level III trauma system of CMHG. Main outcomes: Identification of the strengths and weaknesses of the Trauma System of CMHG. Results: The participants who reported inadequate funding for pre hospital (62.3%) and facility based trauma care at CMHG (52.5%) were high. Thirty four (55.7%) respondents reported that a national trauma registry (TARN) exists but electronic health records are still not used in trauma care. Twenty one respondents (34.4%) reported that there are system wide protocols for determining patient destination and adequate, comprehensive legislation governing the use of ambulances was enforced, however, there is a lack of a reliable advisory service. Over 40% of the respondents reported uncertainty of the injury prevention programmes available in Ireland; as well as the allocated government funding for injury and violence prevention. Conclusions: The results of this study contributed to a comprehensive assessment of the trauma system organisation. The major findings of the study identified three fundamental areas: the inadequate funding at CMHG, the QI techniques and corrective strategies used, and the unfamiliarity of existing prevention strategies. The findings direct the need for further research to guide future development of the trauma system at CMHG (and in Ireland as a whole) in order to maximise best practice and to improve functional and life outcomes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trauma" title="trauma">trauma</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=management" title=" management"> management</a>, <a href="https://publications.waset.org/abstracts/search?q=system" title=" system"> system</a> </p> <a href="https://publications.waset.org/abstracts/56211/evaluation-of-the-trauma-system-in-a-district-hospital-setting-in-ireland" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56211.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">243</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1518</span> Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yunyong%20Guo">Yunyong Guo</a>, <a href="https://publications.waset.org/abstracts/search?q=Man%20Wang"> Man Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Bryan%20Guo"> Bryan Guo</a>, <a href="https://publications.waset.org/abstracts/search?q=Nathan%20Guo"> Nathan Guo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud" title="cloud">cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=enhancing%20security" title=" enhancing security"> enhancing security</a>, <a href="https://publications.waset.org/abstracts/search?q=fog" title=" fog"> fog</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=telehealth" title=" telehealth"> telehealth</a> </p> <a href="https://publications.waset.org/abstracts/177377/enhancing-security-and-privacy-protocols-in-telehealth-a-comprehensive-approach-across-iotfogcloud-environments" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177377.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1517</span> Effects of Using a Recurrent Adverse Drug Reaction Prevention Program on Safe Use of Medicine among Patients Receiving Services at the Accident and Emergency Department of Songkhla Hospital Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Thippharat%20Wongsilarat">Thippharat Wongsilarat</a>, <a href="https://publications.waset.org/abstracts/search?q=Parichat%20tuntilanon"> Parichat tuntilanon</a>, <a href="https://publications.waset.org/abstracts/search?q=Chonlakan%20Prataksitorn"> Chonlakan Prataksitorn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recurrent adverse drug reactions are harmful to patients with mild to fatal illnesses, and affect not only patients but also their relatives, and organizations. To compare safe use of medicine among patients before and after using the recurrent adverse drug reaction prevention program . Quasi-experimental research with the target population of 598 patients with drug allergy history. Data were collected through an observation form tested for its validity by three experts (IOC = 0.87), and analyzed with a descriptive statistic (percentage). The research was conducted jointly with a multidisciplinary team to analyze and determine the weak points and strong points in the recurrent adverse drug reaction prevention system during the past three years, and 546, 329, and 498 incidences, respectively, were found. Of these, 379, 279, and 302 incidences, or 69.4; 84.80; and 60.64 percent of the patients with drug allergy history, respectively, were found to have caused by incomplete warning system. In addition, differences in practice in caring for patients with drug allergy history were found that did not cover all the steps of the patient care process, especially a lack of repeated checking, and a lack of communication between the multidisciplinary team members. Therefore, the recurrent adverse drug reaction prevention program was developed with complete warning points in the information technology system, the repeated checking step, and communication among related multidisciplinary team members starting from the hospital identity card room, patient history recording officers, nurses, physicians who prescribe the drugs, and pharmacists. Including in the system were surveillance, nursing, recording, and linking the data to referring units. There were also training concerning adverse drug reactions by pharmacists, monthly meetings to explain the process to practice personnel, creating safety culture, random checking of practice, motivational encouragement, supervising, controlling, following up, and evaluating the practice. The rate of prescribing drugs to which patients were allergic per 1,000 prescriptions was 0.08, and the incidence rate of recurrent drug reaction per 1,000 prescriptions was 0. Surveillance of recurrent adverse drug reactions covering all service providing points can ensure safe use of medicine for patients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=recurrent%20drug" title="recurrent drug">recurrent drug</a>, <a href="https://publications.waset.org/abstracts/search?q=adverse%20reaction" title=" adverse reaction"> adverse reaction</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=use%20of%20medicine" title=" use of medicine"> use of medicine</a> </p> <a href="https://publications.waset.org/abstracts/23441/effects-of-using-a-recurrent-adverse-drug-reaction-prevention-program-on-safe-use-of-medicine-among-patients-receiving-services-at-the-accident-and-emergency-department-of-songkhla-hospital-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23441.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">456</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1516</span> Benefit-Cost Analysis of Flood Management: a Case Study of Jammu and Kashmir</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kowser%20Ali%20Jan">Kowser Ali Jan</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Balaji"> R. Balaji</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A disaster hurts those affected. It also spares many in the affected areas, yet those spared may be indirectly affected. The analytical framework of prevention and coping has proved useful in many circumstances. Historically and currently, there has been limited quantitative information available on flood management in Jammu and Kashmir. This study focuses on the Cost-benefit Analysis (CBA) of flood management by District Disaster Management Kulgam, and the assessment is based on secondary pooled data collected from government offices, NGOs, published Journals, and local and national newspapers. It also described the scenario, the approach adopted, and the sources of flood damage cost information. The estimated total benefits account for 78686.18 lakh of rupees, and that of total costs account for 2218.75lakh of rupees. The Benefit-Cost ratio greater than one (>1) shows that Flood Management in District Kulgam was economically feasible and successfully managed. The State of Jammu and Kashmir takes essential prevention and management measures to bring down the damages due to floods to significant status. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cost-benefit%20analysis" title="cost-benefit analysis">cost-benefit analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=nature" title=" nature"> nature</a>, <a href="https://publications.waset.org/abstracts/search?q=flood%20management" title=" flood management"> flood management</a>, <a href="https://publications.waset.org/abstracts/search?q=disaster" title=" disaster"> disaster</a> </p> <a href="https://publications.waset.org/abstracts/138334/benefit-cost-analysis-of-flood-management-a-case-study-of-jammu-and-kashmir" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138334.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1515</span> The Use of Artificial Intelligence in the Prevention of Micro and Macrovascular Complications in Type Diabetic Patients in Low and Middle-Income Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebere%20Ellison%20Obisike">Ebere Ellison Obisike</a>, <a href="https://publications.waset.org/abstracts/search?q=Justina%20N.%20Adalikwu-Obisike"> Justina N. Adalikwu-Obisike</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Artificial intelligence (AI) is progressively transforming health and social care. With the rapid invention of various electronic devices, machine learning, and computing systems, the use of AI istraversing many health and social care practices. In this systematic review of journal and grey literature, this study explores how the applications of AI might promote the prevention of micro and macrovascular complications in type 1 diabetic patients. This review focuses on the use of a digitized blood glucose meter and the application of insulin pumps for the effective management of type 1 diabetes in low and middle-income countries. It is projected that the applications of AI may assist individuals with type 1 diabetes to monitor and control their blood glucose level and prevent the early onset of micro and macrovascular complications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=blood%20glucose%20meter" title=" blood glucose meter"> blood glucose meter</a>, <a href="https://publications.waset.org/abstracts/search?q=insulin%20pump" title=" insulin pump"> insulin pump</a>, <a href="https://publications.waset.org/abstracts/search?q=low%20and%20middle-income%20countries" title=" low and middle-income countries"> low and middle-income countries</a>, <a href="https://publications.waset.org/abstracts/search?q=micro%20and%20macrovascular%20complications" title=" micro and macrovascular complications"> micro and macrovascular complications</a>, <a href="https://publications.waset.org/abstracts/search?q=type%201%20diabetes" title=" type 1 diabetes"> type 1 diabetes</a> </p> <a href="https://publications.waset.org/abstracts/144434/the-use-of-artificial-intelligence-in-the-prevention-of-micro-and-macrovascular-complications-in-type-diabetic-patients-in-low-and-middle-income-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144434.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">196</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1514</span> Modeling and Simulation for Infection Processes of Bird Flu within a Poultry Farm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tertia%20Delia%20Nova">Tertia Delia Nova</a>, <a href="https://publications.waset.org/abstracts/search?q=Masaji%20Watanabge"> Masaji Watanabge</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Infection of bird flu within a poultry farm involves hosts, virus, and medium. Intrusion of bird flu into a poultry farm divides the population into two groups; healthy and susceptible chickens and infected chickens. A healthy and susceptible bird is infected to become an infected bird. Bird flu viruses spread among chickens through medium such as air and droppings, and increase in hosts. A model for an infection process of bird flu within a poultry farm is described, numerical techniques are illustrated, and numerical results are introduced. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bird%20flu" title="bird flu">bird flu</a>, <a href="https://publications.waset.org/abstracts/search?q=poultry%20farm" title=" poultry farm"> poultry farm</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20for%20an%20infection%20process" title=" model for an infection process"> model for an infection process</a>, <a href="https://publications.waset.org/abstracts/search?q=flu%20viruses" title=" flu viruses "> flu viruses </a> </p> <a href="https://publications.waset.org/abstracts/10493/modeling-and-simulation-for-infection-processes-of-bird-flu-within-a-poultry-farm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10493.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">256</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1513</span> Association of Vulnerability and Behavioural Outcomes of FSWs Linked with TI Prevention HIV Program: An Evidence from Cross-Sectional Behavioural Study in Thane District of Maharashtra</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jayanta%20Bora">Jayanta Bora</a>, <a href="https://publications.waset.org/abstracts/search?q=Sukhvinder%20Kaur"> Sukhvinder Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashok%20Agarwal"> Ashok Agarwal</a>, <a href="https://publications.waset.org/abstracts/search?q=Sangeeta%20Kaul"> Sangeeta Kaul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: It is important for targeted interventions to consider vulnerabilities of female sex workers (FSWs) such as poverty, work-related mobility and literacy for effective human immunodeficiency virus (HIV) prevention. This paper examines the association between vulnerability and behavioural outcomes among FSWs in Thane district, Maharashtra under USAID PHFI-PIPPSE project. Methods: Data were used from the Behavioural Tracking Survey, a cross-sectional behavioural study conducted in 2015 with 503 FSWs randomly selected from 12 TI-NGOs which were functioning and providing services to FSWs in Thane district prior to April 2014 in Thane district of Maharashtra. We have created the “vulnerability index”, a composite index of literacy, factors of dependence (alternative livelihood options, current debt), and aspects of sex work (mobility and duration in sex work) as a dependent variable. The key independent measures used were program exposure to intervention, service uptake, self-confidence, and self-identity. Bi-variate and multivariate logistic regressions were used to examine the study objectives. Results: A higher proportion of FSWs who were in the age-group 18–25 years from brothel/street /home/ lodge-based were categorized as highly vulnerable to HIV risk as compared to bar-based sex worker (74.1% versus 59.8%, P,0.002); regression analysis highlighted lower odds of vulnerability among FSWs who were aware of services and visited NGO clinic for medical check-up and counselling for STI [AOR= 0.092, 95% CI 0.018-0.460; P,0.004], However, lower odds of vulnerability on confident in supporting fellow sex worker in crisis [AOR= 0.601, 95% CI 0.476-0.758; P, 0.000] and were able to turn away clients when they refused to use a condom during sex [AOR= 0.524, 95% CI 0.342-0.802; P, 0.003]. Conclusion: The results highlight that FSWs associated with TIs and getting services are less vulnerable and highly empowered. As a result of behavioural change communication and other services provided by TIs, FSWs were able to successfully negotiate about condom use with their clients and manage solidarity in the crisis situation for fellow FSWs. Therefore, it is evident from study paper that TI prevention programs may transform the lives of masses considerably and may open a window of opportunity to infuse the information and awareness about HIV risk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=female%20sex%20worker" title="female sex worker">female sex worker</a>, <a href="https://publications.waset.org/abstracts/search?q=HIV%20prevention" title=" HIV prevention"> HIV prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=HIV%20service%20uptake" title=" HIV service uptake"> HIV service uptake</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/57908/association-of-vulnerability-and-behavioural-outcomes-of-fsws-linked-with-ti-prevention-hiv-program-an-evidence-from-cross-sectional-behavioural-study-in-thane-district-of-maharashtra" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57908.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">254</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1512</span> Psychology of Terrorism: Psychology of War </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saeed%20Wahass">Saeed Wahass</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism is a universal phenomenon. It is an enemy to the world and humanity, representing the most essential challenges facing developing and developed societies of the world. Terrorism is traumatically a major cause for death and disability. Developing societies are catastrophically suffering more in comparing to developed ones. Importantly, the terrorism may have been emigrated from developing societies; therefore, it cannot be appropriately explained/understood elsewhere. Developing societies have attempts for solutions. These attempts may have contributed somehow to either overcoming temporally terrorism or at least waterless its fountains. It appears these attempts are fallen on personal experiences/local endeavours related to the nature of those societies and cultures. The missing issue is the involvement of the applications of psychological theories for understanding terrorism as a phenomenon. However, terrorism is behaviour, like other behaviours, it can be explained, analysed and predicted while psychology is involved as the science of behaviour and mental process. Later than, solutions whatever they are (intervention/prevention) have to be born from the womb of psychological theories explaining/understanding terrorism. This paper is an endeavour to shed light on psychological theories which may present an explanation for terrorism, as a behavioural phenomenon, looking for the effective evidence-based interventions/prevention. An emphasis will be on the experiences of developing countries which may have made/incubated terrorism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychology" title="psychology">psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=humanity" title=" humanity"> humanity</a>, <a href="https://publications.waset.org/abstracts/search?q=developing%20societies" title=" developing societies"> developing societies</a> </p> <a href="https://publications.waset.org/abstracts/2269/psychology-of-terrorism-psychology-of-war" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2269.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">521</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1511</span> Geology and Geochemistry of the Paleozoic Basement, Western Algeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hadj%20Mohamed%20Nacera">Hadj Mohamed Nacera</a>, <a href="https://publications.waset.org/abstracts/search?q=Boutaleb%20Abdelhak"> Boutaleb Abdelhak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Hercynian granite in Western Algeria, has a typical high-K calc-alkaline evolution, with peraluminous trend U-Pb zircon geochronology yielded the minimum emplacement age of 297 ± 1 Ma. It shows dark microgranular enclaves, veins of pegmatite, aplite, tourmaline and quartz. The granite plutons selected for this study are formed during the late Variscian phase and intrudes the Lower Silurian metasediments which were affected by the major Hercynian folding phases. An important Quartz vein field cross-cutting metasedimentary and granitic rocks. Invisible gold occurs in a very small arsenopyrite minerals. The purpose of this study is to highlight the relationship between the gold mineralisation and the intrusion by combining petrographic and geochemic studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Algeria" title="Algeria">Algeria</a>, <a href="https://publications.waset.org/abstracts/search?q=basement" title=" basement"> basement</a>, <a href="https://publications.waset.org/abstracts/search?q=geochemestry" title=" geochemestry"> geochemestry</a>, <a href="https://publications.waset.org/abstracts/search?q=granite" title=" granite"> granite</a> </p> <a href="https://publications.waset.org/abstracts/45246/geology-and-geochemistry-of-the-paleozoic-basement-western-algeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45246.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1510</span> Strategies for Building Resilience of 15-Minute Community Life Circles From the Perspective of Infectious Diseases</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Siyuan%20Cai">Siyuan Cai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> COVID-19 has triggered the planning circles to think about how to improve the city's ability to respond to public health emergencies. From the perspective of the community, this article reviews the risk cases in Wuhan Chenjiadun Community and other communities under the epidemic, and analyzes the response to public health emergencies such as infectious disease outbreaks in the excellent cases of resilient epidemic prevention communities. Then, combined with the planning of the living circle, it demonstrates the necessity of integrating the concept of resilience into the 15-minute community living circle to make up for the shortcomings of infectious disease prevention. Finally, it is proposed to strictly control the source and tail of the epidemic in the layout of the living circle, daily health and epidemic emergency should be taken into account in planning, community medical resources should be decentralized in management, and the application of smart technologies in the planning of living circle should be fully emphasized, so as to improve the community's ability to respond to public health emergencies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pandemic" title="pandemic">pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=resilient%20cities" title=" resilient cities"> resilient cities</a>, <a href="https://publications.waset.org/abstracts/search?q=resilient%20community" title=" resilient community"> resilient community</a>, <a href="https://publications.waset.org/abstracts/search?q=15-minute%20community%20life%20circle" title=" 15-minute community life circle"> 15-minute community life circle</a> </p> <a href="https://publications.waset.org/abstracts/150086/strategies-for-building-resilience-of-15-minute-community-life-circles-from-the-perspective-of-infectious-diseases" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150086.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1509</span> Exploring CPTED&#039;s Role in Crime Reduction: An Effectiveness Study in the Urban Context of Khandagiri, Bhubaneswar using Structural Equation Modelling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mousumi%20Khandual">Mousumi Khandual</a>, <a href="https://publications.waset.org/abstracts/search?q=Amitt%20Chatterjee"> Amitt Chatterjee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to validate the dimensions of Crime Prevention Through Environmental Design (CPTED) and the corresponding indicators, this study investigates the contribution of CPTED to the reduction of crime in Khandagiri, Bhubaneswar. Four primary dimensions are the focus of the research: territoriality, natural surveillance, access control, and exterior maintenance. A scale was developed to access the CPTED construct, administered through on-site observation, expert opinions, and resident surveys involving 151 respondents from a typical residential area of Khandagiri, Bhubaneswar. Confirmatory Factor Analysis (CFA) using AMOS has been used to validate the dimensions and indicators, with the analysis testing both first-order and second-order models. The study highlights key factors contributing to the measurement of the CPTED construct, offering valuable insights for urban planners and policymakers. The findings showed that territoriality, access control, and external maintenance produced an index of a good fit, with the RMSEA value being less than 0.06 and the values of GFI, CFI, and TLI exceeding 0.90. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime%20prevention" title="crime prevention">crime prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=CFA" title=" CFA"> CFA</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20safety" title=" urban safety"> urban safety</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20design" title=" environmental design"> environmental design</a>, <a href="https://publications.waset.org/abstracts/search?q=built%20environment%20and%20crime" title=" built environment and crime"> built environment and crime</a> </p> <a href="https://publications.waset.org/abstracts/195400/exploring-cpteds-role-in-crime-reduction-an-effectiveness-study-in-the-urban-context-of-khandagiri-bhubaneswar-using-structural-equation-modelling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/195400.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">0</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1508</span> Harnessing Artificial Intelligence and Machine Learning for Advanced Fraud Detection and Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Avinash%20Malladhi">Avinash Malladhi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Forensic accounting is a specialized field that involves the application of accounting principles, investigative skills, and legal knowledge to detect and prevent fraud. With the rise of big data and technological advancements, artificial intelligence (AI) and machine learning (ML) algorithms have emerged as powerful tools for forensic accountants to enhance their fraud detection capabilities. In this paper, we review and analyze various AI/ML algorithms that are commonly used in forensic accounting, including supervised and unsupervised learning, deep learning, natural language processing Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Support Vector Machines (SVMs), Decision Trees, and Random Forests. We discuss their underlying principles, strengths, and limitations and provide empirical evidence from existing research studies demonstrating their effectiveness in detecting financial fraud. We also highlight potential ethical considerations and challenges associated with using AI/ML in forensic accounting. Furthermore, we highlight the benefits of these technologies in improving fraud detection and prevention in forensic accounting. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AI" title="AI">AI</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20accounting%20%26%20fraud%20detection" title=" forensic accounting &amp; fraud detection"> forensic accounting &amp; fraud detection</a>, <a href="https://publications.waset.org/abstracts/search?q=anti%20money%20laundering" title=" anti money laundering"> anti money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=Benford%27s%20law" title=" Benford&#039;s law"> Benford&#039;s law</a>, <a href="https://publications.waset.org/abstracts/search?q=fraud%20triangle%20theory" title=" fraud triangle theory"> fraud triangle theory</a> </p> <a href="https://publications.waset.org/abstracts/165809/harnessing-artificial-intelligence-and-machine-learning-for-advanced-fraud-detection-and-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165809.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1507</span> Detection of Biomechanical Stress for the Prevention of Disability Derived from Musculoskeletal Disorders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Leydi%20Noemi%20Peraza%20G%C3%B3mez">Leydi Noemi Peraza Gómez</a>, <a href="https://publications.waset.org/abstracts/search?q=Jose%20%C3%81lvarez%20Nemegyei"> Jose Álvarez Nemegyei</a>, <a href="https://publications.waset.org/abstracts/search?q=Damaris%20Francis%20Estrella%20Castillo"> Damaris Francis Estrella Castillo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to have an epidemiological tool to detect biomechanical stress (ERGO-Mex), which impose physical labor or recreational activities, a questionnaire is constructed in Spanish, validated and culturally adapted to the Mayan indigenous population of Yucatan. Through the seven steps proposed by Guillemin and Beaton the procedure was: initial translation, synthesis of the translations, feed back of the translation. After that review by a committee of experts, pre-test of the preliminary version, and presentation of the results to the committee of experts and members of the community. Finally the evaluation of its internal validity (Cronbach's α coefficient) and external (intraclass correlation coefficient). The results for the validation in Spanish indicated that 45% of the participants have biomechanical stress. The ERGO-Mex correlation was 0.69 (p <0.0001). Subjects with high biomechanical stress had a higher score than subjects with low biomechanical stress (17.4 ± 8.9 vs.9.8 ± 2.8, p = 0.003). The Cronbach's α coefficient was 0.92; and for validation in Cronbach's α maya it was 0.82 and CCI = 0.70 (95% CI: 0.58-0.79; p˂0.0001); ERGO-Mex is suitable for performing early detection of musculoskeletal diseases and helping to prevent disability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biomechanical%20stress" title="biomechanical stress">biomechanical stress</a>, <a href="https://publications.waset.org/abstracts/search?q=disability" title=" disability"> disability</a>, <a href="https://publications.waset.org/abstracts/search?q=musculoskeletal%20disorders" title=" musculoskeletal disorders"> musculoskeletal disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a> </p> <a href="https://publications.waset.org/abstracts/90466/detection-of-biomechanical-stress-for-the-prevention-of-disability-derived-from-musculoskeletal-disorders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90466.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">180</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1506</span> Anti-Scale Magnetic Method as a Prevention Method for Calcium Carbonate Scaling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maha%20Salman">Maha Salman</a>, <a href="https://publications.waset.org/abstracts/search?q=Gada%20Al-Nuwaibit"> Gada Al-Nuwaibit</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The effect of anti-scale magnetic method (AMM) in retarding scaling deposition is confirmed by many researchers, to result in new crystal morphology, the crystal which has the tendency to remain suspended more than precipitated. AMM is considered as an economic method when compared to other common methods used for scale prevention in desalination plant as acid treatment and addition of antiscalant. The current project was initiated to evaluate the effectiveness of AMM in preventing calcium carbonate scaling. The AMM was tested at different flow velocities (1.0, 0.5, 0.3, 0.1, and 0.003 m/s), different operating temperatures (50, 70, and 90°C), different feed pH and different magnetic field strength. The results showed that AMM was effective in retarding calcium carbonate scaling deposition, and the performance of AMM depends strongly on the flow velocity. The scaling retention time was found to be affected by the operating temperatures, flow velocity, and magnetic strength (MS), and in general, it was found that as the operating temperatures increased the effectiveness of the AMM in retarding calcium carbonate (CaCO₃) scaling increased. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=magnetic%20treatment" title="magnetic treatment">magnetic treatment</a>, <a href="https://publications.waset.org/abstracts/search?q=field%20strength" title=" field strength"> field strength</a>, <a href="https://publications.waset.org/abstracts/search?q=flow%20velocity" title=" flow velocity"> flow velocity</a>, <a href="https://publications.waset.org/abstracts/search?q=magnetic%20scale%20retention%20time" title=" magnetic scale retention time"> magnetic scale retention time</a> </p> <a href="https://publications.waset.org/abstracts/64230/anti-scale-magnetic-method-as-a-prevention-method-for-calcium-carbonate-scaling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">377</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1505</span> Communication Training about Depression and Suicide Prevention for Pharmacists: A Hungarian Pilot Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M%C3%B3nika%20Ditta%20T%C3%B3th">Mónika Ditta Tóth</a>, <a href="https://publications.waset.org/abstracts/search?q=%C3%81d%C3%A1m%20Fritz"> Ádám Fritz</a>, <a href="https://publications.waset.org/abstracts/search?q=Bal%C3%A1zs%20Hank%C3%B3"> Balázs Hankó</a>, <a href="https://publications.waset.org/abstracts/search?q=Gy%C3%B6rgy%20Purebl"> György Purebl</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communication training about depression and suicide prevention for pharmacists – A Hungarian pilot study Mónika Ditta Tóth1, Ádám Fritz2, Balázs Hankó2, György Purebl1 1: Semmelweis University, Institute of Behavioural Sciences 2: Semmelweis University, University Pharmacy Department of Pharmacy Administration Background: Suicide rates in Hungary have been one of the highest in the European Union. Depression is one of the main risk factors for suicide and recognizing and treating depression is an effective way to prevent suicidal behaviour. In their daily practice, pharmacists meet patients with high risk of mental health problems. Therefore they have a key role in the prevention of depression and suicide. Aim: The main aim of this study is to raise pharmacists’ awareness about depression and suicide to enable better recognation of verbal and non-verbal signs of these deseases. Another important objective is to reduce their stigma about depression and increase their confidence in communication with depressed and/or suicidal patients. Methods: A 3-hour communication workshop has been delivered in this pilot study about the reasons, trigger factors, verbal and non-verbal signs of depression and suicide. The training includes communication techniques which have been developed to patients needs, as well as role-playing scenarios. Depression Stigma and Morris Confidence Scales were applied before, after and 6 weeks following the training. The results of the training group are then compared with two of the following pharmacist groups: 1. written material only (N=15), 2. no material (N=15). Results: One-way ANOVA revealed significant differences in the training group regarding the level of confidence in treating and communicating with patients with depression and/or suicide following the training, and after 6 weeks (F(2, 24)= 7,135, p=,004; baseline: 20,37, after training: 30,00, follow up: 27,66). After the 3-hour workshop the personal stigma about depression decreased (baselin: 19,75 after training: 17,00, p=0,075) in the training group (N=9), whilst the perceived stigma did not change (before: 33.54, after: 33,44, p=NS). Trainees assessed the workshop as ‘useful’ and ‘gap filling’. No significant differences was found in the group of pharmacisists who got written material only. Conclusions: Despite the high rates of depression and suicide in Hungary, pharmacists do not receive lectures or seminars about mental health during their university studies. Such half-day workshops could fill this gap and give practical help to recognize and communicate with depressed and/or suicidal patients in a more effective way. This way pharmacists, as community gate-keepers, could contribute to a more effective suicide prevention program in Hungary. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication%20training" title="communication training">communication training</a>, <a href="https://publications.waset.org/abstracts/search?q=pharmacists" title=" pharmacists"> pharmacists</a>, <a href="https://publications.waset.org/abstracts/search?q=depression" title=" depression"> depression</a>, <a href="https://publications.waset.org/abstracts/search?q=suicide" title=" suicide"> suicide</a> </p> <a href="https://publications.waset.org/abstracts/105483/communication-training-about-depression-and-suicide-prevention-for-pharmacists-a-hungarian-pilot-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/105483.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">186</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1504</span> Parental Awareness and Willingness to Vaccinate Adolescent Daughters against Human Papilloma Virus for Cervical Cancer Prevention in Eastern Region of Kenya: Towards Affirmative Action</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jacinta%20Musyoka">Jacinta Musyoka</a>, <a href="https://publications.waset.org/abstracts/search?q=Wesley%20Too"> Wesley Too</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cervical cancer is the second leading cause of cancer-related deaths in Kenya and the second most common cancer among women, yet preventable following prevention strategies put in place, which includes vaccination with Human Papilloma Virus Vaccine (HPPV) among the young adolescent girls. Kenya has the highest burden of cervical cancer and the leading cause of death among women of reproductive age and is a known frequent type of cancer amongst women. This is expected to double by 2025 if the necessary steps are not taken, which include vaccinating girls between the ages of 9 and 14 and screening women. Parental decision is critical in ensuring that their daughters receive this vaccine. Hence this study sought to establish parental willingness and factors associate with the acceptability to vaccine adolescent daughters against the human papilloma virus for cervical cancer prevention in Machakos County, Eastern Region of Kenya. Method: Cross-sectional study design utilizing a mixed methods approach was used to collect data from Nguluni Health Centre in Machakos County; Matungulu sub-county, Kenya. This study targeted all parents of adolescent girls seeking health care services in the Matungulu sub-county area who were aged 18 years and above. A total of 220 parents with adolescent girls aged 10-14 years were enrolled into the study after informed consent were sought. All ethical considerations were observed. Quantitative data were analyzed using Multivariate regression analysis, and thematic analysis was used for qualitative data related to perceptions of parents on HPVV. Results, conclusions, and recommendations- ongoing. We expect to report findings and articulate contributions based on the study findings in due course before October 2022 <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adolescents" title="adolescents">adolescents</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20papilloma%20virus" title=" human papilloma virus"> human papilloma virus</a>, <a href="https://publications.waset.org/abstracts/search?q=kenya" title=" kenya"> kenya</a>, <a href="https://publications.waset.org/abstracts/search?q=parents" title=" parents"> parents</a> </p> <a href="https://publications.waset.org/abstracts/153940/parental-awareness-and-willingness-to-vaccinate-adolescent-daughters-against-human-papilloma-virus-for-cervical-cancer-prevention-in-eastern-region-of-kenya-towards-affirmative-action" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153940.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">109</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1503</span> Suggestion for Malware Detection Agent Considering Network Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ji-Hoon%20Hong">Ji-Hoon Hong</a>, <a href="https://publications.waset.org/abstracts/search?q=Dong-Hee%20Kim"> Dong-Hee Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Nam-Uk%20Kim"> Nam-Uk Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Tai-Myoung%20Chung"> Tai-Myoung Chung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android%20malware%20detection" title="android malware detection">android malware detection</a>, <a href="https://publications.waset.org/abstracts/search?q=software-defined%20network" title=" software-defined network"> software-defined network</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction%20environment" title=" interaction environment"> interaction environment</a>, <a href="https://publications.waset.org/abstracts/search?q=android%20malware%20detection" title=" android malware detection"> android malware detection</a>, <a href="https://publications.waset.org/abstracts/search?q=software-defined%20network" title=" software-defined network"> software-defined network</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction%20environment" title=" interaction environment"> interaction environment</a> </p> <a href="https://publications.waset.org/abstracts/39330/suggestion-for-malware-detection-agent-considering-network-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39330.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1502</span> Application of Global Predictive Real Time Control Strategy to Improve Flooding Prevention Performance of Urban Stormwater Basins</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shadab%20Shishegar">Shadab Shishegar</a>, <a href="https://publications.waset.org/abstracts/search?q=Sophie%20Duchesne"> Sophie Duchesne</a>, <a href="https://publications.waset.org/abstracts/search?q=Genevieve%20%20Pelletier"> Genevieve Pelletier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sustainability as one of the key elements of Smart cities, can be realized by employing Real Time Control Strategies for city’s infrastructures. Nowadays Stormwater management systems play an important role in mitigating the impacts of urbanization on natural hydrological cycle. These systems can be managed in such a way that they meet the smart cities standards. In fact, there is a huge potential for sustainable management of urban stormwater and also its adaptability to global challenges like climate change. Hence, a dynamically managed system that can adapt itself to instability of the environmental conditions is desirable. A Global Predictive Real Time Control approach is proposed in this paper to optimize the performance of stormwater management basins in terms of flooding prevention. To do so, a mathematical optimization model is developed then solved using Genetic Algorithm (GA). Results show an improved performance at system-level for the stormwater basins in comparison to static strategy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=environmental%20sustainability" title="environmental sustainability">environmental sustainability</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20time%20control" title=" real time control"> real time control</a>, <a href="https://publications.waset.org/abstracts/search?q=storm%20water%20management" title=" storm water management"> storm water management</a> </p> <a href="https://publications.waset.org/abstracts/91205/application-of-global-predictive-real-time-control-strategy-to-improve-flooding-prevention-performance-of-urban-stormwater-basins" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91205.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1501</span> Development of a Delivery System for Statin Targeted Spray is a Breakthrough Therapy in Alzheimer’s Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fakhr%20Eddin%20Alnaal">Fakhr Eddin Alnaal</a>, <a href="https://publications.waset.org/abstracts/search?q=Angela%20Dahdal"> Angela Dahdal</a>, <a href="https://publications.waset.org/abstracts/search?q=Duaa%20Aladib"> Duaa Aladib</a>, <a href="https://publications.waset.org/abstracts/search?q=Sabeen%20Ibrahim"> Sabeen Ibrahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20Ghoraibi"> Ibrahim Ghoraibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Bissan%20Ahmed"> Bissan Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Dementia is one of the diseases which had several stages and Alzheimer’s term was selected in respect for the first doctor Alzheimer who defined the first symptoms of this diseases in a woman whom was well treated by him. The fact that this is a type of a silent disease on which you have a long-term process of neurological degradation and suddenly gives symptoms which are most often irreversible, on clinical level likely we can consider it as a malignancy, one in terms of that it is sudden shocking irreversible and on the level of behavior and some mortality beside the lack of early detection tools for diagnosis. Therefore, the goal of our project is to test the concept of the ability of Statin in prevention of such disease and we investigated that both on experimental level and most importantly on clinical one, the clinical part was performed in a recognized house of aged people who had accidently a high cholesterol and were for years given Statin to treat that elevation, however after the symptoms of Alzheimer’s appeared and when diagnosed, they were well treated and rapidly recovered compared to Alzheimer’s patients in the same house who did not receive Statin had a mild improvement in their symptoms after the therapy, on the other hand we confirmed such observation by a well-organized experimental work. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alzheimer%27s" title="Alzheimer&#039;s">Alzheimer&#039;s</a>, <a href="https://publications.waset.org/abstracts/search?q=dementia" title=" dementia"> dementia</a>, <a href="https://publications.waset.org/abstracts/search?q=silent%20disease" title=" silent disease"> silent disease</a>, <a href="https://publications.waset.org/abstracts/search?q=statin" title=" statin"> statin</a> </p> <a href="https://publications.waset.org/abstracts/156124/development-of-a-delivery-system-for-statin-targeted-spray-is-a-breakthrough-therapy-in-alzheimers-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156124.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">133</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1500</span> Graphene-Based Nanocomposites as Ecofriendly Antifouling Surfaces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20S.%20Selim">Mohamed S. Selim</a>, <a href="https://publications.waset.org/abstracts/search?q=Nesreen%20A.%20Fatthallah"> Nesreen A. Fatthallah</a>, <a href="https://publications.waset.org/abstracts/search?q=Shimaa%20A.%20Higazy"> Shimaa A. Higazy</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhifeng%20Hao"> Zhifeng Hao</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiang%20Chen"> Xiang Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After the prohibition of tin-based fouling-prevention coatings in 2003, the researchers were directed toward eco-friendly coatings. Because of their nonstick, environmental, and economic benefits, foul-release nanocoatings have received a lot of attention. They use physical anti-adhesion terminology to deter any fouling attachment.Natural bioinspired surfaces have micro/nano-roughness and low surface free energy features, which may inspire the design of dynamic antifouling coatings. Graphene-based nanocomposite surfaces were designed to combat marine-fouling adhesion with ecological as well as eco-friendly effects rather than biocidal solutions. Polymer–graphenenanofiller hybrids are a novel class of composite materials in fouling-prevention applications. The controlled preparation of nanoscale orientation, arrangement, and direction along the composite building blocks would result in superior fouling prohibition. This work representsfoul-release nanocomposite top coats for marine coating applications with superhydrophobicity, surface inertness against fouling adherence, cost-effectiveness, and increased lifetime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=foul-release%20nanocoatings" title="foul-release nanocoatings">foul-release nanocoatings</a>, <a href="https://publications.waset.org/abstracts/search?q=graphene-based%20nanocomposite" title=" graphene-based nanocomposite"> graphene-based nanocomposite</a>, <a href="https://publications.waset.org/abstracts/search?q=polymer" title=" polymer"> polymer</a>, <a href="https://publications.waset.org/abstracts/search?q=nanofillers" title=" nanofillers"> nanofillers</a> </p> <a href="https://publications.waset.org/abstracts/149138/graphene-based-nanocomposites-as-ecofriendly-antifouling-surfaces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149138.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1499</span> Lived Experiences and Perspectives of Adult Survivors of Incest-Related Childhood Sexual Abuse</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Varsha%20Puri">Varsha Puri</a>, <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Hudson"> Sharon Hudson</a>, <a href="https://publications.waset.org/abstracts/search?q=Ian%20Kim"> Ian Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Incest-related childhood sexual abuse (IRCSA) is challenging to study due to the shame and secrecy experienced by its survivors. Ramifications of IRCSA worsen when it is unidentified, and interventions are not made. IRCSA perspectives are essential for future prevention and intervention strategies. However, there is limited understanding of this population’s experiences, perspectives, and long-term struggles. To date, research for IRCSA has utilized data from treatment programs and qualitative research with cohorts of 10-20 people, much of the data is from 10-40 years prior. Methods. In June 2018, an anonymous online survey was posted to multiple social media sites (e.g., Facebook IRCSA groups) and sexual abuse resource sites. Survey responses were collected for a year. The survey collected non-identifying demographics, IRCSA experiences, and outcomes data. Results: We obtained 1310 completed surveys. Demographics of all ages, racial backgrounds, financial backgrounds, and genders were obtained; the majority identified as white (81%) and female (76%). Childhood sexual abuse (CSA) started before the age of 6 in 49% and was endured for more than one year in 84% of respondents, and 39% reported ten or more years of abuse. CSA by multiple perpetrators occurred in 58%, while 8% had ten or more perpetrators. CSA by perpetrators under 21 years old was reported by 46%. Female perpetrators were reported by 28% of respondents. Fathers were the highest reported sexual abusers at 60%, and mothers were reported at 17%. Only 16% reported that at least one of their perpetrators was prosecuted for sexual abuse of a minor. Respondents confirmed that 54% of the time, they informed an adult of the abuse; only 2% agreed that “an intervention was made by the family that protected me.” A majority reported that IRCSA has negatively impacted their intimate/sexual relationships (96%) and mental health (96%). A majority reported negative impacts on biological family relationships (88%), physical health (73%), finances (59%), educational achievement (57%), and employment (56%). When asked about suffering from addiction, 85% of respondents answered yes. Prevention strategies selected most by respondents include early school education around CSA prevention (67%), removing the statute of limitations for reporting CSA (69%), and improved laws protecting IRCSA survivors (63%). Conclusion: The data document that IRCSA can be pervasive, and the dearth of intervention and support for survivors have major lasting impacts. Survivors have a unique and valuable perspective on what interventions are needed to prevent IRCSA and support survivors; their voice has long been unheard in crafting prevention and intervention policies and services. These results thus provide an important call to action from these critical stakeholders. Pediatricians should recognize that perpetrators can be pediatric patients, women, and parents. Pediatricians can advocate for more early CSA prevention education and policy changes that remove the statute of limitations for reporting CSA. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=incest" title="incest">incest</a>, <a href="https://publications.waset.org/abstracts/search?q=childhood%20sexual%20abuse" title=" childhood sexual abuse"> childhood sexual abuse</a>, <a href="https://publications.waset.org/abstracts/search?q=incest-related%20childhood%20sexual%20abuse" title=" incest-related childhood sexual abuse"> incest-related childhood sexual abuse</a>, <a href="https://publications.waset.org/abstracts/search?q=incest%20survivor" title=" incest survivor"> incest survivor</a> </p> <a href="https://publications.waset.org/abstracts/165983/lived-experiences-and-perspectives-of-adult-survivors-of-incest-related-childhood-sexual-abuse" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165983.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1498</span> Managing the Baltic Sea Region Resilience: Prevention, Treatment Actions and Circular Economy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20Burlakovs">J. Burlakovs</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20Jani"> Y. Jani</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Grinberga"> L. Grinberga</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Kriipsalu"> M. Kriipsalu</a>, <a href="https://publications.waset.org/abstracts/search?q=O.%20Anne"> O. Anne</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20Grinfelde"> I. Grinfelde</a>, <a href="https://publications.waset.org/abstracts/search?q=W.%20Hogland"> W. Hogland</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The worldwide future sustainable economies are oriented towards the sea: the maritime economy is becoming one of the strongest driving forces in many regions as population growth is the highest in coastal areas. For hundreds of years sea resources were depleted unsustainably by fishing, mining, transportation, tourism, and waste. European Sustainable Development Strategy is identifying and developing actions to enable the EU to achieve a continuous, long-term improvement of the quality of life through the creation of sustainable communities. The aim of this paper is to provide insight in Baltic Sea Region case studies on implemented actions on tourism industry waste and beach wrack management in coastal areas, hazardous contaminants and plastic flow treatment from waste, wastewaters and stormwaters. These projects mentioned in study promote successful prevention of contaminant flows to the sea environments and provide perspectives for creation of valuable new products from residuals for future circular economy are the step forward to green innovation winning streak. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=resilience" title="resilience">resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=hazardous%20waste" title=" hazardous waste"> hazardous waste</a>, <a href="https://publications.waset.org/abstracts/search?q=phytoremediation" title=" phytoremediation"> phytoremediation</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20management" title=" water management"> water management</a>, <a href="https://publications.waset.org/abstracts/search?q=circular%20economy" title=" circular economy"> circular economy</a> </p> <a href="https://publications.waset.org/abstracts/100807/managing-the-baltic-sea-region-resilience-prevention-treatment-actions-and-circular-economy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/100807.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">174</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1497</span> Ethical Considerations for Conducting Research on Violence against Women with Disabilities: Discussing Issues of Reasonable Accommodation, Capacity and Equal Participation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ingrid%20Van%20Der%20Heijden">Ingrid Van Der Heijden</a>, <a href="https://publications.waset.org/abstracts/search?q=Naeemah%20Abrahams"> Naeemah Abrahams</a>, <a href="https://publications.waset.org/abstracts/search?q=Jane%20Harries"> Jane Harries</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Women with disabilities are largely missing from global research on violence prevention, yet research shows that women with disabilities are a particularly marginalised group who experience heightened levels and unique forms of violence than men with disabilities, and women without disabilities. They face heightened stigma, discrimination, and violence due to their gender and their disability. Including women with disabilities in violence, research helps inform policy and prevention interventions that are relevant and inclusive. To ensure their inclusion in violence research, we need ethical guidelines that are sensitive to their heightened risk and vulnerability, that recognize the diversity in the disabled population, but that also promote disabled people’s agency in defining their own violence prevention needs and agendas. Objective: To highlight pertinent ethical issues around women with disabilities’ inclusion and participation in violence research. Methodology: Considering the lack of formalized guidelines for research of people with disabilities, we draw from the literature on international ethics guidelines for researching violence against women, and the Emancipatory Disability Research paradigm, as well as drawing from our own experiences from the field in applying the guidelines when doing research with disabled women. Findings: Following the guiding ethical principles of respect, benefit, justice, and do no harm, we argue that reasonable accommodation, capacity, and equal participation need to be considered in conceptualizing and conducting ethical violence research with women with disabilities. We conclude that disability research in the area of violence is highly politicized and must be carefully scrutinized to ensure justice and the contribution of women with disabilities to their own welfare. Implications: We suggest that these issues are practically applied in the field and tested and critiqued to enhance best practice for undertaking ethical research with this particular group. It is important that not only researchers and ethics committees, but also disabled women and disabled organizations, are involved in enhancing and formalizing ethical research guidelines for marginalized populations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=capacity" title="capacity">capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=emancipatory%20disability%20research%20paradigm%20equal%20participation" title=" emancipatory disability research paradigm equal participation"> emancipatory disability research paradigm equal participation</a>, <a href="https://publications.waset.org/abstracts/search?q=reasonable%20accommodation" title=" reasonable accommodation"> reasonable accommodation</a>, <a href="https://publications.waset.org/abstracts/search?q=research%20ethics" title=" research ethics"> research ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=violence%20against%20women%20with%20disabilities" title=" violence against women with disabilities"> violence against women with disabilities</a> </p> <a href="https://publications.waset.org/abstracts/69359/ethical-considerations-for-conducting-research-on-violence-against-women-with-disabilities-discussing-issues-of-reasonable-accommodation-capacity-and-equal-participation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69359.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">341</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1496</span> The Legal Position of Criminal Prevention in the Metaverse World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andi%20Intan%20Purnamasari">Andi Intan Purnamasari</a>, <a href="https://publications.waset.org/abstracts/search?q=Supriyadi"> Supriyadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Sulbadana"> Sulbadana</a>, <a href="https://publications.waset.org/abstracts/search?q=Aminuddin%20Kasim"> Aminuddin Kasim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime" title="crime">crime</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber" title=" cyber"> cyber</a>, <a href="https://publications.waset.org/abstracts/search?q=metaverse" title=" metaverse"> metaverse</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a> </p> <a href="https://publications.waset.org/abstracts/148400/the-legal-position-of-criminal-prevention-in-the-metaverse-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148400.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">149</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1495</span> Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bala%20Adamu%20Malami">Bala Adamu Malami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic" title="electronic">electronic</a>, <a href="https://publications.waset.org/abstracts/search?q=GPS" title=" GPS"> GPS</a>, <a href="https://publications.waset.org/abstracts/search?q=GSM%20modem" title=" GSM modem"> GSM modem</a>, <a href="https://publications.waset.org/abstracts/search?q=communication" title=" communication"> communication</a>, <a href="https://publications.waset.org/abstracts/search?q=vehicle" title=" vehicle"> vehicle</a> </p> <a href="https://publications.waset.org/abstracts/159657/design-and-construction-of-vehicle-tracking-system-with-global-positioning-systemglobal-system-for-mobile-communication-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159657.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">99</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1494</span> Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Edward%20Guill%C3%A9n">Edward Guillén</a>, <a href="https://publications.waset.org/abstracts/search?q=Jhordany%20Rodriguez"> Jhordany Rodriguez</a>, <a href="https://publications.waset.org/abstracts/search?q=Rafael%20P%C3%A1ez"> Rafael Páez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one is the analysis performed over the obtained data. The goal of this paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with different setups. The independent variables are as follows: the number of system inputs, the way the inputs are codified and the complexity of the analysis techniques. For the analysis, some approaches of artificial neural networks are implemented with different number of layers. The obtained results show the influence that each of these variables has in the system performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20intrusion%20detection" title="network intrusion detection">network intrusion detection</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20network" title=" artificial neural network"> artificial neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=anomaly%20detection%20module" title="anomaly detection module">anomaly detection module</a> </p> <a href="https://publications.waset.org/abstracts/2047/evaluating-performance-of-an-anomaly-detection-module-with-artificial-neural-network-implementation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2047.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">343</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1493</span> Ethical Discussions on Prenatal Diagnosis: Iranian Case of Thalassemia Prevention Program</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sachiko%20Hosoya">Sachiko Hosoya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Objectives: The purpose of this paper is to investigate the social policy of preventive genetic medicine in Iran, by following the legalization process of abortion law and the factors affecting the process in wider Iranian contexts. In this paper, ethical discussions of prenatal diagnosis and selective abortion in Iran will be presented, by exploring Iranian social policy to control genetic diseases, especially a genetic hemoglobin disorder called Thalassemia. The ethical dilemmas in application of genetic medicine into social policy will be focused. Method: In order to examine the role of the policy for prevention of genetic diseases and selective abortion in Iran, various resources have been sutudied, not only academic articles, but also discussion in the Parliament and documents related to a court case, as well as ethnographic data on living situation of Thalassemia patients. Results: Firstly, the discussion on prenatal diagnosis and selective abortion is overviewed from the viewpoints of ethics, disability rights activists, and public policy for lower-resources countries. As a result, it should be noted that the point more important in the discussion on prenatal diagnosis and selective abortion in Iran is the allocation of medical resources. Secondly, the process of implementation of national thalassemia screening program and legalization of ‘Therapeutic Abortion Law’ is analyzed, through scrutinizing documents such as the Majlis record, government documents and related laws and regulations. Although some western academics accuse that Iranian policy of selective abortion seems to be akin to eugenic public policy, Iranian government carefully avoid to distortions of the policy as ‘eugenic’. Thirdly, as a comparative example, discussions on an Iranian court case of patient’s ‘right not to be born’ will be introduced. Along with that, restrictive living environments of people with Thalassemia patients and the carriers are depicted, to understand some disabling social factors for people with genetic diseases in the local contexts of Iran. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=abortion" title="abortion">abortion</a>, <a href="https://publications.waset.org/abstracts/search?q=Iran" title=" Iran"> Iran</a>, <a href="https://publications.waset.org/abstracts/search?q=prenatal%20diagnosis" title=" prenatal diagnosis"> prenatal diagnosis</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20health%20ethics" title=" public health ethics"> public health ethics</a>, <a href="https://publications.waset.org/abstracts/search?q=Thalassemia%20prevention%20program" title=" Thalassemia prevention program"> Thalassemia prevention program</a> </p> <a href="https://publications.waset.org/abstracts/32290/ethical-discussions-on-prenatal-diagnosis-iranian-case-of-thalassemia-prevention-program" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32290.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">346</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1492</span> The Effect of Intimate Partner Violence Prevention Program on Knowledge and Attitude of Victims</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marzieh%20Nojomi">Marzieh Nojomi</a>, <a href="https://publications.waset.org/abstracts/search?q=Azadeh%20Mottaghi"> Azadeh Mottaghi</a>, <a href="https://publications.waset.org/abstracts/search?q=Arghavan%20Haj-Sheykholeslami"> Arghavan Haj-Sheykholeslami</a>, <a href="https://publications.waset.org/abstracts/search?q=Narjes%20Khalili"> Narjes Khalili</a>, <a href="https://publications.waset.org/abstracts/search?q=Arash%20Tehrani%20Banihashemi"> Arash Tehrani Banihashemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background and objectives: Domestic violence is a global problem with severe consequences throughout the life of the victims. Iran’s Ministry of Health has launched an intimate partner violence (IPV) prevention program, integrated in the primary health care services since 2016. The present study is a part of this national program’s evaluation. In this section, we aimed to examine spousal abuse victims’ knowledge and attitude towards domestic violence before and after receivingthese services. Methods: To assess the knowledge and attitudes of victims, a questionnaire designed by Ahmadzadand colleagues in 2013 was used. This questionnaire includes 15 questions regarding knowledge in the fields of definition, epidemiology, and effects on children, outcomes, and prevention of domestic violence. To assess the attitudes, this questionnaire has 10 questions regarding the attitudes toward the causes, effects, and legal or protective support services of domestic violence. To assess the satisfaction and the effect of the program on prevention or reduction of spousal violence episodes, two more questions were also added. Since domestic violence prevalence differs in different parts of the country, we chose nine areas with the highest, the lowest, and moderate prevalence of IPVfor the study. The link to final electronic version of the questionnaire was sent to the randomly selected public rural or urban health centers in the nine chosen areas. Since the study had to be completed in one month, we used newly identified victims as pre-intervention group and people who had at least received one related service from the program (like psychiatric consultation, education about safety measures, supporting organizations and etc.) during the previous year, as our post- intervention group. Results: A hundred and ninety-two newly identified IPV victims and 267 victims who had at least received one related program service during the previous year entered the study. All of the victims were female. Basic characteristics of the two groups, including age, education, occupation, addiction, spouses’ age, spouses’ addiction, duration of the current marriage, and number of children, were not statistically different. In knowledge questions, post- intervention group had statistically better scores in the fields of domestic violence outcomes and its effects on children; however, in the remaining areas, the scores of both groups were similar. The only significant difference in the attitude across the two groups was in the field of legal or protective support services. From the 267 women who had ever received a service from the program, 91.8% were satisfied with the services, and 74% reported a decrease in the number of violent episodes. Conclusion: National IPV prevention program integrated in the primary health care services in Iran is effective in improving the knowledge of victims about domestic violence outcomes and its effects on children. Improving the attitude and knowledge of domestic violence victims about its causes and preventive measures needs more effective interventions. This program can reduce the number of IPV episodes between the spouses, and satisfaction among the service users is high. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intimate%20partner%20violence" title="intimate partner violence">intimate partner violence</a>, <a href="https://publications.waset.org/abstracts/search?q=assessment" title=" assessment"> assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20services" title=" health services"> health services</a>, <a href="https://publications.waset.org/abstracts/search?q=efficacy" title=" efficacy"> efficacy</a> </p> <a href="https://publications.waset.org/abstracts/144485/the-effect-of-intimate-partner-violence-prevention-program-on-knowledge-and-attitude-of-victims" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144485.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1491</span> The Design and Development of Online Infertility Prevention Education in the Frame of Mayer&#039;s Multimedia Learning Theory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B.%20Baran">B. Baran</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20N.%20Kaptanoglu"> S. N. Kaptanoglu</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Ocal"> M. Ocal</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20Kagnici"> Y. Kagnici</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Esen"> E. Esen</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Siyez"> E. Siyez</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20M.%20Siyez"> D. M. Siyez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Infertility is the fact that couples cannot have children despite 1 year of unprotected sexual life. Infertility can be considered as an important problem affecting not only sexual life but also social and psychological conditions of couples. Learning about information about preventable factors related to infertility during university years plays an important role in preventing a possible infertility case in older ages. The possibility to facilitate access to information with the internet has provided the opportunity to reach a broad audience in the diverse learning environments and educational environment. Moreover, the internet has become a basic resource for the 21st-century learners. Providing information about infertility over the internet will enable more people to reach in a short time. When studies conducted abroad about infertility are examined, interactive websites and online education programs come to the fore. In Turkey, while there is no comprehensive online education program for university students, it seems that existing studies are aimed to make more advertisements for doctors or hospitals. In this study, it was aimed to design and develop online infertility prevention education for university students. Mayer’s Multimedia Learning Theory made up the framework for the online learning environment in this study. The results of the needs analysis collected from the university students in Turkey who were selected with sampling to represent the audience for online learning contributed to the design phase. In this study, an infertility prevention online education environment designed as a 4-week education was developed by explaining the theoretical basis and needs analysis results. As a result; in the development of the online environment, different kind of visual aids that will increase teaching were used in the environment of online education according to Mayer’s principles of extraneous processing (coherence, signaling, spatial contiguity, temporal contiguity, redundancy, expectation principles), essential processing (segmenting, pre-training, modality principles) and generative processing (multimedia, personalization, voice principles). For example, the important points in reproductive systems’ expression were emphasized by visuals in order to draw learners’ attention, and the presentation of the information was also supported by the human voice. In addition, because of the limited knowledge of university students in the subject, the issue of female reproductive and male reproductive systems was taught before preventable factors related to infertility. Furthermore, 3D video and augmented reality application were developed in order to embody female and male reproductive systems. In conclusion, this study aims to develop an interactive Online Infertility Prevention Education in which university students can easily access reliable information and evaluate their own level of knowledge about the subject. It is believed that the study will also guide the researchers who want to develop online education in this area as it contains design-stage decisions of interactive online infertility prevention education for university students. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=infertility" title="infertility">infertility</a>, <a href="https://publications.waset.org/abstracts/search?q=multimedia%20learning%20theory" title=" multimedia learning theory"> multimedia learning theory</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20education" title=" online education"> online education</a>, <a href="https://publications.waset.org/abstracts/search?q=reproductive%20health" title=" reproductive health"> reproductive health</a> </p> <a href="https://publications.waset.org/abstracts/83064/the-design-and-development-of-online-infertility-prevention-education-in-the-frame-of-mayers-multimedia-learning-theory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83064.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1490</span> Saving Lives: Alternative Approaches to Reducing Gun Violence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Angie%20M.%20Wolf">Angie M. Wolf</a>, <a href="https://publications.waset.org/abstracts/search?q=DeVone%20Boggan"> DeVone Boggan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper highlights an innovative and nontraditional violence prevention program that is making a noticeable impact in what was once one of the country’s most violent communities. With unique and tailored strategies, the Operation Peacemaker Fellowship, established in Richmond, California, combines components of evidence-based practices with a community-oriented focus on relationships and mentoring to fill a gap in services and increase community safety. In an effort to highlight these unique strategies and provide a blueprint for other communities with violent crime problems, the authors of this paper hope to clearly delineate how one community is moving forward with vanguard approaches to invest in the lives of young men who once were labeled the communities’ most violent, even the most deadly, youth. The impact of this program is evidenced through the fellows’ own voices as they illuminate the experience of being in the Fellowship. In interviews, fellows’ describe how participating in this program has transformed their lives, and the lives of those they love. The authors of this article spent more than two years researching this Fellowship program in order to conduct an evaluation of it and, ultimately, to demonstrate how this program is a testament to the power of relationship and love combined with evidence-based practices, consequently enriching the lives of youth and the community that embraces them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gun%20violence%20prevention" title="gun violence prevention">gun violence prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20risk%20youth" title=" high risk youth"> high risk youth</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=policing%20justice" title=" policing justice"> policing justice</a> </p> <a href="https://publications.waset.org/abstracts/24452/saving-lives-alternative-approaches-to-reducing-gun-violence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24452.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">412</span> </span> </div> </div> <ul class="pagination"> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=8" rel="prev">&lsaquo;</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=1">1</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=2">2</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=8">8</a></li> <li class="page-item active"><span class="page-link">9</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=10">10</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=11">11</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=12">12</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=58">58</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=59">59</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=intrusion%20prevention&amp;page=10" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10