Search results for: awareness of the code of ethics for nurse educators
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5395

Search results for: awareness of the code of ethics for nurse educators

5125 Time Efficient Color Coding for Structured-Light 3D Scanner

Authors: Po-Hao Huang, Pei-Ju Chiang

Abstract:

The structured light 3D scanner is commonly used for measuring the 3D shape of an object. Through projecting designed light patterns on the object, deformed patterns can be obtained and used for the geometric shape reconstruction. At present, Gray code is the most reliable and commonly used light pattern in the structured light 3D scanner. However, the trade-off between scanning efficiency and accuracy is a long-standing and challenging problem. The design of light patterns plays a significant role in the scanning efficiency and accuracy. Thereby, we proposed a novel encoding method integrating color information and Gray-code to improve the scanning efficiency. We will demonstrate that with the proposed method, the scanning time can be reduced to approximate half of the one needed by Gray-code without reduction of precision.

Keywords: gray-code, structured light scanner, 3D shape acquisition, 3D reconstruction

Procedia PDF Downloads 454
5124 Glycemic Control on Self-Efficacy and Self-Care Behaviors among Omani Adults with Type 2 Diabetes

Authors: Melba Sheila D'Souza, Anandhi Amirtharaj, Shreedevi Balachandran

Abstract:

Background: Type 2 diabetes has a significant impact on individuals’ health and well-being. Glycemic control may influence self-efficacy and self-care behaviors, and reduce the risk of complications among adults with type 2 diabetes. Type 2 diabetes has substantial morbidity and mortality and 60% of adults’ poor self-care. Glycemic control is associated with reported self-efficacy and self-care behavior. Adults with type 2 diabetes with less information were less likely to take diabetes self-care. Aim: To examine the relationship between glycemic control, demographic factors, clinical factors on self-efficacy, self-care behaviors among Omani adults with type 2 diabetes. Methods: A correlational, descriptive study was used. Omani adults with type 2 diabetes (n=140) were recruited from a public hospital in Oman. The data were collected during January-March 2015. Ethical approval was given by the college research and ethics committee, College of Nursing, and the Hospital, Sultan Qaboos University Data was collected on self-efficacy, self-care behaviors and glycemic control. The study was approved by the Institution Ethics and Research Committee. Bivariate and multivariate analyses were conducted. Results: Most adults had a fasting blood glucose >7.2mmol/L (90.7%), with the majority demonstrating ‘uncontrolled or poor HbA1c of > 8%’ (65%). Variance of self-care behavior (20.6%) and 31.3% of the variance of the self-efficacy was explained by the age, duration of diabetes, medication, HbA1c and prevention of activities of living. Adults with type 2 diabetes with poor glycemic control were more likely to have poor self-efficacy and poor self-care behaviors. Conclusion: This study confirms that self-efficacy model on outcome predicts self-efficacy and self-care behavior. Higher understanding of diabetes, prevention of normal daily activities, higher ability to fit diabetes life in a positive manner and high patient-physician communication were significant with self-efficacy and self-care behaviors. Hence, glycemic control has a high effect on improving self-care behaviors like diet, exercise, medication, foot care and self-efficacy among type 2 diabetes. Implications: Using these findings to improve self-efficacy, individualized self-care management is recommended for better self-efficacy and self-care behaviors among adults with type 2 diabetes.

Keywords: self-efficacy, self-care behaviors, self-care management, glycemic control, type 2 diabetes, nurse

Procedia PDF Downloads 403
5123 One Plus One is More than Two: Why Nurse Recruiters Need to Use Various Multivariate Techniques to Understand the Limitations of the Concept of Emotional Intelligence

Authors: Austyn Snowden

Abstract:

Aim: To examine the construct validity of the Trait Emotional Intelligence Questionnaire Short form. Background: Emotional intelligence involves the identification and regulation of our own emotions and the emotions of others. It is therefore a potentially useful construct in the investigation of recruitment and retention in nursing and many questionnaires have been constructed to measure it. Design: Secondary analysis of existing dataset of responses to TEIQue-SF using concurrent application of Rasch analysis and confirmatory factor analysis. Method: First year undergraduate nursing and computing students completed Trait Emotional Intelligence Questionnaire-Short Form. Responses were analysed by synthesising results of Rasch analysis and confirmatory factor analysis.

Keywords: emotional intelligence, rasch analysis, factor analysis, nurse recruiters

Procedia PDF Downloads 458
5122 Static Analysis Deployment Model for Code Quality on Research and Development Projects of Software Development

Authors: Jeong-Hyun Park, Young-Sik Park, Hyo-Teag Jung

Abstract:

This paper presents static analysis deployment model for code quality on R&D Projects of SW Development. The proposed model includes the scope of R&D projects and index for static analysis of source code, operation model and execution process, environments and infrastructure system for R&D projects of SW development. There is the static analysis result of pilot project as case study based on the proposed deployment model and environment, and strategic considerations for success operation of the proposed static analysis deployment model for R&D Projects of SW Development. The proposed static analysis deployment model in this paper will be adapted and improved continuously for quality upgrade of R&D projects, and customer satisfaction of developed source codes and products.

Keywords: static analysis, code quality, coding rules, automation tool

Procedia PDF Downloads 516
5121 A Serious Game to Upgrade the Learning of Organizational Skills in Nursing Schools

Authors: Benoit Landi, Hervé Pingaud, Jean-Benoit Culie, Michel Galaup

Abstract:

Serious games have been widely disseminated in the field of digital learning. They have proved their utility in improving skills through virtual environments that simulate the field where new competencies have to be improved and assessed. This paper describes how we created CLONE, a serious game whose purpose is to help nurses create an efficient work plan in a hospital care unit. In CLONE, the number of patients to take care of is similar to the reality of their job, going far beyond what is currently practiced in nurse school classrooms. This similarity with the operational field increases proportionally the number of activities to be scheduled. Moreover, very often, the team of nurses is composed of regular nurses and nurse assistants that must share the work with respect to the regulatory obligations. Therefore, on the one hand, building a short-term planning is a complex task with a large amount of data to deal with, and on the other, good clinical practices have to be systematically applied. We present how reference planning has been defined by addressing an optimization problem formulation using the expertise of teachers. This formulation ensures the gameplay feasibility for the scenario that has been produced and enhanced throughout the game design process. It was also crucial to steer a player toward a specific gaming strategy. As one of our most important learning outcomes is a clear understanding of the workload concept, its factual calculation for each caregiver along time and its inclusion in the nurse reasoning during planning elaboration are focal points. We will demonstrate how to modify the game scenario to create a digital environment in which these somewhat abstract principles can be understood and applied. Finally, we give input on an experience we had on a pilot of a thousand undergraduate nursing students.

Keywords: care planning, workload, game design, hospital nurse, organizational skills, digital learning, serious game

Procedia PDF Downloads 185
5120 Robotics Technology Supported Pedagogic Models in Science, Technology, Engineering, Arts and Mathematics Education

Authors: Sereen Itani

Abstract:

As the world aspires for technological innovation, Innovative Robotics Technology-Supported Pedagogic Models in STEAM Education (Science, Technology, Engineering, Arts, and Mathematics) are critical in our global education system to build and enhance the next generation 21st century skills. Thus, diverse international schools endeavor in attempts to construct an integrated robotics and technology enhanced curriculum based on interdisciplinary subjects. Accordingly, it is vital that the globe remains resilient in STEAM fields by equipping the future learners and educators with Innovative Technology Experiences through robotics to support such fields. A variety of advanced teaching methods is employed to learn about Robotics Technology-integrated pedagogic models. Therefore, it is only when STEAM and innovations in Robotic Technology becomes integrated with real-world applications that transformational learning can occur. Robotics STEAM education implementation faces major challenges globally. Moreover, STEAM skills and concepts are communicated in separation from the real world. Instilling the passion for robotics and STEAM subjects and educators’ preparation could lead to the students’ majoring in such fields by acquiring enough knowledge to make vital contributions to the global STEAM industries. Thus, this necessitates the establishment of Pedagogic models such as Innovative Robotics Technologies to enhance STEAM education and develop students’ 21st-century skills. Moreover, an ICT innovative supported robotics classroom will help educators empower and assess students academically. Globally, the Robotics Design System and platforms are developing in schools and university labs creating a suitable environment for the robotics cross-discipline STEAM learning. Accordingly, the research aims at raising awareness about the importance of robotics design systems and methodologies of effective employment of robotics innovative technology-supported pedagogic models to enhance and develop (STEAM) education globally and enhance the next generation 21st century skills.

Keywords: education, robotics, STEAM (Science, Technology, Engineering, Arts and Mathematics Education), challenges

Procedia PDF Downloads 375
5119 Performance Evaluation of One and Two Dimensional Prime Codes for Optical Code Division Multiple Access Systems

Authors: Gurjit Kaur, Neena Gupta

Abstract:

In this paper, we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension, i.e. time slots, whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research, we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for Optical Code Division Multiple Access (OCDMA) system on a single platform. Analysis shows that 2D prime code supports lesser number of active users than 1D codes, but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 333
5118 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 496
5117 Importance of Continuous Professional Development for Teacher Educators in Myanmar Education College

Authors: Moet Moet Myint Lay

Abstract:

Continuing professional development involves acquiring new knowledge and skills for current work and improving career opportunities in the field through continuing education (OECD, 2000). This article examines the effectiveness of CPD in improving teacher quality and the resulting need for CPD for teacher educators in Myanmar. The purpose of this study is to explore a deeper understanding of teacher-to-teacher continuing professional development in improving teacher education programs. Research questions: (1) How do teachers in Myanmar understand the idea of continuous professional development for professional development? (2) What CPD activities are required for all teachers in teachers' colleges? (3) What are the main challenges of CPD implementation in Myanmar Education College? A qualitative method using semi-structured interviews was used in this study. Seven teacher educators from Mandalay Education College participated in this study. There are three male teacher educators and four female teacher educators. All participants who responded to the semi-structured interviews were between 29 and 45 years old.The interviews revealed that professional development involves acquiring the necessary pedagogical knowledge and skills to encourage students to think creatively and critically. Teachers must participate in a variety of activities, including professional interviews, lesson study, training programs, workshops, and seminars. All results showed that teachers need English and ICT skills for teaching and learning, including extended ICT courses for those who have completed a foundation course, access to e-libraries, and inclusive education (including language teaching and learning), facilitate the assessment (formative and summative), practicum, mentoring, and coaching skills. The study concludes with practical findings that suggest an urgent need for CPD activities for teachers.

Keywords: continuous professional development, teacher educator, teacher training program), mentoring

Procedia PDF Downloads 50
5116 The Application of King IV by Rugby Clubs Affiliated to a Rugby Union in South Africa

Authors: Anouschka Swart

Abstract:

In 2023, sport faces a plethora of challenges including but not limited to match-fixing, corruption and doping to its integrity that, threatens both the commercial and public appeal. The continuous changes and commercialisation that has occurred within sport have led to a variety of consequences resulting in the need for ethics to be revived, as it used to be in the past to ensure sport is not in danger. In order to understand governance better, the Institute of Directors in Southern Africa, a global network of professional firms providing Audit, Tax and Advisory services, outlined a process explaining all elements with regards to corporate governance. This process illustrates a governing body’s responsibilities as strategy, policy, oversight and accountability. These responsibilities are further elucidated to 16 governing principles which are highlighted as essential for all organisations in order to achieve and deliver on effective governance outcomes. These outcomes are good ethical culture, good performance, effective control and legitimacy therefore, the aim of the study was to investigate the general state of governance within the clubs affiliated with a rugby club in South Africa by utilizing the King IV Code as the framework. The results indicated that the King Code IV principles are implemented by these rugby clubs to ensure they demonstrate commitment to corporate governance to both internal and external stakeholders. It is however evident that a similar report focused solely on sport is a necessity in the industry as this will provide more clarity on sport specific problems.

Keywords: South Africa, sport, King IV, responsibilities

Procedia PDF Downloads 66
5115 An Excellent Adventure: The Stories of National Tertiary Teaching Excellence Award Winners

Authors: Claire Goode

Abstract:

This paper reports on a doctoral research project using narrative inquiry to investigate the stories of twelve national Tertiary Teaching Excellence Award winners in New Zealand. Preliminary findings highlight awardees’ views on their identity, their professional practice, and on what they consider to be excellence in tertiary teaching. The research also reports on common themes in the personal qualities that awardees describe, and on what these nationally recognised educators would like to see in place around Tertiary Teacher Development. Educators, mentors, trainers, and curriculum designers can gain a deeper understanding of what teaching excellence looks like, and of how teachers perceive their own practice and their impact on others. This may enable different interventions to develop best practice from staff, and to raise standards. It is hoped too that, by reflecting on the stories of teachers who have been recognised for ‘excellence’, educators will relate to and recognise elements of their own practice, and will feel motivated and inspired to share these with their peers and the wider academic community.

Keywords: academic identity, narrative inquiry, teacher development, teaching excellence

Procedia PDF Downloads 118
5114 Buddhism and Education for Children: Cultivating Wisdom and Compassion

Authors: Harry Einhorn

Abstract:

This paper aims to explore the integration of Buddhism into educational settings with the goal of fostering the holistic development of children. By incorporating Buddhist principles and practices, educators can create a nurturing environment that cultivates wisdom, compassion, and ethical values in children. The teachings of Buddhism provide valuable insights into mindfulness, compassion, and critical thinking, which can be adapted and applied to educational curricula to enhance children's intellectual, emotional, and moral growth. One of the fundamental aspects of Buddhist philosophy that is particularly relevant to education is the concept of mindfulness. By introducing mindfulness practices, such as meditation and breathing exercises, children can learn to cultivate present-moment awareness, develop emotional resilience, and enhance their ability to concentrate and focus. These skills are essential for effective learning and can contribute to reducing stress and promoting overall well-being in children. Mindfulness practices can also teach children how to manage their emotions and thoughts, promoting self-regulation and creating a positive classroom environment. In addition to mindfulness, Buddhism emphasizes the cultivation of compassion and empathy toward all living beings. Integrating teachings on kindness, empathy, and ethical behavior into the educational framework can help children develop a deep sense of interconnectedness and social responsibility. By engaging children in activities that promote empathy and encourage acts of kindness, such as community service projects and cooperative learning, educators can foster the development of compassionate individuals who are actively engaged in creating a more harmonious and compassionate society. Moreover, Buddhist teachings encourage critical thinking and inquiry, which are crucial skills for intellectual development. By introducing children to fundamental Buddhist concepts such as impermanence, interdependence, and the nature of suffering, educators can engage them in philosophical reflections and broaden their perspectives on life. These teachings promote open-mindedness, curiosity, and a deeper understanding of the interconnectedness of all things. Through the exploration of these concepts, children can develop critical thinking skills and gain insights into the complexities of the world, enabling them to navigate challenges with wisdom and discernment. While integrating Buddhism into education requires sensitivity, cultural awareness, and respect for diverse beliefs and backgrounds, it holds great potential for nurturing the holistic development of children. By incorporating mindfulness practices, fostering compassion and empathy, and promoting critical thinking, Buddhism can contribute to the creation of a more compassionate, inclusive, and harmonious educational environment. This integration can shape well-rounded individuals who are equipped with the necessary skills and qualities to navigate the complexities of the modern world with wisdom, compassion, and resilience. In conclusion, the integration of Buddhism into education offers a valuable framework for cultivating wisdom, compassion, and ethical values in children. By incorporating mindfulness, compassion, and critical thinking into educational practices, educators can create a supportive environment that promotes children's holistic development. By nurturing these qualities, Buddhism can help shape individuals who are not only academically proficient but also morally and ethically responsible, contributing to a more compassionate and harmonious society.

Keywords: Buddhism, education, children, mindfulness

Procedia PDF Downloads 58
5113 Nurse's Use of Power to Standardize Nursing Terminology in Electronic Health Record

Authors: Samira Ali

Abstract:

Aim: The purpose of this study was to describe nurses’ potential use of power levels to influence the standardization of nursing terminology (SNT) in electronic health records. Also, to examine the relationship between nurses’ use of power levels and variables such as position, communication and the potential goal of achieving SNT in electronic health records. Background: In an era of evidence-based nursing care, with an emphasis on nursing’s ability to measure the care rendered and improve outcomes of care, little is known about the nurse’s potential use of their power to SNT in electronic health records and lack of use of an SNT in electronic health records. Method: This descriptive, correlational, and cross-sectional study was conducted using survey methodology to assess the nurse’s use of power to influence the SNT in electronic health records. The Theory of Group Power within Organizations (TGPO) provided the conceptual framework for this study. A total of (n=232) nurses responded to the survey, posted on three nursing organizations’ websites. Results revealed the mean Cronbach’s alpha of the subscales was .94, suggesting high internal consistency. The mean power capability score was moderately high, at 134.22 (SD = 18.49). Power Capacity was significantly correlated with Power Capability (r = .96, p < .001). Power Capacity subscales were significantly correlated with Power Capacity and Power Capability. Conclusion: The mean Cronbach’s alpha of the subscales was .94 suggestive of reliability of the instrument. Nurses could potentially use power to achieve their goals, such as the implementation of SNT in electronic health records.

Keywords: nurses, power, actualized power, nursing terminology, electronic health records

Procedia PDF Downloads 248
5112 The Relationship of Television Viewers with Brand Awareness and Brand Loyalty: A Case Study of Bangkok, Thailand

Authors: Natnicha Hasoontree

Abstract:

The purposes of this research was to study the relationship of television viewers with brand awareness and brand loyalty from the perspective of customers in Bangkok. A probability random sampling of 482 television viewers was utilized. A Likert-five-scale questionnaire was designed to collect the data and small in-depth interviews were also used to obtain their opinions. The findings revealed that the majority of respondents reported a positive relationship between time of viewing television and brand awareness and brand loyalty. The more they watched the advertisement of a particular brand, the more positive the information was perceived and thereby increasing brand loyalty. Finally, the findings from the in-depth interviews with small group of television producers revealed that they are convinced that advertising exposure had a positive impact on brand awareness and brand loyalty.

Keywords: brand awareness, brand loyalty, television viewers, advertisement

Procedia PDF Downloads 306
5111 Simulation of 140 Kv X– Ray Tube by MCNP4C Code

Authors: Amin Sahebnasagh, Karim Adinehvand, Bakhtiar Azadbakht

Abstract:

In this study, we used Monte Carlo code (MCNP4C) that is a general method, for simulation, electron source and electric field, a disc source with 0.05 cm radius in direct of anode are used, radius of disc source show focal spot of x-ray tube that here is 0.05 cm. In this simulation, anode is from tungsten with 18.9 g/cm3 density and angle of anode is 180. we simulated x-ray tube for 140 kv. For increasing of speed data acquisition we use F5 tally. With determination the exact position of F5 tally in program, outputs are acquired. In this spectrum the start point is about 0.02 Mev, the absorption edges are about 0.06 Mev and 0.07 Mev and average energy is about 0.05 Mev.

Keywords: x-spectrum, simulation, Monte Carlo, MCNP4C code

Procedia PDF Downloads 642
5110 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 92
5109 Nabokov’s Lolita: Externalization of Contemporary Mind in the Configuration of Hedonistic Aesthetics

Authors: Saima Murtaza

Abstract:

Ethics and aesthetics have invariably remained the two closely integrated artistic appurtenances for the production of any work of art. These artistic devices configure themselves into a complex synthesis in our contemporary literature. The labyrinthine integration of ethics and aesthetics, operating in the lives of human characters, to the extent of transcending all limits has resulted in an artistic puzzle for the readers. Art, no doubt, is an extrinsic expression of the intrinsic life of man. The use of aesthetics in literature pertaining to human existence; aesthetic solipsism, has resulted in the artistic objectification of these characters. The practice of the like aestheticism deprives the characters of their souls, rendering them as mere objects of aesthetic gaze at the hands of their artists-creators. Artists orchestrate their lives founding it on a plot which deviates from normal social and ethical standards. Their perverse attitude can be seen in dealing with characters, their feelings and the incidents of their lives. Morality is made to appear not as a religious construct but as an individual’s private affair. Furthermore, the idea of beauty incarnated, in other words hedonistic aesthetic does not placate a true aesthete. Ethics and aesthetics are the two most recurring motifs of our contemporary literature, especially of Nabokov’s world. The purpose of this study is to peruse these aforementioned motifs in Nabokov’s most enigmatic novel Lolita, a story of pedophilia, which is in fact reflective of our complex individual psychic and societal patterns. The narrative subverts all the traditional and hitherto known notions of aesthetics and ethics. When applied to literature, aesthetic does not simply mean ‘beautiful’ in the text. It refers to an intricate relationship between feelings and perception and also incorporates within its range wide-ranging emotional reactions to text. The term aesthetics in literature is connected with the readers whose critical responses to the text determine the merit of any work to be really a piece of art. Aestheticism is the child of ethics. Morality sets the grounds for the production of any work and the idea of aesthetics gives it transcendence.

Keywords: ethics, aesthetics and hedonistic aesthetic, nymphet syndrome, pedophilia

Procedia PDF Downloads 153
5108 Four Phase Methodology for Developing Secure Software

Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García

Abstract:

A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.

Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis

Procedia PDF Downloads 392
5107 A Randomised Controlled Trial on the Nurse-Led Smartphone-Based Self-Management Programme for Type 2 Diabetes Patients with Poor Glycemic Control

Authors: Wenru Wang

Abstract:

Over the past decades, Asia has emerged as the ‘diabetes epicentre’ in the world due to rapid economic development, urbanization and nutrition transition. There is an urgent need to develop more effective and cost-effective care management strategies in response to this rising diabetes epidemic. This study aims to develop and compare a nurse-led smartphone-based self-management programme with an existing nurse-led diabetes service on health-related outcomes among type 2 diabetes patients with poor glycemic control in Singapore. We proposed a randomized controlled trial with pre- and repeated post-tests control group design. A total of 128 type 2 diabetes patients with poor glycemic control will be recruited from the diabetes clinic of an acute public hospital in Singapore through convenience sampling. Study participants will be either randomly allocated to the experimental group or control group. Outcome measures used will include the 10-item General Self-Efficacy Scale, 11-item Revised Summary of Diabetes Self-care Activities, and 19-item Diabetes-Dependent Quality of Life. Data will be collected at 3-time points: baseline, three months and six months from the baseline, respectively. It is expected that this programme will be an alternative offered to diabetes patients to master their self-care management skills, in addition to the existing diabetes service provided in diabetes clinics in Singapore hospitals. Also, the self-supporting and less resource-intensive nature of this programme, through the use of smartphone app as a mode of intervention delivery, will greatly reduce nurses’ direct contact time with patients and allow more time to be allocated to those who require more attention. The study has been registered with clinicaltrials.gov. The trial registration number is NCT03088475.

Keywords: type 2 diabetes, poor glycaemic control, nurse-led, smartphone-based, self-management, health-relevant outcomes

Procedia PDF Downloads 192
5106 Honour Killing in Iraqi Statutory Law

Authors: Hersh Azeez

Abstract:

Honour killing, also known as "honor killing," is a deeply rooted and complex social issue that persists in many parts of the world, including Iraq. This paper seeks to examine the legal framework surrounding honour killing in Iraqi statutory law. The paper begins with an introduction to honour killing as a phenomenon and its cultural and societal context in Iraq. It then delves into the methodology used in this research, including a comprehensive review of relevant legal texts, case studies, and scholarly articles. The paper analyzes the existing legal framework in Iraq, including relevant penal code provisions and other relevant legislation, as well as the challenges and shortcomings in addressing honour killing in the country. The research findings reveal that despite some legal provisions aimed at addressing honour killing, the practice continues to persist due to a lack of effective implementation, societal norms, and cultural attitudes. The paper concludes with recommendations for improving the legal framework to combat honour killing in Iraq, including legal reforms, education and awareness campaigns, and cultural change initiatives.

Keywords: honour killing, Iraq, statutory law, legal framework, penal code, cultural norms

Procedia PDF Downloads 60
5105 The Increasing Importance of the Role of AI in Higher Education

Authors: Joshefina Bengoechea Fernandez, Alex Bell

Abstract:

In its 2021 guidance for policy makers, the UNESCO has proposed 4 areas where AI can be applied in educational settings: These are: 1) Education management and delivery; 2) Learning and assessment; 3) Empowering teachers and facilitating teaching, and 4) Providing lifelong learning possibilities (UNESCO, 2021). Like with wblockchain technologies, AI will automate the management of educational institutions. These include, but are not limited to admissions, timetables, attendance, and homework monitoring. Furthermore, AI will be used to select relevant learning content across learning platforms for each student, based on his or her personalized needs. A problem educators face is the “one-size-fits-all” approach that does not work with a diverse student population. The purpose of this paper is to illustrate if the implementation of Technology is the solution to the Problems faced in Higher Education. The paper builds upon a constructivist approach, combining a literature review and research on key publications and academic reports.

Keywords: artificial intelligence, learning platforms, students personalised needs, life- long learning, privacy, ethics

Procedia PDF Downloads 98
5104 Influence of Error Correction Codes on the Quality of Optical Broadband Connections

Authors: Mouna Hemdi, Jamel bel Hadj Tahar

Abstract:

The increasing development of multimedia applications requiring the simultaneous transport of several different services contributes to the evolution of the need for very high-speed network. In this paper, we propose an effective solution to achieve the very high speed while retaining elements of the optical transmission channel. So our study focuses on error correcting codes that aim for quality improvement on duty. We present a comparison of the quality of service for single channels and integrating the code BCH, RS and LDPC in order to find the best code in the different conditions of the transmission.

Keywords: code error correction, high speed broadband, optical transmission, information systems security

Procedia PDF Downloads 388
5103 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level

Authors: Afroza Akhter Tina

Abstract:

This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.

Keywords: communicative strategies, competency, attitude, frequency

Procedia PDF Downloads 405
5102 Cryptocurrencies: Business Students’ Awareness and Universities’ Adoption Readiness and Compatibility of Use Considering the Mediation of Attitudes

Authors: Eric S. Parilla, Marc Edward Abadilla

Abstract:

The study aims to determine the effect of awareness of business students towards cryptocurrencies and the readiness of universities and colleges to accept cryptocurrencies as a medium of exchange, considering the mediation of business students’ attitudes. The research used partial least squares structural equation modeling (PLS-SEM) and deployed a questionnaire attuned to the awareness and attitudes of business students towards cryptocurrencies and readiness and compatibility of use in universities and colleges in Ilocos Norte. The output of the investigation revealed that awareness of business students is not correlated to the readiness of universities and colleges, which means that even though students understand cryptocurrencies, it is not an assurance that universities and colleges are ready to accept them as the medium of exchange. The study proposes that training and seminars for business students and professionals should be conducted to expand understanding and acceptance of cryptocurrencies.

Keywords: cryptocurrencies, awareness, readiness, attitudes

Procedia PDF Downloads 214
5101 Influence of Javascript Programming on the Developement of Web and Mobile Application

Authors: Abdul Basit Kiani

Abstract:

Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.

Keywords: java script, react, nodejs, htmlcsss

Procedia PDF Downloads 109
5100 Virtue, Truth, Freedom, And The History Of Philosophy

Authors: Ashley DelCorno

Abstract:

GEM Anscombe’s 1958 essay Modern Moral Philosophy and the tradition of virtue ethics that followed has given rise to the restoration (or, more plainly, the resurrection) of Aristotle as something of an authority figure. Alisdair MacIntyre and Martha Nussbaum are proponents, for example, not just of Aristotle’s relevancy but also of his apparent implicit authority. That said, it’s not clear that the schema imagined by virtue ethicists accurately describes moral life or that it does not inadvertently work to impoverish genuine decision-making. If the label ‘virtue’ is categorically denied to some groups (while arbitrarily afforded to others), it can only turn on itself, thus rendering ridiculous its own premise. Likewise, as an inescapable feature of virtue ethics, Aristotelean binaries like ‘virtue/vice’ and ‘voluntary/involuntary’ offer up false dichotomies that may seriously compromise an agent’s ability to conceptualize choices that are truly free and rooted in meaningful criteria. Here, this topic is analyzed through a feminist lens predicated on the known paradoxes of patriarchy. The work of feminist theorists Jacqui Alexander, Katharine Angel, Simone de Beauvoir, bell hooks, Audre Lorde, Imani Perry, and Amia Srinivasan serves as important guideposts, and the argument here is built from a key tenet of black feminist thought regarding scarcity and possibility. Above all, it’s clear that though the philosophical tradition of virtue ethics presents itself as recovering the place of agency in ethics, its premises possess crippling limitations toward the achievement of this goal. These include, most notably, virtue ethics’ binding analysis of history, as well as its axiomatic attachment to obligatory clauses, problematic reading-in of Aristotle and arbitrary commitment to predetermined and competitively patriarchal ideas of what counts as a virtue.

Keywords: feminist history, the limits of utopic imagination, curatorial creation, truth, virtue, freedom

Procedia PDF Downloads 79
5099 A New Scheme for Chain Code Normalization in Arabic and Farsi Scripts

Authors: Reza Shakoori

Abstract:

This paper presents a structural correction of Arabic and Persian strokes using manipulation of their chain codes in order to improve the rate and performance of Persian and Arabic handwritten word recognition systems. It collects pure and effective features to represent a character with one consolidated feature vector and reduces variations in order to decrease the number of training samples and increase the chance of successful classification. Our results also show that how the proposed approaches can simplify classification and consequently recognition by reducing variations and possible noises on the chain code by keeping orientation of characters and their backbone structures.

Keywords: Arabic, chain code normalization, OCR systems, image processing

Procedia PDF Downloads 396
5098 The Development and Validation of the Awareness to Disaster Risk Reduction Questionnaire for Teachers

Authors: Ian Phil Canlas, Mageswary Karpudewan, Joyce Magtolis, Rosario Canlas

Abstract:

This study reported the development and validation of the Awareness to Disaster Risk Reduction Questionnaire for Teachers (ADRRQT). The questionnaire is a combination of Likert scale and open-ended questions that were grouped into two parts. The first part included questions relating to the general awareness on disaster risk reduction. Whereas, the second part comprised questions regarding the integration of disaster risk reduction in the teaching process. The entire process of developing and validating of the ADRRQT was described in this study. Statistical and qualitative findings revealed that the ADRRQT is significantly valid and reliable and has the potential of measuring awareness to disaster risk reduction of stakeholders in the field of teaching. Moreover, it also shows the potential to be adopted in other fields.

Keywords: awareness, development, disaster risk reduction, questionnaire, validation

Procedia PDF Downloads 223
5097 Smart Signature - Medical Communication without Barrier

Authors: Chia-Ying Lin

Abstract:

This paper explains how to enhance doctor-patient communication and nurse-patient communication through multiple intelligence signing methods and user-centered. It is hoped that through the implementation of the "electronic consent", the problems faced by the paper consent can be solved: storage methods, resource utilization, convenience, correctness of information, integrated management, statistical analysis and other related issues. Make better use and allocation of resources to provide better medical quality. First, invite the medical records department to assist in the inventory of paper consent in the hospital: organising, classifying, merging, coding, and setting. Second, plan the electronic consent configuration file: set the form number, consent form group, fields and templates, and the corresponding doctor's order code. Next, Summarize four types of rapid methods of electronic consent: according to the doctor's order, according to the medical behavior, according to the schedule, and manually generate the consent form. Finally, system promotion and adjustment: form an "electronic consent promotion team" to improve, follow five major processes: planning, development, testing, release, and feedback, and invite clinical units to raise the difficulties faced in the promotion, and make improvements to the problems. The electronic signature rate of the whole hospital will increase from 4% in January 2022 to 79% in November 2022. Use the saved resources more effectively, including: reduce paper usage (reduce carbon footprint), reduce the cost of ink cartridges, re-plan and use the space for paper medical records, and save human resources to provide better services. Through the introduction of information technology and technology, the main spirit of "lean management" is implemented. Transforming and reengineering the process to eliminate unnecessary waste is also the highest purpose of this project.

Keywords: smart signature, electronic consent, electronic medical records, user-centered, doctor-patient communication, nurse-patient communication

Procedia PDF Downloads 119
5096 An Analytical Approach for Medication Protocol Errors from Pediatric Nurse Curriculum

Authors: Priyanka Jani

Abstract:

The main focus of this research is to consider the objective of nursing curriculum in concern with pediatric nurses in respect to various parameters such as causes, reporting and prevention of medication protocol errors. A design or method selected for the study is the descriptive and cross sectional with respect to analytical study. Nurses were selected from inpatient pediatric wards of 5 hospitals in Gujarat, as a population. 126 pediatric nurses gave approval to participate in the research and completed with quarter questionnaires. The actual data was collected and analyzed. The actual data was collected and analyzed. The medium age of the nurses was 25.7 ± 3.68 years; the maximum was lady (97.6%) pediatric nurses stated that the most common causes of medication protocol errors were large work time (69.2%) and a huge ratio of patient: nurse (59.9%). Even though the highest number of nurses (89%) made use of a medication protocol errors notification system, or else they use to check it before. Many errors were not reported and nurses cited abeyant claims of nurses in case of adverse and opposite output for patient (53.97%), distrust (52.45%), and fear of various/different protocol for mediations (42%) among the causes of insufficient of notification in concern to ignorance, nurses most commonly noted the requirement for efficient data concerning the safe use of medications (47.5%). This is the frequent study made by researcher in Gujarat about the pediatric nurse curriculum regarding medication protocol errors. The outputs debate that there is a requirement for ongoing coaching of pediatric nurses regarding safe & secure medication observation and that the causes and post reporting of medication protocol errors by hand further survey.

Keywords: pediatric, medication, protocol, errors

Procedia PDF Downloads 288