Search results for: cyber security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5330

Search results for: cyber security awareness

2240 The Use of Learning Management Systems during Emerging the Tacit Knowledge

Authors: Ercan Eker, Muhammer Karaman, Akif Aslan, Hakan Tanrikuluoglu

Abstract:

Deficiency of institutional memory and knowledge management can result in information security breaches, loss of prestige and trustworthiness and the worst the loss of know-how and institutional knowledge. Traditional learning management within organizations is generally handled by personal efforts. That kind of struggle mostly depends on personal desire, motivation and institutional belonging. Even if an organization has highly motivated employees at a certain time, the institutional knowledge and memory life cycle will generally remain limited to these employees’ spending time in this organization. Having a learning management system in an organization can sustain the institutional memory, knowledge and know-how in the organization. Learning management systems are much more needed especially in public organizations where the job rotation is frequently seen and managers are appointed periodically. However, a learning management system should not be seen as an organizations’ website. It is a more comprehensive, interactive and user-friendly knowledge management tool for organizations. In this study, the importance of using learning management systems in the process of emerging tacit knowledge is underlined.

Keywords: knowledge management, learning management systems, tacit knowledge, institutional memory

Procedia PDF Downloads 362
2239 Benchmarking of Pentesting Tools

Authors: Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is something that is done periodically, because these tools from time to time update their knowledge base and search algorithms, in order to improve their accuracy. Unfortunately, the vast majority of these evaluations are made by software enthusiasts who publish their results on blogs or on non-academic websites and always with the same evaluation methodology. Similarly, academics who have carried out this type of analysis from a scientific approach, the majority, make their analysis within the same methodology as well the empirical authors. This paper is based on the interest of finding answers to questions that many users of this type of tools have been asking over the years, such as, to know if the tool truly test and evaluate every vulnerability that it ensures do, or if the tool, really, deliver a real report of all the vulnerabilities tested and exploited. This kind of questions have also motivated previous work but without real answers. The aim of this paper is to show results that truly answer, at least on the tested tools, all those unanswered questions. All the results have been obtained by changing the common model of benchmarking used for all those previous works.

Keywords: cybersecurity, IDS, security, web scanners, web vulnerabilities

Procedia PDF Downloads 304
2238 A Retrospective Study of Suicidal Deaths in Madinah for Ten Years

Authors: Radah Yousuf, Ashraf Shebl

Abstract:

Suicide is a tragic event with strong emotional repercussions for its survivors and for families of its victims. There were thousands of cases all over the world. There are many risk factors include mental disorders such as depression, and substance abuse, including alcoholism and use of benzodiazepines. Other suicides are impulsive acts due to stress such as from financial difficulties, troubles with relationships, or from bullying. The aim of work in this study is making a survey from archives of the suicidal cases, which had a medicolegal examination, in forensic medicine center in Al Madinah Almunawarah-KSA, for ten years in the period between 1428-1438h. In each case, some data are collected such as age, sex, time and place of an act, method of suicide, the presence of the witness, medical history. This study demonstrates that suicide is more common in male than female, and the 4th decade was the most period of age. The most common method of suicide was hanging followed by falling from the height. These results indicated that cultural and religious beliefs that discourage suicide and support self-preservation instinct, and suicide education programs provide information to students in high school, builds awareness, one of the most important issues in solving that problem. From the forensic view, circumstantial evidence of every forensic case must take and record, full history about the social, medical and psychological problems, attend the scene of death is a very important, complete medicolegal investigation for every case, and full autopsy with very skilled techniques and facilities can help in diagnosing what type of crimes.

Keywords: suicide, age, sex, hanging

Procedia PDF Downloads 128
2237 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 131
2236 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 235
2235 Employees and Their Perception of Soft Skills on Their Employability

Authors: Sukrita Mukherjee, Anindita Chaudhuri

Abstract:

Soft skills are a crucial aspect for employees, and these skills are not confined to any particular field rather, it guarantees further career growth and job opportunities for employees who are seeking growth. Soft skills are also regarded as personality-specific skills that are observable and are qualitative in nature, which determines an employee’s strengths as a leader. When an employee intends to hold his job, then the person must make effective use of his personal resources, that, in turn, impacts his employability in a positive manner. An employee at his workplace is expected to make effective use of his personal resources. The resources that are to be used by the employee are generally of two types. First type of resources are occupation related, which is related with the educational background of the employee, and the second type of resources are the psychological resources of the employee, such as self-knowledge, career orientation awareness, sense of purpose and emotional literacy, that are considered crucial for an employee in his workplace. The present study is a qualitative study which includes 10 individuals working in IT Sector and Service Industry, respectively. For IT sector, graduate people are considered, and for the Service Industry, individuals who have done a Professional course in order to get into the industry are considered. The emerging themes from the findings after thematic analysis reveal that different aspect of Soft skills such as communication, decision making, constant learning, keeping oneself updated with the latest technological advancement, emotional intelligence are some of the important factors that helps an employee not only to sustain his job, but also grow in his workplace.

Keywords: employabiliy, soft skils, employees, resources, workplace

Procedia PDF Downloads 48
2234 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 62
2233 Analysis of Genetic Variations in Camel Breeds (Camelus dromedarius)

Authors: Yasser M. Saad, Amr A. El Hanafy, Saleh A. Alkarim, Hussein A. Almehdar, Elrashdy M. Redwan

Abstract:

Camels are substantial providers of transport, milk, sport, meat, shelter, security and capital in many countries, particularly in Saudi Arabia. Inter simple sequence repeat technique was used to detect the genetic variations among some camel breeds (Majaheim, Safra, Wadah, and Hamara). Actual number of alleles, effective number of alleles, gene diversity, Shannon’s information index and polymorphic bands were calculated for each evaluated camel breed. Neighbor-joining tree that re-constructed for evaluated these camel breeds showed that, Hamara breed is distantly related from the other evaluated camels. In addition, the polymorphic sites, haplotypes and nucleotide diversity were identified for some camelidae cox1 gene sequences (obtained from NCBI). The distance value between C. bactrianus and C. dromedarius (0.072) was relatively low. Analysis of genetic diversity is an important way for conserving Camelus dromedarius genetic resources.

Keywords: camel, genetics, ISSR, neighbor-joining

Procedia PDF Downloads 455
2232 Assessment of Smart Mechatronics Application in Agriculture

Authors: Sairoel Amertet, Girma Gebresenbet

Abstract:

Smart mechatronics systems in agriculture can be traced back to the mid-1980s, when research into automated fruit harvesting systems began in Japan, Europe, and the United States. Since then, impressive advances have been made in smart mechatronics systems. Furthermore, smart mechatronics systems are promising areas, and as a result, we were intrigued to learn more about them. Consequently, the purpose of this study was to examine the smart mechatronic systems that have been applied to agricultural areas so far, with inspiration from the smart mechatronic system in other sectors. To get an overview of the current state of the art, benefits and drawbacks of smart mechatronics systems, various approaches were investigated. Moreover, smart mechatronic modules and various networks applied in agriculture processing were examined. Finally, we explored how the data retrieved using the one-way analysis of variance related to each other. The result showed that there were strongly related keywords for different journals. With the virtually limited use of sophisticated mechatronics in the agricultural industry and, at the same time, the low production rate, the demand for food security has fallen dramatically. Therefore, the application of smart mechatronics systems in agricultural sectors would be taken into consideration in order to overcome these issues.

Keywords: mechatronics, robotic, robotic system, automation, agriculture mechanism

Procedia PDF Downloads 62
2231 The Impact of Artificial Intelligence on Torism Ouputs

Authors: Nancy Ayman Kamal Mohamed Mehrz

Abstract:

As the economies of other countries in the Mediterranean Basin, the tourism sector in our country has a high denominator in economics. Tourism businesses, which are building blocks of tourism, sector faces with a variety of problems during their activities. These problems faced make business efficiency and competition conditions of the businesses difficult. Most of the problems faced by the tourism businesses and the information of consumers about consumers’ rights were used in this study, which is conducted to determine the problems of tourism businesses in the Central Anatolia Region. It is aimed to contribute the awareness of staff and executives working at tourism sector and to attract attention of businesses active concurrently with tourism sector and legislators. E-tourism is among the issues that have recently been entered into the field of tourism. In order to achieve this type of tourism, Information and Communications Technology (or ICT) infrastructures as well as Co-governmental organizations and tourism resources are important. In this study, the opinions of managers and tourism officials about the e-tourism in Leman city were measured; it also surveyed the impact of level of digital literacy of managers and tourism officials on attracting tourists. This study was conducted. One of the environs of the Esfahan province. This study is a documentary – survey and the sources include library resources and also questionnaires. The results obtained indicate that if managers use ICT, it may help e-tourism to be developed in the region, and increasing managers’ beliefs on e-tourism and upgrading their level of digital literacy may affect e-tourism development.

Keywords: financial problems, the problems of tourism businesses, tourism businesses, internet, marketing, tourism, tourism management economic competitiveness, enhancing competitiveness

Procedia PDF Downloads 56
2230 An Empirical Study of Determinants Influencing Telemedicine Services Acceptance by Healthcare Professionals: Case of Selected Hospitals in Ghana

Authors: Jonathan Kissi, Baozhen Dai, Wisdom W. K. Pomegbe, Abdul-Basit Kassim

Abstract:

Protecting patient’s digital information is a growing concern for healthcare institutions as people nowadays perpetually live their lives through telemedicine services. These telemedicine services have been confronted with several determinants that hinder their successful implementations, especially in developing countries. Identifying such determinants that influence the acceptance of telemedicine services is also a problem for healthcare professionals. Despite the tremendous increase in telemedicine services, its adoption, and use has been quite slow in some healthcare settings. Generally, it is accepted in today’s globalizing world that the success of telemedicine services relies on users’ satisfaction. Satisfying health professionals and patients are one of the crucial objectives of telemedicine success. This study seeks to investigate the determinants that influence health professionals’ intention to utilize telemedicine services in clinical activities in a sub-Saharan African country in West Africa (Ghana). A hybridized model comprising of health adoption models, including technology acceptance theory, diffusion of innovation theory, and protection of motivation theory, were used to investigate these quandaries. The study was carried out in four government health institutions that apply and regulate telemedicine services in their clinical activities. A structured questionnaire was developed and used for data collection. Purposive and convenience sampling methods were used in the selection of healthcare professionals from different medical fields for the study. The collected data were analyzed based on structural equation modeling (SEM) approach. All selected constructs showed a significant relationship with health professional’s behavioral intention in the direction expected from prior literature including perceived usefulness, perceived ease of use, management strategies, financial sustainability, communication channels, patients security threat, patients privacy risk, self efficacy, actual service use, user satisfaction, and telemedicine services systems securities threat. Surprisingly, user characteristics and response efficacy of health professionals were not significant in the hybridized model. The findings and insights from this research show that health professionals are pragmatic when making choices for technology applications and also their willingness to use telemedicine services. They are, however, anxious about its threats and coping appraisals. The identified significant constructs in the study may help to increase efficiency, quality of services, quality patient care delivery, and satisfactory user satisfaction among healthcare professionals. The implantation and effective utilization of telemedicine services in the selected hospitals will aid as a strategy to eradicate hardships in healthcare services delivery. The service will help attain universal health access coverage to all populace. This study contributes to empirical knowledge by identifying the vital factors influencing health professionals’ behavioral intentions to adopt telemedicine services. The study will also help stakeholders of healthcare to formulate better policies towards telemedicine service usage.

Keywords: telemedicine service, perceived usefulness, perceived ease of use, management strategies, security threats

Procedia PDF Downloads 126
2229 The Mediterranean Migration Crisis: The North East Hotspot Policy

Authors: Loizos A. Hadjivasiliou, May Chehab

Abstract:

Confronted with the human tragedy unfolding in the Mediterranean during the 2011-2016 period, the European Union introduced for the first time the “hotspot approach”, the establishment of facilities for initial reception, identification registration, and fingerprinting of asylum seekers and migrants arriving in the EU by sea, at the frontline Member States. However, the lack of a comprehensive collective policy on migration management and border security left the Mediterranean Member States, mainly Italy, Greece, and Cyprus, struggling to overcome these challenges. The current study sheds light on the implementation of the hotspot approach as the frontispiece of the European response to the migration challenges, which, limited to the operational and financial support of the hosting member states, leads to heterogeneous burden-sharing. Within this framework, it highlights the fact that the implementation of the hotspots as a panacea carries the risk of transforming the Mediterranean member states into giant hotspots with unpredictable consequences for the future of the Schengen area.

Keywords: asylum, burden sharing, hotspots, migration management policy, Schengen area

Procedia PDF Downloads 164
2228 The Ra 9262 (Anti-Violence Against Women and Their Children Act of 2004) in the Literature Classroom via the Movie ‘Enough’

Authors: Jay Neil Garciso Verano, Peter Rosales Bobiles

Abstract:

This study tried to integrate RA 9262 in literature through the use of film. It identified RA 9262 provisions reflected in the students’ concepts in their oral participation and written outputs and pointed out different attitudes toward violence against women and respect to women as shaped by the film through their responses. Four Literature 121 (World Literature) classes with more or less similar characteristics participated in this study. The discussion of Paulette Kelly’s I Got Flowers Today took place during the first session while the viewing of the film Enough and discussion of the film followed to enrich and bolster students’ concepts and awareness on violence against women and to introduce RA 9262 provisions. The students’ attitudes toward violence against women and respect to women were lifted from the students’ oral and written responses. The film Enough presented eight provisions from RA 9262 reflected in students’ concepts which centered on the acts of violence against women tarnishing women’s rights and dignity. There were 25 attitudes toward violence against women and respect to women which surfaced, 11 of which are what initiate the acts, seven tell about the results from or effects of violence against women, and another seven exemplify respect to women. With the findings, it can be viewed that RA 9262 can be integrated in a literature course to awaken students’ minds on the prevalent issues on violating women’s rights and dignity. The discussion of Paulette Kelly’s I Got Flowers Today reinforced by the viewing of Enough deduced issues on the violation of women’s rights and dignity, attitudes toward violence against women, and students’ perception with regard respect to women.

Keywords: anti-violence against women, literature, film, enough, feminism

Procedia PDF Downloads 363
2227 Beyond Bindis, Bhajis, Bangles, and Bhangra: Exploring Multiculturalism in Southwest England Primary Schools, Early Research Findings

Authors: Suparna Bagchi

Abstract:

Education as a discipline will probably be shaped by the importance it places on a conceptual, curricular, and pedagogical need to shift the emphasis toward transformative classrooms working for positive change through cultural diversity. Awareness of cultural diversity and race equality has heightened following George Floyd’s killing in the USA in 2020. This increasing awareness is particularly relevant in areas of historically low ethnic diversity which have lately experienced a rise in ethnic minority populations and where inclusive growth is a challenge. This research study aims to explore the perspectives of practitioners, students, and parents towards multiculturalism in four South West England primary schools. A qualitative case study methodology has been adopted framed by sociocultural theory. Data were collected through virtually conducted semi-structured interviews with school practitioners and parents, observation of students’ classroom activities, and documentary analysis of classroom displays. Although one-third of the school population includes ethnically diverse children, BAME (Black, Asian, and Minority Ethnic) characters featured in children's books published in Britain in 2019 were almost invisible, let alone a BAME main character. The Office for Standards in Education, Children's Services and Skills (Ofsted) are vocal about extending the Curriculum beyond the academic and technical arenas for pupils’ broader development and creation of an understanding and appreciation of cultural diversity. However, race equality and community cohesion which could help in the students’ broader development are not Ofsted’s school inspection criteria. The absence of culturally diverse content in the school curriculum highlighted by the 1985 Swann Report and 2007 Ajegbo Report makes England’s National Curriculum look like a Brexit policy three decades before Brexit. A revised National Curriculum may be the starting point with the teachers as curriculum framers playing a significant part. The task design is crucial where teachers can place equal importance on the interwoven elements of “how”, “what” and “why” the task is taught. Teachers need to build confidence in encouraging difficult conversations around racism, fear, indifference, and ignorance breaking the stereotypical barriers, thus helping to create students’ conception of a multicultural Britain. Research showed that trainee teachers in predominantly White areas often exhibit confined perspectives while educating children. Irrespective of the geographical location, school teachers can be equipped with culturally responsive initial and continuous professional development necessary to impart multicultural education. This may aid in the reduction of employees’ unconscious bias. This becomes distinctly pertinent to avoid horrific cases in the future like the recent one in Hackney where a Black teenager was strip-searched during period wrongly suspected of cannabis possession. Early research findings show participants’ eagerness for more ethnic diversity content incorporated in teaching and learning. However, schools are considerably dependent on the knowledge-focused Primary National Curriculum in England. Moreover, they handle issues around the intersectionality of disability, poverty, and gender. Teachers were trained in times when foregrounding ethnicity matters was not happening. Therefore, preoccupied with Curriculum requirements, intersectionality issues, and teacher preparations, schools exhibit an incapacity due to which keeping momentum on ethnic diversity is somewhat endangered.

Keywords: case study, curriculum decolonisation, inclusive education, multiculturalism, qualitative research in Covid19 times

Procedia PDF Downloads 98
2226 Muslim Social Workers and Imams’ Recommendations in Marital and Child Custody Cases of Persons with Intellectual or Mental Disability

Authors: Badran Leena, Rimmerman Arie

Abstract:

Arab society in Israel is undergoing modernization and secularization. However, its approach to disability and mental illness is still dominated by religious and traditional stereotypes, as well as folk remedies and community practices. The present study examines differences in Muslim social workers' and Imams' recommendations in marriage/divorce and child custody cases of persons with intellectual disabilities (ID) or mental illness. The study has two goals: (1) To examine differences in recommendations between Imams and Muslim social workers; (2) To explore variables related to their differential recommendations as observed in their responses to vignettes—a quantitative study using vignettes resembling existing Muslim religious (Sharia) court cases. Muslim social workers (138) and Imams (48) completed a background questionnaire, a religiosity questionnaire, and a questionnaire that included 25 vignettes constructed by the researcher based on court rulings adapted for the study. Muslim social workers tended to consider the religious recommendation when the family of a person with ID or mental illness was portrayed in the vignette as religious. The same applied to Imams, albeit to a greater extent. The findings call for raising awareness among social workers and academics regarding the importance of religion and tradition in formulating professional recommendations.

Keywords: child custody, intellectual and developmental disability, marriage/divorce, mental illness, sharia court, social workers

Procedia PDF Downloads 170
2225 Knowledge, Attitude and Compliance of Secondary School Students Towards School Discipline Policy in Ibadan North Local Government Area of Oyo State, Nigeria

Authors: S. Yakubu, E. A. Isah

Abstract:

One of the objectives of the school discipline policy is to instill discipline among students. However, despite the availability of this policy in various secondary schools in Nigeria, there seem to be numerous cases of indiscipline among students, which has become a source of concern to all stakeholders in the education sector. In an attempt to proffer possible solutions to this unending challenge, the study investigated the influence of knowledge and attitude on compliance of secondary school students towards school discipline policy in Ibadan North Local Government Area of Oyo State, Nigeria. The descriptive survey research design was employed to collect the requisite data. The multi-stage sampling procedure was adopted to select 570 respondents as the sample for the study. The data collected were analyzed using statistical measures of Mean, Standard deviation and Pearson Product Moment Correlation. The findings of the study showed that knowledge and compliance of school discipline policy among secondary school students in Ibadan North Local Government Area of Oyo State were significantly related (r =0.330, p<0.05). The study also revealed a significant relationship between attitude and compliance of school discipline policy among secondary school students in Ibadan North Local Government Area of Oyo State (r = 0.593, p<0.05). Based on the findings, it was recommended that school rules and regulations should be emphasized and given more awareness for easy compliance. Also, students should be encouraged to portray a positive attitude towards their respective rules and regulations.

Keywords: knowledge, attitude, compliance, school discipline policy

Procedia PDF Downloads 164
2224 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 108
2223 Knowledge, Attitude, and Practice Among Diabetic Patients About Diabetic Foot Disease in Khartoum State Primary Health Care Centers, November 2022

Authors: Abrar Noorain, Zeinab Amara, Sulaf Abdelaziz

Abstract:

Background: Diabetic foot disease imposes a financial burden on diabetic patients and healthcare services. In Sudan, diabetic foot ulcer prevalence reached 18.1%. This study aims to assess the knowledge, attitudes, and practices and the correlation between the level of foot care knowledge and self-care practices among diabetic patients in Sudan. Methodology: In a cross-sectional study involving 262 patients with type 1 and type 2 diabetes attending diabetic clinics in three primary care centers in Khartoum, Sudan, during September to November 2022, information regarding participants sociodemographic status, foot care knowledge, attitudes, and practices was gathered using a validated, structured questionnaire in a face-to-face interview method. These data were analyzed using the statistical package for the social sciences (SPSS) 22. Results: The patients’ mean age was 54.9 years, with a female predominance (56%). Of the participants, 37% had diabetes mellitus for over ten years. On the topic of foot care, 35.5% of patients showed good knowledge, and 76% were aware of the risk of reduced foot sensation. In relation to nail care, only 19% knew how to cut nails correctly. Conclusion: Knowledge, attitudes, and practices about diabetic foot care are substandard. There is a positive correlation between foot care knowledge and self-care practices. Hence, educating diabetic patients with foot care knowledge through an awareness program and the characteristics of diabetic shoes may improve self-care practices.

Keywords: DM, DFD, DFU, PHC, SPSS

Procedia PDF Downloads 57
2222 An Assessment of Sexual Informational Needs of Breast Cancer Patients in Radiation Oncology

Authors: Li Hoon Lim, Nur Farhanah Said, Katie Simmons, Eric Pei Ping Pang, Sharon Mei Mei Wong

Abstract:

Background and Purpose: Research regarding the sexual impact of breast cancer treatment on Asian women is both sensitive and scarce. This study aims to assess and evaluate the sexual health needs and concerns of breast cancer radiotherapy patients. It is hoped that awareness will be increased and an appropriate intervention can be developed to address the needs of future breast cancer patients. Methods: 110 consecutive unselected breast cancer patients were recruited prospectively. Questionnaires were administered once for patient undergoing radiotherapy to the breast. This study employed an anonymous questionnaire; any breast radiotherapy patient who can read English can voluntarily receive and complete the survey. The questionnaire consisted of items addressing demographics, potential informational needs, and educational preferences. Results: Patients’ interest to address sexual concerns decreases with age (p=0.024). Coherently, sexual concerns of patients are reported to decrease with age (p=0.015) where 70% of all respondents below age 50 [age 20-29 (60%); 30-39 (56.3%); 40-49(55.1%)] have started to have sexual concerns regarding their treatment effects on their sexual health. Patients who underwent breast conservation surgery (42.2%) and reconstruction surgery (83.3%) were more likely to have concerns about sexual health versus patients who underwent mastectomy (36.7%) (p=0.032). 74.2% of patients with sexual concern regardless of age would initiate conversation with their healthcare providers (p < 0.001). Conclusions: The results showed a staggering interest of female patients wanting information on this area which would not only boost their confidence and body image but also address concerns of the effect of breast radiotherapy on sexual health during their treatment.

Keywords: breast cancer, breast radiotherapy, sexual health, sexual impact

Procedia PDF Downloads 189
2221 A Comparative Analysis of Evacuation Behavior in Case of Cyclone Sidr, Typhoon Yolanda and the Great East Japan Earthquake

Authors: Swarnali Chakma, Akihiko Hokugo

Abstract:

Research on three case studies reviewed here explains many aspects and complications of evacuation behavior during an emergency period. The scenario and phenomenon of the disaster were different, but the similarities are that after receiving the warning peoples does not take it seriously. Many individuals evacuated after taking some kind of action, for example; return to home, searching for family members, prepared valuable things etc. Based on a review of the literature, the data identified a number of factors that help explain evacuation behavior during the disaster. In the case of Japan, cultural inhibitors impact people’s behavior; for example, following the traffic rules, some people lost their time to skip because of the slow-moving car makes overcrowded traffic and some of them were washed away by the tsunami. In terms of Bangladeshi culture, women did not want to evacuate without men because staying men and women who do not know each other under the same roof together is not regular practice or comfortable. From these three case studies, it is observed that early warning plays an important role in cyclones, typhoons and earthquakes. A high level of trust from residents in the warning system is important to real evacuation. It is necessary to raise awareness of disaster and provide information on the vulnerability to cyclones, typhoons and earthquakes hazards at community levels. The local level may help decision makers and other stakeholders to make a better decision regarding an effective disaster management.

Keywords: disaster management, emergency period, evacuation, shelter, typhoon

Procedia PDF Downloads 144
2220 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms

Authors: Volkan Kaya, Ersin Elbasi

Abstract:

Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.

Keywords: watermarking, medical image, frequency domain, least significant bits, security

Procedia PDF Downloads 276
2219 Contactless Attendance System along with Temperature Monitoring

Authors: Nalini C. Iyer, Shraddha H., Anagha B. Varahamurthy, Dikshith C. S., Ishwar G. Kubasad, Vinayak I. Karalatti, Pavan B. Mulimani

Abstract:

The current scenario of the pandemic due to COVID-19 has led to the awareness among the people to avoid unneces-sary contact in public places. There is a need to avoid contact with physical objects to stop the spreading of infection. The contactless feature has to be included in the systems in public places wherever possible. For example, attendance monitoring systems with fingerprint biometric can be replaced with a contactless feature. One more important protocol followed in the current situation is temperature monitoring and screening. The paper describes an attendance system with a contactless feature and temperature screening for the university. The system displays a QR code to scan, which redirects to the student login web page only if the location is valid (the location where the student scans the QR code should be the location of the display of the QR code). Once the student logs in, the temperature of the student is scanned by the contactless temperature sensor (mlx90614) with an error of 0.5°C. If the temperature falls in the range of the desired value (range of normal body temperature), then the attendance of the student is marked as present, stored in the database, and the door opens automatically. The attendance is marked as absent in the other case, alerted with the display of temperature, and the door remains closed. The door is automated with the help of a servomotor. To avoid the proxy, IR sensors are used to count the number of students in the classroom. The hardware system consisting of a contactless temperature sensor and IR sensor is implemented on the microcontroller, NodeMCU.

Keywords: NodeMCU, IR sensor, attendance monitoring, contactless, temperature

Procedia PDF Downloads 172
2218 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 110
2217 Waste Prevention and Economic Policy: Policy Tools for Increasing Resource Efficiency and Savings

Authors: Sylvia Graczka

Abstract:

Waste related environmental problems are not only exploding but are also spotlighted for capacity shortages in recycling, as China announced its ban on waste imports. According to the waste hierarchy, prevention is the primary solution for waste, and also the cheapest. Waste related environmental pollution as externality puts an ever-growing burden on communities bearing the social costs. Economic policies often claim to be pro-environment, this often appears only theoretically, or at the level of principles. There are few concrete occurrences of tools in economic policies, such as green taxes, that are truly effective in stimulating the shift towards waste reduction. The paper presents theoretical economic policy tools based on literature review, and case studies on applied economic policy tools by analyzing policy papers, strategies in force, in line with ‘polluter pays’ and ‘extended producer responsibility’ principles. The study also emphasizes the differences between the broader notion of waste reduction and that of waste minimization, parallel to the difference between resource efficiency and resource savings. It also puts the issue in the context of neoclassical environmental economics and ecological economics, to present alternatives in approach. The research concludes in identifying effective economic policy tools that support the reduction of material use, and the prevention of waste. Consumer and producer awareness of waste problems and consciousness related to their choices are inevitable to make economic policy tools work effectively.

Keywords: economic policy, producer responsibility, resource efficiency, waste prevention

Procedia PDF Downloads 132
2216 Economic and Social Well-Being for Migrant Workers: Asian Experiences

Authors: Mohsin Reza, Thirunaukarasu Subramaniam, M. Rezaul Islam

Abstract:

In Asia, economic and social well-being issues are rarely addressed. The major characteristics of the migrant workers in Asian countries are seriously exploited, marginalized, and infrequently looked from human rights perspective. This paper explored the opportunities and shortages of economic and social well-being for the migrant workers in Asia. A Qualitative Interpretative Meta-Synthesis (QIMS) was conducted to analyze the contextual socio-economic factors that characterized migrant workers’ economic and social well-being. It is perceived that in most of the recruiting countries, there are lacks of government commitments to the international protocols, conventions and laws that they ratified towards safeguarding migrant workers’ economic and social well-being. Results showed that the migrant workers had lack of job security, poor salary, long working hours, low access to the public services, poor health, poor living and working conditions, lack of legal rights, physical and mental threats. The finding would be important guideline to the governments, policy makers, legal rights practitioners, and human rights organizations.

Keywords: Asia, economic well-being, social well-being, migrant workers, human rights

Procedia PDF Downloads 303
2215 Removal of Heavy Metals Pb, Zn and Cu from Sludge Waste of Paper Industries Using Biosurfactant

Authors: Nurul Hidayati

Abstract:

Increasing public awareness of environmental pollution influences the search and development of technologies that help in clean up of organic and inorganic contaminants such as metals. Sludge waste of paper industries as toxic and hazardous material from specific source contains Pb, Zn, and Cu metal from waste soluble ink. An alternative and eco-friendly method of remediation technology is the use of biosurfactants and biosurfactant-producing microorganisms. Soil washing is among the methods available to remove heavy metal from sediments. The purpose of this research is to study effectiveness of biosurfactant with concentration = CMC for the removal of heavy metals, lead, zinc and copper in batch washing test under four different biosurfactant production by microbial origin. Pseudomonas putida T1(8), Bacillus subtilis 3K, Acinetobacter sp, and Actinobacillus sp was grown on mineral salt medium that had been already added with 2% concentration of molasses that it is a low cost application. The samples were kept in a shaker 120 rpm at room temperature for 3 days. Supernatants and sediments of sludge were separated by using a centrifuge and samples from supernatants were measured by atomic absorption spectrophotometer. The highest removal of Pb was up to 14,04% by Acinetobacter sp. Biosurfactant of Pseudomonas putida T1(8) have the highest removal for Zn and Cu up to 6,5% and 2,01% respectively. Biosurfactants have a role for removal process of the metals, including wetting, contact of biosurfactant to the surface of the sediments and detachment of the metals from the sediment. Biosurfactant has proven its ability as a washing agent in heavy metals removal from sediments, but more research is needed to optimize the process of removal heavy metals.

Keywords: biosurfactant, removal of heavy metals, sludge waste, paper industries

Procedia PDF Downloads 309
2214 Security Over OFDM Fading Channels with Friendly Jammer

Authors: Munnujahan Ara

Abstract:

In this paper, we investigate the effect of friendly jamming power allocation strategies on the achievable average secrecy rate over a bank of parallel fading wiretap channels. We investigate the achievable average secrecy rate in parallel fading wiretap channels subject to Rayleigh and Rician fading. The achievable average secrecy rate, due to the presence of a line-of-sight component in the jammer channel is also evaluated. Moreover, we study the detrimental effect of correlation across the parallel sub-channels, and evaluate the corresponding decrease in the achievable average secrecy rate for the various fading configurations. We also investigate the tradeoff between the transmission power and the jamming power for a fixed total power budget. Our results, which are applicable to current orthogonal frequency division multiplexing (OFDM) communications systems, shed further light on the achievable average secrecy rates over a bank of parallel fading channels in the presence of friendly jammers.

Keywords: fading parallel channels, wire-tap channel, OFDM, secrecy capacity, power allocation

Procedia PDF Downloads 489
2213 The Influence of Masculinity and Femininity on Lucid Dreaming and Psychosis Proneness

Authors: Anum Atiq, Haya Fatimah

Abstract:

Lucid dream is a dream where one is aware that one is dreaming, and they also might be able to influence their dreaming states. Logically, since lucidity cues towards high awareness, it should be negatively associated with proneness to psychosis. However, this association is scarcely studied. Furthermore, although gender differences and similarities in psychopathology have been thoroughly studied, there is room for research in the influence of masculinity and femininity, regardless of one’s sex, on proneness to psychosis. The aim of this study is twofold: 1) We investigated if dream lucidity was negatively associated with psychosis proneness; and 2) We explored the influence of masculinity and femininity on psychosis proneness, over and above the sex. Data were collected by convenience sampling from the undergraduate students enrolled at the University of Management and Technology, Lahore. The sample consisted of 53 students among the age range of 18-26 (men=24, women=29). Masculinity and femininity were measured using the masculinity and femininity subscales of the Personality Attributes Questionnaire. Dream lucidity was measured with The Lucidity and Consciousness in Dreams Scale; and the reality testing sub scale of The Inventory of Personality Organization was used to measure proneness to psychosis. Pearson correlation analysis revealed that psychosis proneness was significantly and negatively correlated with dream lucidity-insight and negative emotion in dreams, but not with other aspects of dream lucidity. Furthermore, masculinity, in both men and women, was positively related with lucid dreaming, and negatively with psychosis proneness. Following this, linear regression analysis showed that psychosis proneness was negatively predicted by masculinity even after controlling for gender. Lucid dreamer and masculinity both have characteristic of independence, emotional control and internal locus of control. Therefore, masculinity makes lucid dreaming less risk of psychosis in both genders.

Keywords: lucid dreaming, psychosis, gender, masculinity and femininity

Procedia PDF Downloads 198
2212 Rural Tourism Entrepreneurship as Strategy for Economic Development in Nigeria

Authors: Salami Ayobami Taofeek, Ajayi Adeola

Abstract:

Rural tourism entrepreurship is a tourist industry which revolutionizes businesses and prompting economic development across the globe. It encompasses huge range activities, natural or man-made attractions, amenities and facilities, transportation, marketing and information systems. It is also an important export for 83% of the developing countries and the main export for one third of them. In 2000, developing countries recorded 142.6 million international arrivals an increase of 95% compared to the figures of 1990. However, only developing countries with effective natural and man-made tourism supporting and enhancing infrastructure have been able to develop their tourism sector and seize the attendance advantages. Rural areas of Nigeria possess some distinctive peculiarities which can be transformed into attractive tourist centers. In spite of all these, rural tourism areas are still faced with myriad problems which include poor finance inadequate awareness and education, lack of progress in developing the rural of progress in developing the rural tourism potentials inadequate legislation, insecurity, entrepreneurial inertness, over-dependent on oil among others. This paper focuses on the impact and challenges of rural tourism entrepreneurship as strategy for economic development in Nigeria. It reviews literature rural tourism, tourism entrepreneurship potentials and classifications of Nigerians tourism potential’s destinations. The paper concludes that Nigeria Government should encourage rural based tourism entrepreneurship development by addressing the challenges facing rural tourism entrepreneurship in the country.

Keywords: entrepreneurship, economic development, rural tourism, tourism destinations tourism potentials

Procedia PDF Downloads 414
2211 Japan as a Tourism Nation: Emerging Immigrant Entrepreneurship in the Tourism Sector of Kyoto

Authors: Szabó Renáta Andrea

Abstract:

In 2012 Japan created a new plan in order to become a tourism nation. The number of foreign tourists rises rapidly year by year, and with the upcoming Olympics in 2020, tourism turned into a prioritized national strategy. This paper offers a new perspective of tourism research: instead of focusing on the host nation or the inbound tourists, it represents an emerging in-between group: foreign entrepreneur residents. Despite the fact that Japan continuously scores as one of the lowest in East and South Asia related to entrepreneurial activity, in recent years, the activity of foreign entrepreneur residents is on the rise. This study is focused on Kyoto - the former capital of Japan and a popular tourist destination - and applies the mixed embeddedness model, which was used to understand this new phenomena and explore this emerging mediator group between locals and foreign tourists. Immigrant entrepreneurship is often related to a disadvantageous situation, and the businesses are introduced as the sole purpose of making a profit. The study seeks to argue with this point of view and augment the standard approaches to immigrant entrepreneurship. The findings introduce the key factors of this lifestyle choice besides profit and present how entrepreneurship is becoming an escape route to avoid standard working environment while living in Japan. It also shows the gap in the visa system and raises awareness about the emerging trend.

Keywords: immigrant entrepreneurship, Japan, lifestyle entrepreneurship, mixed embeddedness model, tourism

Procedia PDF Downloads 107