Search results for: school security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5910

Search results for: school security

5610 School Emergency Drills Evaluation through E-PreS Monitoring System

Authors: A. Kourou, A. Ioakeimidou, V. Avramea

Abstract:

Planning for natural disasters and emergencies is something every school or educational institution must consider, regardless of its size or location. Preparedness is the key to save lives if a disaster strikes. School disaster management mirrors individual and family disaster prevention, and wider community disaster prevention efforts. This paper presents the usage of E-PreS System as a helpful, managerial tool during the school earthquake drill, in order to support schools in developing effective disaster and emergency plans specific to their local needs. The project comes up with a holistic methodology using real-time evaluation involving different categories of actors, districts, steps and metrics. The main outcomes of E-PreS project are the development of E-PreS web platform that host the needed data of school emergency planning; the development of E-PreS System; the implementation of disaster drills using E-PreS System in educational premises and local schools; and the evaluation of E-PreS System. Taking into consideration that every disaster drill aims to test and valid school plan and procedures; clarify and train personnel in roles and responsibilities; improve interagency coordination; identify gaps in resources; improve individual performance; and identify opportunities for improvement, E-PreS Project was submitted and approved by the European Commission (EC).

Keywords: disaster drills, earthquake preparedness, E-PreS System, school emergency plans

Procedia PDF Downloads 226
5609 The Role of Digital Text in School and Vernacular Literacies: Students Digital Practices at Cybercafés in Mexico

Authors: Guadalupe López-Bonilla

Abstract:

Students of all educational levels participate in literacy practices that may involve print or digital media. Scholars from the New Literacy Studies distinguish practices that fulfill institutional purposes such as those established at schools from literate practices aimed at doing other kinds of activities, such as reading instructions in order to play a video game; the first are known as institutional practices while the latter are considered vernacular literacies. When students perform these kinds of activities they engage with print and digital media according to the demands of the task. In this paper, it is aimed to discuss the results of a research project focusing on literacy practices of high school students at 10 urban cybercafés in Mexico. The main objective was to analyze the literacy practices of students performing both school tasks and vernacular literacies. The methodology included a focused ethnography with online and face to face observations of 10 high school students (5 male and 5 female) and interviews after performing each task. In the results, it is presented how students treat texts as open, dynamic and relational artifacts when engaging in vernacular literacies; while texts are conceived as closed, authoritarian and fixed documents when performing school activities. Samples of each type of activity are shown followed by a discussion of the pedagogical implications for improving school literacy.

Keywords: digital literacy, text, school literacy, vernacular practices

Procedia PDF Downloads 270
5608 A Study of Mental Health of Higher Secondary School Going Children in Rural Area

Authors: Tanmay L. Joshi

Abstract:

The Mental health allows children and young people to develop the resilience to cope with whatever life throws at them and grow into well-rounded, healthy adults. In urban area, many health professionals are working for the well being for younger population. There is so much of potential in rural area. However, the rural population is somehow neglected. Apart from lack of availability of basic needs like transport, electricity, telecommunication etc; the Psychological health is also overlooked in such area. There are no mental health professionals like Psychologists, counselors etc. So the researcher tries to throw some light on the mental health of Higher Secondary School going children in rural area. The current research tries to study the Mental Health (Confidence, Sociability and Neurotic Tendency) of Higher Secondary School going children. Researchers have used the tool Vyaktitva Shodhika (a personality inventory) by Dr. U. Khire (JPIP,Pune). The Sample size is 45 (N= 40, 24 boys/21 girls). The present study may provide a good support to inculcate emotional-management programs for higher secondary school going children in rural areas.

Keywords: mental health, neurotic tendency, rural area, school going children

Procedia PDF Downloads 589
5607 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 140
5606 Indoor Air Assessment and Health Risk of Volatile Organic Compounds in Secondary School Classrooms in Benin City, Edo State, Nigeria

Authors: Osayomwanbor E. Oghama, John O. Olomukoro

Abstract:

The school environment, apart from home, is probably the most important indoor environment for children. Children spend as much as 80-90% of their indoor time either at school or at home; an average of 35 - 40 hours per week in schools, hence are at the risk of indoor air pollutants such as volatile organic compounds (VOCs). Concentrations of VOCs vary widely but are generally higher indoors than outdoors. This research was, therefore, carried out to evaluate the levels of VOCs in secondary school classrooms in Benin City, Edo State. Samples were obtained from a total of 18 classrooms in 6 secondary schools. Samples were collected 3 times from each school and from 3 different classrooms in each school using Draeger ORSA 5 tubes. Samplers were left to stay for a school-week (5 days). The VOCs detected and analyzed were benzene, ethlybenzene, isopropylbenzene, naphthalene, n-butylbenzene, n-propylbenzene, toluene, m-xylene, p-xylene, o-xylene, styrene, chlorobenzene, chloroform, 1,2-dichloropropane, 2,2-dichloropropane, tetrachloroethane, tetrahydrofuran, isopropyl acetate, α-pinene, and camphene. The results showed that chloroform, o-xylene, and styrene were the most abundant while α-pinene and camphene were the least abundant. The health risk assessment was done in terms of carcinogenic (CRI) and non-carcinogenic risks (THR). The CRI values of the schools ranged from 1.03 × 10-5 to 1.36 × 10-5 μg/m³ (a mean of 1.16 × 10-5 μg/m³) with School 6 and School 3 having the highest and lowest values respectively. The THR values of the study schools ranged from 0.071-0.086 μg/m³ (a mean of 0.078 μg/m³) with School 3 and School 2 having the highest and lowest values respectively. The results show that all the schools pose a potential carcinogenic risks having CRI values greater than the recommended limit of 1 × 10-6 µg/m³ and no non-carcinogenic risk having THR values less than the USEPA hazard quotient of 1 µg/m³. It is recommended that school authorities should ensure adequate ventilation in their schools, supplementing natural ventilation with mechanical sources, where necessary. In addition, indoor air quality should be taken into consideration in the design and construction of classrooms.

Keywords: carcinogenic risk indicator, health risk, indoor air, non-carcinogenic risk indicator, secondary schools, volatile organic compounds

Procedia PDF Downloads 190
5605 Evidence-Based Approaches and Effective Practices for Preventing Bullying

Authors: Nato Asatiani

Abstract:

The research underscores the critical role of a positive school climate in combating bullying. The results can be generalized and assumed that bullying behavior occurs when there is a victim, and the environment allows the realization of aggression; school culture is a strong predictor of bullying behavior; the probability of becoming a victim (victimhood) is high among those teenagers who experience high levels of stress in the environment; when a teenager experiences a sense of threat, such physical, psychological, or social symptoms are developed that makes teenagers vulnerable to bullying; the school culture that is oriented to adherence to the rules of communication and mutual respect in the group reduces the likelihood of a teenager to become a victim; consequently, when a teenager has a sense of wellness even in combination with aggression, this sense reduces the likelihood of a teenager to become a victim.

Keywords: bullying, adolescence, aggression, school climate

Procedia PDF Downloads 22
5604 School Based Assessment Issues in Selected Malaysian Primary Schools

Authors: Nur Amalina Dayana Abd Aziz

Abstract:

Assessment is an integral part of teaching and learning in any syllabus in the world. Recently, a new assessment system, School-Based Assessment (SBA) was introduced and implemented in the Malaysian education system to promote a more holistic, integrated and balanced assessment system. This effort is part of the reformation made in the Government Transformation Plan (GTP) to produce a world-class human capital as we are reaching and achieving the Vision 2020 in the near future. However, this new change has raised awareness and concerns from teachers, students, parents and non-profit organizations on how the new assessment is to be implemented and how it is affecting the students and teachers particularly. Therefore, this paper aims to investigate the issues that teachers face in implementing SBA in primary schools, the measures taken to address the issues and to propose ways of managing school-based assessment. Five national primary schools focusing in the urban areas in the Selangor state are chosen for this study to carry out. Data for the study will be gathered from interviews with teachers from each school, surveys and classrooms observation will be conducted in each school, and relevant documents are collected from the selected schools. The findings of this study will present the current issues that teachers from various types of national primary schools are facing and what actions they took to overcome the problems in carrying out SBA. Suggestions on how to better manage school-based assessment for teachers are also provided in this paper.

Keywords: community of practice, curriculum, managing change, school-based assessment

Procedia PDF Downloads 418
5603 Voice Signal Processing and Coding in MATLAB Generating a Plasma Signal in a Tesla Coil for a Security System

Authors: Juan Jimenez, Erika Yambay, Dayana Pilco, Brayan Parra

Abstract:

This paper presents an investigation of voice signal processing and coding using MATLAB, with the objective of generating a plasma signal on a Tesla coil within a security system. The approach focuses on using advanced voice signal processing techniques to encode and modulate the audio signal, which is then amplified and applied to a Tesla coil. The result is the creation of a striking visual effect of voice-controlled plasma with specific applications in security systems. The article explores the technical aspects of voice signal processing, the generation of the plasma signal, and its relationship to security. The implications and creative potential of this technology are discussed, highlighting its relevance at the forefront of research in signal processing and visual effect generation in the field of security systems.

Keywords: voice signal processing, voice signal coding, MATLAB, plasma signal, Tesla coil, security system, visual effects, audiovisual interaction

Procedia PDF Downloads 87
5602 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 69
5601 Micropolitical Leadership in a Taiwanese Primary School

Authors: Hsin-Jen Chen

Abstract:

Primary schooling in Taiwan is in a process of radical restructuring during the decade. At the center of these restructuring is the position of the principal and questions to do with how principals, as school leaders, respond to radical change. Adopting a case-study approach, the study chose a middle Taiwanese primary school to investigate how the principal learned to be political. Using micropolitical leadership, the principal at the researched site successfully coped with internal change and external demands. On the whole, judging from the principal’s leadership style on the mediation between parents and teachers, as well as school-based curriculum development, it could be argued that the principal was on the stance of being a leader of the cultural transformation instead of cultural reproduction. In doing so, the qualitative evidence has indicated that the principal seemed to be successful in coping with the demands of rapid change. Continuing learning for leadership is the core of working as a principal.

Keywords: micropolitics, leadership, micropolitical leadership, learning for leadership

Procedia PDF Downloads 227
5600 Impact of Mid-Day Meal on Nutritional Status of Primary School Children in Haryana, India

Authors: Vinti Davar

Abstract:

India is one among the many countries where child malnutrition is severe and also a major underlying cause of child mortality. The Mid Day Meal (MDM) program was launched to improve the nutritional status of children, attendance, and retention in schools. It was based on one meal provided to the children, who are attending elementary school (primary school). The objective of present study was to evaluate the impact of mid-day meal on the nutritional status of primary school children in Haryana, India. The present work was carried out on 1200 children between 6-11years of age, studying in primary schools in Haryana, India. Out of these 960 students as, the experimental group was selected from schools where mid-day meal is supplied by the government, and 240 students as control group where mid-day meal is not supplied. The mean height, weight, and BMI of children of both the groups were found to be significantly low as compared to NCHS standards. Stunting was found in 56.40% MDMB (Mid-day meal beneficiaries) and 62.50 % NMDMC (non- mid-day meal children).The weight of almost all subjects were low according to age indicating thinness. Anemia was more prevalent in MDMB as compared to NMDMC may be because school meals did not include vegetables. The consumption of energy, proteins, fat, calcium, iron, vitamins was significantly low (P ≤ .01) in both groups especially in girls of NMDM. The consumption of various food groups except vegetables was better in MDMB compared to NMDMC. It is concluded that with certain improvements, mid-meal can be beneficial in meeting everyday requirements of school going children.

Keywords: foods, meals, nutritional status, school going children

Procedia PDF Downloads 302
5599 Exploration of Perceived Value of a Special Education Laws and Ethics’ Course Impact on Administrator Capacity

Authors: Megan Chaney

Abstract:

In the United States, research continues to show school administrators do not view themselves as adequately prepared in the area of special education. Often, special education is an omitted topic of study for school administrator preparation programs. The majority of special education teachers do not view their principals as well-prepared to support them in the educational context. Administrator preparation in the area of special education may begin at the foundational levels of understanding but is fundamentally an equity issue when serving individuals from marginalized populations with an urgent need to increase inclusionary practices. Special education and building-level administrators have a direct impact on teacher quality, instructional practices, inclusion, and equity with the opportunity to shape positive school culture. The current study was situated within an innovative IHE/LEA partnership pathway implemented with current K-12 administrators earning a Mild/Moderate Education Specialist Credential or coursework equivalent. Specifically, the study examined administrator’s perception of the Special Education Laws and Ethics’ course value and impact on the capacity to serve children with exceptionalities within the comprehensive school site context.

Keywords: special education laws and ethics, school adminstrator perspectives, school administrator training, inclusive practices

Procedia PDF Downloads 106
5598 The Effort of Good Governance in Enhancing Foods Security for Sustainable National Development

Authors: Egboja Simon Oga

Abstract:

One of the most important keys to the success of a nation is to ensure steady development and national economic self-sufficiency and independence. It is therefore in this regard that this paper is designed to identify food security to be crucial to all nations’ effort toward sustainable national development. Nigeria as a case study employed various effort by the successive government towards food security. Emphasis were placed on the extent to which government has boosted food security situation on the basis of the identified limitations, conclusion was drawn, recommendation/suggestions proffered, that subsidization of the process of farm inputs like fertilizer, improved seeds and agrochemical, education of farmers on modern methods of farming through extension services, improvisation of village-based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produces are necessary.

Keywords: food, governance, development, security

Procedia PDF Downloads 330
5597 A Foodborne Cholera Outbreak in a School Caused by Eating Contaminated Fried Fish: Hoima Municipality, Uganda, February 2018

Authors: Dativa Maria Aliddeki, Fred Monje, Godfrey Nsereko, Benon Kwesiga, Daniel Kadobera, Alex Riolexus Ario

Abstract:

Background: Cholera is a severe gastrointestinal disease caused by Vibrio cholera. It has caused several pandemics. On 26 February 2018, a suspected cholera outbreak, with one death, occurred in School X in Hoima Municipality, western Uganda. We investigated to identify the scope and mode of transmission of the outbreak, and recommend evidence-based control measures. Methods: We defined a suspected case as onset of diarrhea, vomiting, or abdominal pain in a student or staff of School X or their family members during 14 February–10 March. A confirmed case was a suspected case with V. cholerae cultured from stool. We reviewed medical records at Hoima Hospital and searched for cases at School X. We conducted descriptive epidemiologic analysis and hypothesis-generating interviews of 15 case-patients. In a retrospective cohort study, we compared attack rates between exposed and unexposed persons. Results: We identified 15 cases among 75 students and staff of School X and their family members (attack rate=20%), with onset from 25-28 February. One patient died (case-fatality rate=6.6%). The epidemic curve indicated a point-source exposure. On 24 February, a student brought fried fish from her home in a fishing village, where a cholera outbreak was ongoing. Of the 21 persons who ate the fish, 57% developed cholera, compared with 5.6% of 54 persons who did not eat (RR=10; 95% CI=3.2-33). None of 4 persons who recooked the fish before eating, compared with 71% of 17 who did not recook it, developed cholera (RR=0.0, 95%CIFisher exact=0.0-0.95). Of 12 stool specimens cultured, 6 yielded V. cholerae. Conclusion: This cholera outbreak was caused by eating fried fish, which might have been contaminated with V. cholerae in a village with an ongoing outbreak. Lack of thorough cooking of the fish might have facilitated the outbreak. We recommended thoroughly cooking fish before consumption.

Keywords: cholera, disease outbreak, foodborne, global health security, Uganda

Procedia PDF Downloads 193
5596 A Critical-Quantitative Approach to Examine the Effects of Systemic Factors on Education Outcomes

Authors: Sireen Irsheid

Abstract:

Despite concerted efforts to improve education attainment with progress in recent years, student achievement and attainment remain among the most significant challenges for school districts across the United States. Many scholars have argued that students who do not complete high school do not drop out of school voluntarily but are ‘pushed out’ of schools through multiple mechanisms related to structural and socioeconomic barriers, behavioral health challenges, pedagogical practices, and administrative procedures. Extant literature has shown that living in historically disadvantaged neighborhoods or attending under-resourced schools exacerbates student-level risk factors for grade retention and school pushout. Most efforts to respond to the school pushout phenomenon have focused on individual characteristics of students, with relatively little attention to addressing these multiple system-level characteristics related to perpetuating inequities. This study is built on a growing body of social justice-oriented research concerned with the systemic influences that shape the experiences and mental health challenges of young people. Specifically, this study examined how young people who have been experiencing education inequities make meaning and navigate the structural factors related to neighborhood and school disinvestment and access to resources and supports, and their risk for school pushout. Furthermore, schools as political, cultural, and ideologically reproductive spaces often serve as sites of resistance and can support students who are impacted by educational inequity. Study findings provide education, neighborhood, school psychology, social work practice, and policy considerations.

Keywords: education policy, mental health, school prison nexus, school pushout, structural trauma

Procedia PDF Downloads 60
5595 Perception of Inclusion in Higher Education

Authors: Hoi Nga Ng, Kam Weng Boey, Chi Wai Kwan

Abstract:

Supporters of Inclusive education proclaim that all students, regardless of disabilities or special educational needs (SEN), have the right to study in the normal school setting. It is asserted that students with SEN would benefit in academic performance and psychosocial adjustment via participation in common learning activities within the ordinary school system. When more and more students of SEN completed their early schooling, institute of higher education become the setting where students of SEN continue their learning. This study aimed to investigate the school well-being, social relationship, and academic self-concept of students of SEN in higher education. The Perception of Inclusion Questionnaire (PIQ) was used as the measuring instruments. PIQ was validated and incorporated in a questionnaire designed for online survey. Participation was voluntary and anonymous. A total of 90 students with SEN and 457 students without SEN responded to the online survey. Results showed no significant differences in school well-being and social relationship between students with and without SEN, but students with SEN, particularly those with learning and development impairment and those with mental illness and emotional problems, were significantly poorer in academic self-concept. Implications of the findings were discussed.

Keywords: ccademic self-concept, school well-being, social relationship, special educational needs

Procedia PDF Downloads 179
5594 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 540
5593 A Study on Personnel Commitment Factors in Hafes Hospital

Authors: Farzaneh Bayat

Abstract:

Successful and effective presence in regional and global markets along with optimal use of available utilities and proper utilization of new sources for offering desirable services based on customer satisfaction is inevitable. Commitment has a significant role in offering optimal services. Offering high quality job and desirable services to the customers are personnel’s commitment. Thus, Shiraz Chamran Hospital which is affiliated with Shiraz Medical School and is one of the orthopedic poles in southern Iran was studied. This hospital has 750 personnel and physicians which a sample of 200 of them were chosen as the statistic society for a 5 month period from June to November 2009. Main variables in this decision are: responsibility and responsiveness, job security, team work, task autonomy, gradation opportunity, information sharing, payments and commitment. The study approach is descriptive-correlative. With applied and segmental nature of the tests and statistic analysis, the 7 hypotheses were approved with 95% of certainty.

Keywords: commitment, information sharing, responsibility and responsiveness, job security, task autonomy

Procedia PDF Downloads 334
5592 Tribal Food Security Assessment and Its Measurement Index: A Study of Tribes and Particularly Vulnerable Tribal Groups in Jharkhand, India

Authors: Ambika Prasad Gupta, Harshit Sosan Lakra

Abstract:

Food security is an important issue that has been widely discussed in literature. However, there is a lack of research on the specific food security challenges faced by tribal communities. Tribal food security refers to the ability of indigenous or tribal communities to consistently access and afford an adequate and nutritious supply of food. These communities often have unique cultural, social, and economic contexts that can impact their food security. The study aims to assess the food security status of all thirty-two major tribes, including Particularly Vulnerable Tribal Groups (PVTG) people living in various blocks of Jharkhand State. The methodology of this study focuses on measuring the food security index of indigenous people by developing and redefining a new Tribal Food Security Index (TFSI) as per the indigenous community-level indicators identified by the Global Food Security Index and other indicators relevant to food security. Affordability, availability, quality and safety, and natural resources were the dimensions used to calculate the overall Tribal Food Security Index. A survey was conducted for primary data collection of tribes and PVTGs at the household level in various districts of Jharkhand with a considerable tribal population. The result shows that due to the transition from rural to urban areas, there is a considerable change in TFSI and a decrease in forest dependency of tribal communities. Socioeconomic factors like occupation and household size had a significant correlation with TFSI. Tribal households living in forests have a higher food security index than tribal households residing in urban transition areas. The study also shows that alternative methodology adopted to measure specific community-level food security creates high significant impact than using commonly used indices.

Keywords: indigenous people, tribal food security, particularly vulnerable tribal groups, Jharkhand

Procedia PDF Downloads 79
5591 Security Model for RFID Systems

Authors: John Ayoade

Abstract:

Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.

Keywords: RFID, security, mutual authentication, Kerberos

Procedia PDF Downloads 465
5590 Experimental Study on the Effectiveness of Extracurricular Football Training for Improving Primary Students Physical Fitness

Authors: Yizhi Zhang, Xiaozan Wang, Mingming Guo, Pengpeng Li

Abstract:

Introduction: The purpose of this study is to examine the effectiveness of after-school football training in improving the physical fitness of primary school students, so as to provide corresponding suggestions for carrying out after-school football training in primary schools. Methods: A total of 72 students from the experimental primary school of Mouping district, Yantai city, Shandong province, participated in this experiment. The experiment was conducted for two semesters. During the experiment period, the experimental group conducted one-hour football training after school from Monday to Thursday afternoon every week, and two hours of football training on Saturday morning every week. The control group conducted sports teaching and extracurricular activities as usual without other intervention. Before and after the experiment, both the experimental group and the control group underwent physical fitness tests according to the physical fitness test standards of Chinese students, including lung capacity, 50-meter run, one-minute skipping rope, sitting forward flexor, and one-minute sit-ups. The test results were all converted to the 100-point system according to the scoring standards. Results: (1) Before the experiment, there was no significant difference between the experimental group and the control group in various physical fitness indicators (p > 0.05). (2) After the experiment, the lung capacity score (T = 3.108, p < 0.05), the 50-meter run score (T = 6.593, p < 0.05), the skipping score (T = 9.227, p < 0.05), the sitting forward flexor score (T = 3.742, p < 0.05), and the sit-up score (T = 5.210, p < 0.05) of the experimental group were significantly higher than that of the control group. Conclusion: This study shows that the physical fitness of primary school students can be improved by football training in their spare time. It is suggested to carry out after-school football training activities in primary schools so as to effectively improve the physical fitness of pupils.

Keywords: after-school football training, physical fitness, primary school students, school sports

Procedia PDF Downloads 134
5589 Programming Systems in Implementation of Process Safety at Chemical Process Industry

Authors: Maryam Shayan

Abstract:

Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.

Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology

Procedia PDF Downloads 368
5588 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 437
5587 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 75
5586 Modeling Water Inequality and Water Security: The Role of Water Governance

Authors: Pius Babuna, Xiaohua Yang, Roberto Xavier Supe Tulcan, Bian Dehui, Mohammed Takase, Bismarck Yelfogle Guba, Chuanliang Han, Doris Abra Awudi, Meishui Lia

Abstract:

Water inequality, water security, and water governance are fundamental parameters that affect the sustainable use of water resources. Through policy formulation and decision-making, water governance determines both water security and water inequality. Largely, where water inequality exists, water security is undermined through unsustainable water use practices that lead to pollution of water resources, conflicts, hoarding of water, and poor sanitation. Incidentally, the interconnectedness of water governance, water inequality, and water security has not been investigated previously. This study modified the Gini coefficient and used a Logistics Growth of Water Resources (LGWR) Model to access water inequality and water security mathematically, and discussed the connected role of water governance. We tested the validity of both models by calculating the actual water inequality and water security of Ghana. We also discussed the implications of water inequality on water security and the overarching role of water governance. The results show that regional water inequality is widespread in some parts. The Volta region showed the highest water inequality (Gini index of 0.58), while the central region showed the lowest (Gini index of 0.15). Water security is moderately sustainable. The use of water resources is currently stress-free. It was estimated to maintain such status until 2132 ± 18, when Ghana will consume half of the current total water resources of 53.2 billion cubic meters. Effectively, water inequality is a threat to water security, results in poverty, under-development heightens tensions in water use, and causes instability. With proper water governance, water inequality can be eliminated through formulating and implementing approaches that engender equal allocation and sustainable use of water resources.

Keywords: water inequality, water security, water governance, Gini coefficient, moran index, water resources management

Procedia PDF Downloads 129
5585 The Social Perception of National Security Risks: A Comparative Perspective

Authors: Nicula Valentin, Andrei Virginia

Abstract:

Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.

Keywords: risk perception, Q-sort method, national security hazards, individual beliefs

Procedia PDF Downloads 304
5584 Information and Communication Technology Learning between Parents and High School Students

Authors: Yu-Mei Tseng, Chih-Chun Wu

Abstract:

As information and communication technology (ICT) has become a part of people’s lives, most teenagers born after the 1980s and grew up in internet generation are called digital natives. Meanwhile, those teenagers’ parents are called digital immigrants. They need to keep learning new skills of ICT. This study investigated that high school students helped their parents set up social network services (SNS) and taught them how to use ICT. This study applied paper and pencil anonymous questionnaires that asked the ICT learning and ICT products using in high school students’ parents. The sample size was 2,621 high school students, including 1,360 (51.9%) males and 1,261 (48.1%) females. The sample was from 12 high school and vocational high school in central Taiwan. Results from paired sample t-tests demonstrated regardless genders, both male and female high school students help mothers set up Facebook and LINE more often than fathers. In addition, both male and female high school students taught mothers to use ICT more often than fathers. Meanwhile, both male and female high school students teach mothers to use SNS more often than fathers. The results showed that intergenerational ICT teaching occurred more often between mothers and her children than fathers. It could imply that mothers play a more important role in family ICT learning than fathers, or it could be that mothers need more help regarding ICT than fathers. As for gender differences, results from the independent t-tests showed that female high school students were more likely than male ones to help their parents setup Facebook and LINE. In addition, compared to male high school students, female ones were more likely to teach their parents to use smartphone, Facebook and LINE. However, no gender differences were detected in teaching mothers. The gender differences results suggested that female teenagers offer more helps to their parents regarding ICT learning than their male counterparts. As for area differences, results from the independent t-tests showed that the high school in remote area students were more likely than metropolitan ones to teach parents to use computer, search engine and download files of audio and video. The area differences results might indicate that remote area students were more likely to teach their parents how to use ICT. The results from this study encourage children to help and teach their parents with ICT products.

Keywords: adult ICT learning, family ICT learning, ICT learning, urban-rural gap

Procedia PDF Downloads 176
5583 Mentoring Relationships as Social Capital in the Career Advancement of Women of Color

Authors: Ligia Alberto

Abstract:

This study examined the underrepresentation of women of color in school leadership roles. Using social capital as the theoretical framework, this study explored the role of mentoring relationships in the career advancement and promotion of Latina school leaders. This study showed that informal mentoring relationships are essential to the promotion of women of color. Most of the mentoring relationships were established through close work with their immediate supervisors. This study suggests having informal mentors facilitated Latina women's aspirations to become school leaders and counteract the pattern of underrepresentation of Latinas in such roles.

Keywords: women of color, school leadership, social capital, mentoring

Procedia PDF Downloads 84
5582 Influence of Security Attributes in Component-Based Software Development

Authors: Somayeh Zeinali

Abstract:

A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.

Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component

Procedia PDF Downloads 551
5581 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 346