Search results for: security program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6510

Search results for: security program

6180 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 399
6179 Curriculum System Optimization under Outstanding Engineers Training Mode of Mechanical and Electronic Engineering

Authors: El Miloudi Djelloul

Abstract:

Teaching program of `A plan for educating and training outstanding engineers' is divided into intramural teaching program and enterprise practice teaching program. Based on analyzing the basic principles of teaching plans which teaching plan follows for undergraduate mechanical and electrical engineering, major contents of specialty teaching project are studied amply. The study contents include the system optimization and reform of common curriculum, specialty curriculum and practice curriculum. The practice indicated that under outstanding engineers training mode, the optimized curriculum system have practicability, and achieve the training objectives.

Keywords: curriculum system, mechanical and electronic engineering, outstanding engineers, teaching program

Procedia PDF Downloads 532
6178 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 411
6177 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality

Authors: Mduduzi Nhlozi

Abstract:

Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.

Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude

Procedia PDF Downloads 127
6176 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 146
6175 The Task-Centered Instructional Strategy to Prepare Teachers for Integrating Robotics Activities in Science Education

Authors: Doaa Saad, Igor Verner, Rinat B. Rosenberg-Kima

Abstract:

This case study demonstrates how the Task-Centered Instructional Strategy can be used to develop robotics competencies in middle-school science teachers without programming knowledge, thereby reducing their anxiety about robotics. Sixteen middle school science teachers participated in a teachers’ professional development program. The strategy combines the progression of real-world tasks with explicit instruction that serves as the backbone of instruction. The designed progression includes three tasks that integrate building and programming robots, pedagogy, and science knowledge, with an increasing level of complexity and decreasing level of support. We used EV3 LEGO kits and programming blocks, a new technology for most of the participating teachers. Pre-post questionnaires were used to examine teachers’ anxiety in performing robotics tasks before the program began and after the program ended. In addition, post-program questionnaires were used to obtain teachers’ feedback on the program’s overall quality. The case study results showed that teachers were less anxious about performing robotics tasks after the program and were highly satisfied with the professional development program. Overall, our research findings indicate a positive effect of the Task-Centered Instructional Strategy for preparing in-service science teachers to integrate robotics activities into their science classes.

Keywords: competencies, educational robotics, task-centered instructional strategy, teachers’ professional development

Procedia PDF Downloads 91
6174 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review

Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park

Abstract:

Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.

Keywords: delta regions, coastal, food security, indicators, systematic review

Procedia PDF Downloads 246
6173 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork

Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting

Abstract:

This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.

Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark

Procedia PDF Downloads 271
6172 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 673
6171 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 487
6170 The Effects of an Exercise Program Integrated with the Transtheoretical Model on Pain and Trunk Muscle Endurance of Rice Farmers with Chronic Low Back Pain

Authors: Thanakorn Thanawat, Nomjit Nualnetr

Abstract:

Background and Purpose: In Thailand, rice farmers have the most prevalence of low back pain when compared with other manual workers. Exercises have been suggested to be a principal part of treatment programs for low back pain. However, the programs should be tailored to an individual’s readiness to change categorized by a behavioral approach. This study aimed to evaluate a difference between the responses of rice farmers with chronic low back pain who received an exercise program integrated with the transtheoretical model of behavior change (TTM) and those of the comparison group regarding severity of pain and trunk muscle endurance. Materials and Methods: An 8-week exercise program was conducted to rice farmers with chronic low back pain who were randomized to either the TTM (n=62, 52 woman and 10 men, mean age ± SD 45.0±5.4 years) or non-TTM (n=64, 53 woman and 11 men, mean age ± SD 44.7±5.4 years) groups. All participants were tested for their severity of pain and trunk (abdominal and back) muscle endurance at baseline (week 0) and immediately after termination of the program (week 8). Data were analysed by using descriptive statistics and student’s t-tests. The results revealed that both TTM and non-TTM groups could decrease their severity of pain and improve trunk muscle endurance after participating in the 8-week exercise program. When compared with the non-TTM group, however, the TTM showed a significantly greater increase in abdominal muscle endurance than did the non-TTM (P=0.004, 95% CI -12.4 to -2.3). Conclusions and Clinical Relevance: An exercise program integrated with the TTM could provide benefits to rice farmers with chronic low back pain. Future studies with a longitudinal design and more outcome measures such as physical performance and quality of life are suggested to reveal further benefits of the program.

Keywords: chronic low back pain, transtheoretical model, rice farmers, exercise program

Procedia PDF Downloads 386
6169 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 163
6168 The Impact of Change Management on Employee Satisfaction and Engagement

Authors: Ju-Chun Chien

Abstract:

The main purpose of this study was to figure out employees’ attitudes toward the new performance appraisal program and to examine whether three different types of appraisal processes differentially affected job satisfaction and employee engagement. The second purpose of this study was to investigate the relationship between performance appraisal reform, job satisfaction, and employee engagement. A large polyester and textile corporation had 2046 non-operational employees in February 2014. The valid participants were 1474 (72.04%) in this study. Data analysis included descriptive statistics, one-way ANOVA, one-way MANOVA, Pearson correlation, Content Validity Index, the exploratory factor analysis, and reliability analysis. The general results showed that employees who received the new performance appraisal program viewed the program more positively and showed more job satisfaction than those who did not. In particular, the implementation effects of this new performance appraisal program were most highly rated by employees who used the KPI to evaluate their job performance. Moreover, employees’ attitudes toward the new performance appraisal program were positively related to their job satisfaction and work engagement. On the other hand, most employees regarded themselves as engaged workers. To sum up, the HR department of this company has made an effective contribution to performance appraisal reforms.

Keywords: change management, employee engagement, job satisfaction, performance appraisal reform

Procedia PDF Downloads 335
6167 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 544
6166 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 133
6165 Thai Student Ability on Speexx Language Training Program

Authors: Toby Gibbs, Glen Craigie, Suwaree Yordchim

Abstract:

Using the Speexx Online Language Training Program with Thai students has allowed us to evaluate their learning comprehension and track their progression through the English language program. Speexx sets the standard for excellence and innovation in web-based language training and online coaching services. The program is designed to improve the business communication skills of language learners for Thai students. Speexx consists of English lessons, exercises, tests, web boards, and supplementary lessons to help students practice English. The sample groups are 191 Thai sophomores studying Business English with the department of Humanities and Social Science. The data was received by standard deviation (S.D.) value from questionnaires and samples provided from the Speexx training program. The results found that most Thai sophomores fail the Speexx training program due to their learning comprehension of the English language is below average. With persisted efforts on new training methods, the success of the Speexx Language Training Program can break through the cultural barriers and help future students adopt English as a second language. The Speexx results revealed four main factors affecting the success as follows: 1) Future English training should be pursued in applied Speexx development. 2) Thai students didn’t see the benefit of having an Online Language Training Program. 3) There is a great need to educate the next generation of learners on the benefits of Speexx within the community. 4) A great majority of Thai Sophomores didn't know what Speexx was. A guideline for self-reliance planning consisted of four aspects: 1) Development planning: by arranging groups to further improve English abilities with the Speexx Language Training program and encourage using Speexx every day. Local communities need to develop awareness of the usefulness of Speexx and share the value of using the program among family and friends. 2) Humanities and Social Science staff should develop skills using this Online Language Training Program to expand on the benefits of Speexx within their departments. 3) Further research should be pursued on the Thai Students progression with Speexx and how it helps them improve their language skills with Business English. 4) University’s and Language centers should focus on using Speexx to encourage learning for any language, not just English.

Keywords: ability, comprehension, sophomore, speexx

Procedia PDF Downloads 371
6164 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 420
6163 The Effect of Maritime Security on National Development in Nigeria

Authors: Adegboyega Adedolapo Ola

Abstract:

Globally, a country’s maritime security has a significant impact on its national development because it serves as a major source of a commercial contact and food supply. However, the country has been faced with a number of problems, such as piracy, kidnapping, illegal bunkering and oil theft. As such, the study examined the contribution and the relationship between maritime security and Nigeria’s development, as well as the prospects and challenges of maritime security in Nigeria. The study utilized a questionnaire and focused group discussion/interview as instruments for data collection. The method of analysis employed in the study is descriptive. A total of Three Hundred and Ninety (390) respondents were randomly selected. The result of the study showed that maritime security contributes to national development in Nigeria by guaranteeing food security in Nigeria, creating employment opportunities as well as increasing the Gross Domestic Product (GDP) of the economy. It was also found that maritime security is yet to provide sufficient support for national development in Nigeria. It is further established that it has prospects for development through the creation of employment opportunities, increase in foreign earnings, and fostering improved living standards for citizens. The study concluded that the high level of corruption, piracy and kidnapping, lack of political will by the government and the porosity of the Nigerian borders are serious obstacles, among others. In attempting to solve the problem of piracy and kidnapping in Nigerian maritime, to contribute to National development, it is primordial to address the cancer of corruption, poverty, and youth unemployment. In view of this, the study recommends: among other things, that the maritime industry should be well secured by removing its constraints/bottlenecks so as to enhance its contributions to national development.

Keywords: maritime security, national development, terrorism, piracy

Procedia PDF Downloads 88
6162 The Effects of a Mathematics Remedial Program on Mathematics Success and Achievement among Beginning Mathematics Major Students: A Regression Discontinuity Analysis

Authors: Kuixi Du, Thomas J. Lipscomb

Abstract:

The proficiency in Mathematics skills is fundamental to success in the STEM disciplines. In the US, beginning college students who are placed in remedial/developmental Mathematics courses frequently struggle to achieve academic success. Therefore, Mathematics remediation in college has become an important concern, and providing Mathematics remediation is a prevalent way to help the students who may not be fully prepared for college-level courses. Programs vary, however, and the effectiveness of a particular remedial Mathematics program must be empirically demonstrated. The purpose of this study was to apply the sharp regression discontinuity (RD) technique to determine the effectiveness of the Jack Leaps Summer (JLS) Mathematic remediation program in supporting improved Mathematics learning outcomes among newly admitted Mathematics students in the South Dakota State University. The researchers studied the newly admitted Fall 2019 cohort of Mathematics majors (n=423). The results indicated that students whose pretest score was lower than the cut-off point and who were assigned to the JLS program experienced significantly higher scores on the post-test (Math 101 final score). Based on these results, there is evidence that the JLS program is effective in meeting its primary objective.

Keywords: causal inference, mathematisc remedial program evaluation, quasi-experimental research design, regression discontinuity design, cohort studies

Procedia PDF Downloads 100
6161 Evidence-Based Policy Making to Improve Human Security in Pakistan

Authors: Ayesha Akbar

Abstract:

Pakistan is moving from a security state to a welfare state despite several security challenges both internal and external. Human security signifies a varied approach in different regions depending upon the leadership and policy priorities. The link between human development and economic growth is not automatic. It has to be created consciously by forward-looking policies and strategies by national governments. There are seven components or categories of human security these include: Economic Security, Personal Security, Health Security, Environmental Security, Food Security, Community Security and Political Security. The increasing interest of the international community to clearly understand the dimensions of human security provided the grounds to Pakistani scholars as well to ponder on the issue and delineate lines of human security. A great deal of work has been either done or in process to evaluate human security indicators in Pakistan. Notwithstanding, after having been done a great deal of work the human security in Pakistan is not satisfactory. A range of deteriorating indicators of human development that lies under the domain of human security leaves certain inquiries to be answered. What are the dimensions of human security in Pakistan? And how are they being dealt from the perspective of policy and institution in terms of its operationalization in Pakistan? Is the human security discourse reflects evidence-based policy changes. The methodology is broadly based on qualitative methods that include interviews, content analysis of policy documents. Pakistan is among the most populous countries in the world and faces high vulnerability to climate change. Literacy rate has gone down with the surge of youth bulge to accommodate in the job market. Increasing population is creating food problems as the resources have not been able to compete with the raising demands of food and other social amenities of life. Majority of the people are facing acute poverty. Health outcomes are also not satisfactory with the high infant and maternal mortality rate. Pakistan is on the verge of facing water crisis as the water resources are depleting so fast with the high demand in agriculture and energy sector. Pakistan is striving hard to deal with the declining state of human security but the dilemma is lack of resources that hinders in meeting up with the emerging demands. The government requires to bring about more change with scaling-up economic growth avenues with enhancing the capacity of human resources. A modern performance drive culture with the integration of technology is required to deliver efficient and effective service delivery. On an already fast track process of reforms; e-governance and evidence based policy mechanism is being instilled in the government process for better governance and evidence based decisions.

Keywords: governance, human development index, human security, Pakistan, policy

Procedia PDF Downloads 254
6160 Effectiveness of Breathing Training Program on Quality of Life and Depression Among Hemodialysis Patients: Quasi‐Experimental Study

Authors: Hayfa Almutary, Noof Eid Al Shammari

Abstract:

Aim: The management of depression in patients undergoing hemodialysis remains challenging. The aim of this study was to evaluate the effectiveness of a breathing training program on quality of life and depression among patients on hemodialysis. Design: A one-group pretest-posttest quasi-experimental design was used. Methods: Data were collected from hemodialysis units at three dialysis centers. Initial baseline data were collected, and a breathing training program was implemented. The breathing training program included three types of breathing exercises. The impact of the intervention on outcomes was measured using both the Kidney Disease Quality of Life Short Version and the Beck Depression Inventory-Second Edition from the same participants. The participants were asked to perform the breathing training program three times a day for 30 days. Results: The mean age of the patients was 52.1 (SD:15.0), with nearly two-thirds of them being male (63.4%). Participants who were undergoing hemodialysis for 1–4 years constituted the largest number of the sample (46.3%), and 17.1% of participants had visited a psychiatric clinic 1-3 times. The results show that the breathing training program improved overall quality of life and reduced symptoms and problems. In addition, a significant decrease in the overall depression score was observed after implementing the intervention. Conclusions: The breathing training program is a non-pharmacological intervention that has proven visible effectiveness in hemodialysis. This study demonstrated that using breathing exercises reduced depression levels and improved quality of life. The integration of this intervention in dialysis units to manage psychological issues will offer a simple, safe, easy, and inexpensive intervention. Future research should compare the effectiveness of various breathing exercises in hemodialysis patients using longitudinal studies. Impact: As a safety precaution, nurses should initially use non-pharmacological interventions, such as a breathing training program, to treat depression in those undergoing hemodialysis.

Keywords: breathing training program, depression, exercise, quality of life, hemodialysis

Procedia PDF Downloads 89
6159 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia

Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan

Abstract:

This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.

Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia

Procedia PDF Downloads 396
6158 Application of an Educational Program for Al Jouf University Students regarding Scientific Writing and Presentation Skills

Authors: Fatma Abdel Moneim Al Tawil

Abstract:

This study was undertaken to evaluate an educational program regarding scientific writing and presentation skills among university students. This interventional study used a one-group, pretest/posttest design and was conducted in Al Jouf University among four colleges in Saudi Arabia. Baseline students’ assessment was conducted for developing educational program. Interventional, one group, pretest/posttest study was designed to evaluate the effectiveness of the educational program. Three parts evaluation sheet with total scores of 30 was used for 113 students for the development of the program and 52 students for test pretest phase. Wilcoxon signed ranks showed statistically significant improvement in the combined overall program skills score from a median of 56.7 pre to a median of 86.7 post, (z = 6.231, p < 0.001). When compared to preprogram intervention, post interventions 51.9 % of students achieve excellent performance. While pre intervention no students (0.0 %) achieve this score. Regarding to scientific writing skills, Wilcoxon signed ranks showed statistically significant improvement in the score from a median of 60 pre to a median of 90 post, (z = 6.122, p < 0.001). None of students had excellent performance changed to 73.1%. Regarding to oral presentation skills, Wilcoxon signed ranks showed statistically significant improvement in the score from a median of 50 pre to a median of 80 post, (z = 6.153, p < 0.001). None of students had excellent performance changed to 48.1%. Such educational program needs to be incorporated into classroom delivery of the students’ curriculum. Scientific writing skills book needed to be developed to be recommended as a basic educational strategy for all university faculties.

Keywords: scientific writing, presentation skills, university students, educational program

Procedia PDF Downloads 454
6157 Positive Parenting and Subjective Well-Being: Proposed Program for Parents of Gifted Children

Authors: Suzy Pereira, Alberto Rocha, Ana Almeida, Catarina Figueiredo, Helena Fonseca, Leonor Moreira, Carla Blum Vestena, Cristina Costa-Lobo

Abstract:

The socio-educational support to parents, through parental education intervention programs, is part of European social policies, aiming to respond to the needs of education, promotion of well-being and development of children and young people. The purpose of this research is to evaluate the impact of the Positive Parenting Program on the subjective well-being of the parents of gifted children. The Positive Parenting Program is authored and is conducted by the National Association of Study and Intervention in Giftedness, Portuguese Association. The central question to be explored in this research is: Does the promotion of positive parenting in parents of gifted children have a positive impact on the subjective well-being? The sample consisted of 30 parents, non-probabilistic sampling of convenience, of which 15 parents belong to the intervention group and the rest to the control group. One dimension will be evaluated - subjective well-being, through the PANAS questionnaire - before and after the sessions of this program. The aim is to contribute to the understanding of the process and results of the positive parenting program in parents of gifted children.

Keywords: positive parenting, subjective well-being, giftedness, parental education intervention programs

Procedia PDF Downloads 323
6156 Scenarios of Societal Security and Business Continuity Cycles

Authors: Jiří F. Urbánek, Jiří Barta

Abstract:

Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.

Keywords: business continuity, societal security, crisis scenarios cycles, interoperability

Procedia PDF Downloads 388
6155 The Impact of Water Reservoirs on Biodiversity and Food Security and the Creation of Adaptation Mechanisms

Authors: Inom S. Normatov, Abulqosim Muminov, Parviz I. Normatov

Abstract:

Problems of food security and the preservation of reserved zones in the region of Central Asia under the conditions of the climate change induced by the placement and construction of large reservoirs are considered. The criteria for the optimum placement and construction of reservoirs that entail the minimum impact on the environment are established. The need for the accounting of climatic parameters is shown by the calculation of the water quantity required for the irrigation of agricultural lands.

Keywords: adaptation, biodiversity, food security, water reservoir, risk

Procedia PDF Downloads 258
6154 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978

Authors: Naseer Ahmad Bhat

Abstract:

Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.

Keywords: detentions, Kashmir, public safety act, liberty, security

Procedia PDF Downloads 230
6153 How to Integrate Sustainability in Technological Degrees: Robotics at UPC

Authors: Antoni Grau, Yolanda Bolea, Alberto Sanfeliu

Abstract:

Embedding Sustainability in technological curricula has become a crucial factor for educating engineers with competences in sustainability. The Technical University of Catalonia UPC, in 2008, designed the Sustainable Technology Excellence Program STEP 2015 in order to assure a successful Sustainability Embedding. This Program takes advantage of the opportunity that the redesign of all Bachelor and Master Degrees in Spain by 2010 under the European Higher Education Area framework offered. The STEP program goals are: to design compulsory courses in each degree; to develop the conceptual base and identify reference models in sustainability for all specialties at UPC; to create an internal interdisciplinary network of faculty from all the schools; to initiate new transdisciplinary research activities in technology-sustainability-education; to spread the know/how attained; to achieve international scientific excellence in technology-sustainability-education and to graduate the first engineers/architects of the new EHEA bachelors with sustainability as a generic competence. Specifically, in this paper authors explain their experience in leading the STEP program, and two examples are presented: Industrial Robotics subject and the curriculum for the School of Architecture.

Keywords: sustainability, curricula improvement, robotics, STEP program

Procedia PDF Downloads 414
6152 Drinking Reduction Programs: Comparing the Effectiveness of Different Versions of the Programs

Authors: Justyna Śniadach, Barbara Bętkowska Korpała, Napoleon Waszkiewicz

Abstract:

The drinking reduction program is a relatively new form of therapy. A lot has changed in thinking about alcohol problems and effective ways to solve them. Until recently, alcohol consumers were divided into two groups: addicted and "normal" drinkers. In recent years, the existence of a large group of people who drink alcohol harmfully has been noticed: not addicted, but still drinking in a way that brings losses and harms to others. It turned out that most of the problems resulting from drinking alcohol are generated by people who drink harmfully and that showed that it is necessary to build a support system for these people aimed at reducing alcohol consumption. The Drinking Reduction Program currently has 3 versions. There is a Drinking Reduction Program in a standard form, where the patient works stationary, in the therapist's office. Another possibility is the patient's work on Online - Drinking Reduction Program with application in a remote form. Another possibility is the patient's work in Online- Drinking Reduction Program on-line but together with the therapist. In all of this program's exercises are based on the assumptions of behavioral-cognitive therapy and methods of motivational dialogue. The purpose of this research will be to compare three versions of Drinking Reduction Programs in terms of their effectiveness, psychological and sociological variables, as well as the level of motivation to change the drinking pattern.

Keywords: alcohol addiction, addiction therapy, drinking reduction programs, cognitive-behavioral therapy

Procedia PDF Downloads 100
6151 Migration, Food Security, Rapid Urbanization and Population Rise in Nigeria: A Wake-Up Call to Policy-Makers

Authors: A. E. Obayelu, S. O. Olubiyo

Abstract:

Food is different from other commodities because everybody needs food for survival. This has led to a shift in focus to food security in the global policy arena. However, there is paucity of studies on the interactions between food security, migration, urbanization and population rise. This paper therefore look at the linkages between migration and food security in the context of rapid urbanization and population rise of Nigeria. The study obtained data and information from both secondary sources and primary method through the voice of some selected Nigerians through telephone interview. The findings revealed that, the primary factor for the rapid urbanization in Nigeria is migration; most foods are still produced by peasant farmers who are scattered all over the rural areas and not multinational companies who produce on large scale. The country is still characterized with inadequate infrastructural facilities and services to cater for growing population. There are no protective policies enforced by the Nigeria government. In most cases, the migrants are left entirely on mercy of what they can find to due for survival. The most common coping mechanisms by migrants from rural to urban areas are changing food intake in terms of quantity, quality, diversity and frequency and prioritizing children. Policies that address urban food security need to consider the complex relationship between rapid population rise and migration and appropriate transformations that will be able to manage urbanization. With increasing rate of urbanization, the focus of food security should no longer be that of rural only

Keywords: agricultural commercialization, agricultural transformation, food security, urban, urbanization

Procedia PDF Downloads 434