Search results for: frequent user discount program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6662

Search results for: frequent user discount program

6272 Developing Future New Roles for Traditional Birth Attendants in Nigeria

Authors: Hauwau Mohammed

Abstract:

Research purpose: the integration of Traditional Birth Attendants (TBAs) has long been initiated into healthcare systems. This has been to help improve maternal mortality, particularly in developing countries. Nigeria is seen as one of the countries with a high maternal death rate due to common pregnancy complications and low resources. Communities with challenges of universal coverage of skilled workers rely on TBAs for pregnancy-related services, including delivery. The Sokoto State government has conducted several training programs on a significant number of TBAs to enable a formal integration of relationships with skilled healthcare for women in rural regions. This study aims to explore a standard method and develop an assessment framework for improving TBAs training programs in Sokoto State. Research Design, Methodology & Methods : Using a qualitative design, an interpretive phenomenology approach will be applied to explore the lived-experiences of 28 TBAs, who have undergone a form of training while also examining the strategies used to develop those programs through 8 policymakers and/or program trainers. For the collection stage, a focus group discussion and a face-to-face interview will be conducted, where the latter is for TBAs and the former for policymakers and training officials. Analysis: Data will be analyse through IPA format while using Nvivo to code and catalog personal experiential generated patterns. Secondary review: a scoping review of secondary data from Nigeria was used to map the knowledge gap and the extent of available data. The thematic analytic findings suggested that there are various approaches used to incorporate TBAs into the healthcare system, which include interventional programs targeted at specific health issues. In addition, incentives were used to encourage TBAs to facilitate the frequent use of skilled care for women.

Keywords: traditional birth attendants, Nigeria, training, program

Procedia PDF Downloads 61
6271 Characterising Stable Model by Extended Labelled Dependency Graph

Authors: Asraful Islam

Abstract:

Extended dependency graph (EDG) is a state-of-the-art isomorphic graph to represent normal logic programs (NLPs) that can characterize the consistency of NLPs by graph analysis. To construct the vertices and arcs of an EDG, additional renaming atoms and rules besides those the given program provides are used, resulting in higher space complexity compared to the corresponding traditional dependency graph (TDG). In this article, we propose an extended labeled dependency graph (ELDG) to represent an NLP that shares an equal number of nodes and arcs with TDG and prove that it is isomorphic to the domain program. The number of nodes and arcs used in the underlying dependency graphs are formulated to compare the space complexity. Results show that ELDG uses less memory to store nodes, arcs, and cycles compared to EDG. To exhibit the desirability of ELDG, firstly, the stable models of the kernel form of NLP are characterized by the admissible coloring of ELDG; secondly, a relation of the stable models of a kernel program with the handles of the minimal, odd cycles appearing in the corresponding ELDG has been established; thirdly, to our best knowledge, for the first time an inverse transformation from a dependency graph to the representing NLP w.r.t. ELDG has been defined that enables transferring analytical results from the graph to the program straightforwardly.

Keywords: normal logic program, isomorphism of graph, extended labelled dependency graph, inverse graph transforma-tion, graph colouring

Procedia PDF Downloads 188
6270 Kinematic Behavior of Geogrid Reinforcements during Earthquakes

Authors: Ahmed Hosny Abdel-Rahman, Mohamed Abdel-Moneim

Abstract:

Reinforced earth structures are generally subjected to cyclic loading generated from earthquakes. This paper presents a summary of the results and analyses of a testing program carried out in a large-scale multi-function geosynthetic testing apparatus that accommodates soil samples up to 1.0 m3. This apparatus performs different shear and pullout tests under both static and cyclic loading. The testing program was carried out to investigate the controlling factors affecting soil/geogrid interaction under cyclic loading. The extensibility of the geogrids, the applied normal stresses, the characteristics of the cyclic loading (frequency, and amplitude), and initial static load within the geogrid sheet were considered in the testing program. Based on the findings of the testing program, the effect of these parameters on the pullout resistance of geogrids, as well as the displacement mobility under cyclic loading were evaluated. Conclusions and recommendations for the design of reinforced earth walls under cyclic loading are presented.

Keywords: geogrid, soil, interface, cyclic loading, pullout, large scale testing

Procedia PDF Downloads 598
6269 Positive Psychology and Parenting: A Case Study

Authors: Victor William Harris

Abstract:

Objective. This study examined the impact of the Positive Behavioral Management Skills (PBMS) online educational program on participants (n = 624) in a Southeastern region of the United States. The PBMS program incorporates established positive psychology behavioral management principles with new research-based practices designed to promote healthy and satisfying relationships between adults and children while constructively managing and preventing problematic behavior. Additionally, the PBMS program assists parents and teachers in recognizing the motivations behind a wide range of misbehaviors. The program also offers to forewarn some of the most common mistakes (or “parent traps”) in child behavioral management and describes how they can be avoided. It also describes how to recognize and capitalize on “teachable moments,” which are indispensable in the developmental process. Design. A retrospective-pre-test-then-post-test design was used to reduce response shift bias when assessing knowledge and skill intervention outcomes for twenty-two behavioral management variables. Results. The PBMS program was shown to be effective for increasing knowledge and skills related to managing misbehavior while reinforcing interpersonal relationships and fostering a sense of responsibility and capability within the child. Large standardized mean effect size changes from before to after program intervention was documented for PBMS participants on all twenty-two variables studied. Conclusion. The PBMS program showed initial positive outcomes to assist participants in the sample studied to increase their knowledge and skills in managing child behavior successfully. Implications for parents, educators and practitioners are discussed.

Keywords: behavioral management, discipline, parent education, positive parenting, positive psychology-parenting

Procedia PDF Downloads 200
6268 Making Waves: Preparing the Next Generation of Bilingual Medical Doctors

Authors: Edith Esparza-Young, Ángel M. Matos, Yaritza Gonzalez, Kirthana Sugunathevan

Abstract:

Introduction: This research describes the existing medical school program which supports a multicultural setting and bilingualism. The rise of Spanish speakers in the United States has led to the recruitment of bilingual medical students who can serve the evolving demographics. This paper includes anecdotal evidence, narratives and the latest research on the outcomes of supporting a multilingual academic experience in medical school and beyond. People in the United States will continue to need health care from physicians who have experience with multicultural competence. Physicians who are bilingual and possess effective communication skills will be in high demand. Methodologies: This research is descriptive. Through this descriptive research, the researcher will describe the qualities and characteristics of the existing medical school programs, curriculum, and student services. Additionally, the researcher will shed light on the existing curriculum in the medical school and also describe specific programs which help to serve as safety nets to support diverse populations. The method included observations of the existing program and the implementation of the medical school program, specifically the Accelerated Review Program, the Language Education and Professional Communication Program, student organizations and the Global Health Institute. Concluding Statement: This research identified and described characteristics of the medical school’s program. The research explained and described the current and present phenomenon of this medical program, which has focused on increasing the graduation of bilingual and minority physicians. The findings are based on observations of the curriculum, programs and student organizations which evolves and remains innovative to stay current with student enrollment.

Keywords: bilingual, English, medicine, doctor

Procedia PDF Downloads 119
6267 Knowledge-Driven Decision Support System Based on Knowledge Warehouse and Data Mining by Improving Apriori Algorithm with Fuzzy Logic

Authors: Pejman Hosseinioun, Hasan Shakeri, Ghasem Ghorbanirostam

Abstract:

In recent years, we have seen an increasing importance of research and study on knowledge source, decision support systems, data mining and procedure of knowledge discovery in data bases and it is considered that each of these aspects affects the others. In this article, we have merged information source and knowledge source to suggest a knowledge based system within limits of management based on storing and restoring of knowledge to manage information and improve decision making and resources. In this article, we have used method of data mining and Apriori algorithm in procedure of knowledge discovery one of the problems of Apriori algorithm is that, a user should specify the minimum threshold for supporting the regularity. Imagine that a user wants to apply Apriori algorithm for a database with millions of transactions. Definitely, the user does not have necessary knowledge of all existing transactions in that database, and therefore cannot specify a suitable threshold. Our purpose in this article is to improve Apriori algorithm. To achieve our goal, we tried using fuzzy logic to put data in different clusters before applying the Apriori algorithm for existing data in the database and we also try to suggest the most suitable threshold to the user automatically.

Keywords: decision support system, data mining, knowledge discovery, data discovery, fuzzy logic

Procedia PDF Downloads 310
6266 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script

Authors: Yash Goyal, Manish Korde, Juned Siddiqui

Abstract:

Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.

Keywords: responsive, accessible, attractive, interface, objective, security.

Procedia PDF Downloads 78
6265 Player Experience: A Research on Cross-Platform Supported Games

Authors: Salih Akkemik

Abstract:

User Experience has a characterized perspective based on two fundamentals: the usage process and the product. Digital games can be considered as a special interactive system. This system has a very specific purpose and this is to make the player feel good while playing. At this point, Player Experience (PX) and User Experience (UX) are similar. UX focuses on the user feels good, PX focuses on the player feels good. The most important difference between the two is the action taken. These are actions of using and playing. In this study, the player experience will be examined primarily. PX may differ on different platforms. Nowadays, companies are releasing the successful and high-income games that they have developed with cross-platform support. Cross-platform is the most common expression that an application can run on different operating systems, in other words, be developed to support different operating systems. In terms of digital games, cross-platform support means that a game can be played on a computer, console or mobile device environment, more specifically, the game developed is designed and programmed to be played in the same way on at least two different platforms, such as Windows, MacOS, Linux, iOS, Android, Orbis OS or Xbox OS. Different platforms also accommodate different player groups, profiles and preferences. This study aims to examine these different player profiles in terms of player experience and to determine the effects of cross-platform support on player experience.

Keywords: cross-platform, digital games, player experience, user experience

Procedia PDF Downloads 187
6264 Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol

Authors: Saransh Sharma, Atharv Dekhne

Abstract:

Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly.

Keywords: passwordless, OAuth, bitcoin, ZKP, SIN, BIP

Procedia PDF Downloads 67
6263 Universal Health Coverage 2019 in Indonesia: The Integration of Family Planning Services in Current Functioning Health System

Authors: Fathonah Siti, Ardiana Irma

Abstract:

Indonesia is currently on its track to achieve Universal Health Coverage (UHC) by 2019. The program aims to address issues on disintegration in the implementation and coverage of various health insurance schemes and fragmented fund pooling. Family planning service is covered as one of benefit packages under preventive care. However, little has been done to examine how family planning program are appropriately managed across levels of governments and how family planning services are delivered to the end user. The study is performed through focus group discussion to related policy makers and selected programmers at central and district levels. The study is also benefited from relevant studies on family planning in the UHC scheme and other supporting data. The study carefully investigates some programmatic implications when family planning is integrated in the UHC program encompassing the need to recalculate contraceptive logistics for beneficiaries (eligible couple); policy reformulation for contraceptive service provision including supply chain management; establishment of family planning standard of procedure; and a call to update Management Information System. The study confirms that there is a significant increase in the numbers of contraceptive commodities needs to be procured by the government. Holding an assumption that contraceptive prevalence rate and commodities cost will be as expected increasing at 0.5% annually, the government need to allocate almost IDR 5 billion by 2019, excluded fee for service. The government shifts its focus to maintain eligible health facilities under National Population and Family Planning Board networks. By 2019, the government has set strategies to anticipate the provision of family planning services to 45.340 health facilities distributed in 514 districts and 7 thousand sub districts. Clear division of authorities has been established among levels of governments. Three models of contraceptive supply planning have been developed and currently in the process of being institutionalized. Pre service training for family planning services has been piloted in 10 prominent universities. The position of private midwives has been appreciated as part of the system. To ensure the implementation of quality and health expenditure control, family planning standard has been established as a reference to determine set of services required to deliver to the clients properly and types of health facilities to conduct particular family planning services. Recognition to individual status of program participation has been acknowledged in the Family Enumeration since 2015. The data is precisely recorded by name by address for each family and its members. It supplies valuable information to 15.131 Family Planning Field Workers (FPFWs) to provide information and education related to family planning in an attempt to generate demand and maintain the participation of family planning acceptors who are program beneficiaries. Despite overwhelming efforts described above, some obstacles remain. The program experiences poor socialization and yet removes geographical barriers for those living in remote areas. Family planning services provided for this sub population conducted outside the scheme as a complement strategy. However, UHC program has brought remarkable improvement in access and quality of family planning services.

Keywords: beneficiary, family planning services, national population and family planning board, universal health coverage

Procedia PDF Downloads 158
6262 Power Allocation in User-Centric Cell-Free Massive Multiple-Input Multiple-Output Systems with Limited Fronthaul Capacity

Authors: Siminfar Samakoush Galougah

Abstract:

In this paper, we study two power allocation problems for an uplink user-centric (UC) cell-free massive multiple-input multiple-output (CF-mMIMO) system. Besides, we assume each access point (AP) is connected to a central processing unit (CPU) via a fronthaul link with limited capacity. To efficiently use the fronthaul capacity, two strategies for transmitting signals from APs to the CPU are employed, namely, compress-forward estimate (CFE), estimate-compress-forward (ECF). The capacity of the aforementioned strategies in user-centric CF-mMIMO is drived. Then, we solved the two power allocation problems with minimum Spectral Efficiency (SE) and sum-SE maximization objectives for ECF and CFE strategies.

Keywords: cell-free massive MIMO, limited capacity fronthaul, spectral efficiency

Procedia PDF Downloads 34
6261 Improving Student Retention with Summer Bridge Programs

Authors: Elizabeth Watson, Sara Vogt

Abstract:

The transition from high school to college can be an exciting and confusing time for many students, especially college students with disabilities. In 1983, the University of Wisconsin-Whitewater created a Summer Transition Program (STP) for such students as part of a US Department of Education Demonstration Grant. This program offers incoming students the opportunity to take 2 college courses and live on campus for 4 weeks to help introduce and familiarize them with typical college expectations and support services. Over the past 30 years, 48% of the students have graduated, exceeding the national college graduation rate for students with disabilities. This mixed methods longitudinal study will discuss how this program has increased retention and graduation rates, and success in the co-curricular and living environments for students with disabilities.

Keywords: disability, transition, post-secondary education, retention

Procedia PDF Downloads 259
6260 Integration Program Through Physical Education Lessons for The Influence of Some Physical Fitness Health-Related Components in Visual Handicapped Children

Authors: Said S. Almaiuof

Abstract:

Integration Program Through Physical Education Lessons for The Influence of Some Physical Fitness Health-Related Components in Visual Handicapped Children. Propose of the study: The aim of this study is to design and evaluate a program for the physical education lesson to improve the cardio-respiratory endurance, considering the lesson of physical education as one of the educational means to achieve the society aims toward health and fitness, concerning the importance of the cardio-respiratory endurance as an essential one of the physical fitness health-related components. And this program tried to give them hand of help as a part of the society having the same rights as the rest of the society. Methodology: The researcher used the experimental method as a suitable method for this study and tested its hypothesis. The subject of the research selected randomly of the two classes from primary education in TRIPOLI-LIBYA, it was 28 boys (14-15) years old, then divided into groups, experimental group, n=13, which practiced the special exercises program and control group, n=15, which only practiced the normal school program. The selected child subjected to a medical examination in order to make sure that they are healthy, and the Vo2max measured by cycle ergometry and test some physical fitness makers before and after the program. Results: The study cleared that the experimental group developed in all physical variation in comparison with the control group which has a little development in a general balance only. Results are following: 1. The experimental group was successful more than the control group in all the research variation. 2. There were some improvements in time of keeping Balance in control group only. Discussion /conclusion: According to statistical analysis of data related to the values of the variables in this study; the suggested exercise program according to development the cardio respiratory endurance (CRE), and some physical fitness more than the program which already implemented in the school was less effective, just there is developing on keep balancing. It’s statistically significant (p<0.05) after applying this program. Improving the experimental group on (CRE), balance, running, sit and reach, from the suggested exercise program of what indicate the partaking program positive in improve those physical variables, and the selected exercises may contributed in improving the (CRE) for visual impairment and its pivotal in visual impairment children’s life. A health-related physical education curriculum can provide students with substantially more physical activity during physical education classes. The results show that the physical rehabilitation program for visual impairment children helped them in developing their defects due to the injury which means that this program should be in every organization having this part of people to increase their production and give them hand of help as a part of the society having the same rights as the rest of the society and to establish the idea of sport for all.

Keywords: visual handicapped, cardio-respiratory endurance, health, ergometry, education

Procedia PDF Downloads 417
6259 The Key to the Success of Hotel Loyalty Program Enrolments: An Assessment of the Best Practices within the Three Hospitality Tiers

Authors: Nicole Anne Bass Monsanto

Abstract:

The objective of this study were to identify the numerous effective ways of capturing new members to participate in the brand hotel loyalty programs through the following objectives: (1) To differentiate the appropriate approach on selling the loyalty program to the different consumer market within their tier; (2) to evaluate the different behavioural degree of guests from different aspects of class and preference; (3) to compare the 3 hospitality tiers and the best tactic of approach according to their target market; (4) to assess the best practices suitable to the category of hotel in their specific tier. This study is a mixed methods research which involves both qualitative and quantitative. The qualitative research consisted of twelve management level respondents from 6 different hotels. These hotels were subdivided into 3 hotel tiers -- Luxury Hotels Upper Upscale Hotels and Mid-Scale Hotels—and the research studied two hotels of each hotel tier. Meanwhile, the quantitative research was conducted to further confirm and enhance the results by the means of guest post-stay surveys. Research findings of the qualitative research were as follows: (1) There are no differentiated best practices in capturing new enrolments based on the hotel tier. (2) There is only one key tool that determines the hotel loyalty program enrolment success. Meanwhile, the research findings of the quantitative research lead to the conclusion that most guests do not participate in the loyalty program was because they were not invited from the start.

Keywords: best practices, loyalty program, hospitality tier, enrollment success

Procedia PDF Downloads 258
6258 Human-Computer Interaction: Strategies for Ensuring the Design of User-Centered Web Interfaces for Smartphones

Authors: Byron Joseph A. Hallar, Annjeannette Alain D. Galang, Maria Visitacion N. Gumabay

Abstract:

The widespread adoption and increasing proliferation of smartphones that started during the first decade of the twenty-first century have enabled their users to communicate and access information in ways that were merely thought of as possibilities in the few years before the smartphone revolution. A product of the convergence of the cellular phone and portable computer, the smartphone provides an additional important function that used to be the exclusive domain of desktop-bound computers and portable computers: Web Browsing. For increasing numbers of users, the smartphone and allied devices such as tablet computers have become their first and often their only means of accessing the World Wide Web. This has led to the development of websites that cater to the needs of the new breed of smartphone-carrying web users. The smaller size of smartphones as compared with conventional computers has provided unique challenges to web interface designers. The smaller screen size and touchscreen interface have made it much more difficult to read and navigate through web pages that were in most part designed for traditional desktop and portable computers. Although increasing numbers of websites now provide an alternate website formatted for smartphones, problems with ease of use, reliability and usability still remain. This study focuses on the identification of the problems associated with smartphone web interfaces, the compliance with accepted standards of user-oriented web interface design, the strategies that could be utilized to ensure the design of user-centric web interfaces for smartphones, and the identification of the current trends and developments related to user-centric web interface design intended for the consumption of smartphone users.

Keywords: human-computer interaction, user-centered design, web interface, mobile, smartphone

Procedia PDF Downloads 327
6257 Innovations in International Trauma Education: An Evaluation of Learning Outcomes and Community Impact of a Guyanese trauma Training Graduate Program

Authors: Jeffrey Ansloos

Abstract:

International trauma education in low and emerging economies requires innovative methods for capacity building in existing social service infrastructures. This study details the findings of a program evaluation used to assess the learning outcomes and community impact of an international trauma-focused graduate degree program in Guyana. Through a collaborative partnership between Lesley University, the Government of Guyana, and UNICEF, a 2-year low-residency masters degree graduate program in trauma-focused assessment, intervention, and treatment was piloted with a cohort of Guyanese mental health professionals. Through an analytical review of the program development, as well as qualitative data analysis of participant interviews and focus-groups, this study will address the efficacy of the programming in terms of preparedness of professionals to understand, evaluate and implement trauma-informed practices across various child, youth, and family mental health service settings. Strengths and limitations of this international trauma-education delivery model will be discussed with particular emphasis on the role of capacity-building interventions, community-based participatory curriculum development, innovative technological delivery platforms, and interdisciplinary education. Implications for further research and subsequent program development will be discussed.

Keywords: mental health promotion, global health promotion, trauma education, innovations in education, child, youth, mental health education

Procedia PDF Downloads 343
6256 Integrated Grey Rational Analysis-Standard Deviation Method for Handover in Heterogeneous Networks

Authors: Mohanad Alhabo, Naveed Nawaz, Mahmoud Al-Faris

Abstract:

The dense deployment of small cells is a promising solution to enhance the coverage and capacity of the heterogeneous networks (HetNets). However, the unplanned deployment could bring new challenges to the network ranging from interference, unnecessary handovers and handover failures. This will cause a degradation in the quality of service (QoS) delivered to the end user. In this paper, we propose an integrated Grey Rational Analysis Standard Deviation based handover method (GRA-SD) for HetNet. The proposed method integrates the Standard Deviation (SD) technique to acquire the weight of the handover metrics and the GRA method to select the best handover base station. The performance of the GRA-SD method is evaluated and compared with the traditional Multiple Attribute Decision Making (MADM) methods including Simple Additive Weighting (SAW) and VIKOR methods. Results reveal that the proposed method has outperformed the other methods in terms of minimizing the number of frequent unnecessary handovers and handover failures, in addition to improving the energy efficiency.

Keywords: energy efficiency, handover, HetNets, MADM, small cells

Procedia PDF Downloads 97
6255 Elements of Sector Benchmarking in Physical Education Curriculum: An Indian Perspective

Authors: Kalpana Sharma, Jyoti Mann

Abstract:

The study was designed towards institutional analysis for a clear understanding of the process involved in functioning and layout of determinants influencing physical education teacher’s education program in India. This further can be recommended for selection of parameters for creating sector benchmarking for physical education teachers training institutions across India. 165 stakeholders involving students, teachers, parents, administrators were surveyed from the identified seven institutions and universities from different states of India. They were surveyed on the basis of seven broad parameters which were associated with the post graduate physical education program in India. A physical education program assessment tool of 52 items was designed to administer it among the stakeholders selected for the survey. An item analysis of the contents was concluded through the review process from selected experts working in higher education with experience in teacher training program in physical education. The data was collected from the stakeholders of the selected institutions through Physical Education Program Assessment Tool (PEPAT). The hypothesis that PE teacher education program is independent of physical education institutions was significant. The study directed a need towards robust admission process emphasizing on identification, selection of potential candidates and quality control of intake with the scientific process developed according to the Indian education policies and academic structure. The results revealed that the universities do not have similar functional and delivery process related to the physical education teacher training program. The study reflects towards the need for physical education universities and institutions to identify the best practices to be followed regarding the functioning of delivery of physical education programs at various institutions through strategic management studies on the identified parameters before establishing strict standards and norms for achieving excellence in physical education in India.

Keywords: assessment, benchmarking, curriculum, physical education, teacher education

Procedia PDF Downloads 526
6254 Implementation Research on the Singapore Physical Activity and Nutrition Program: A Mixed-Method Evaluation

Authors: Elaine Wong

Abstract:

Introduction: The Singapore Physical Activity and Nutrition Study (SPANS) aimed to assess the effects of a community-based intervention on physical activity (PA) and nutrition behaviours as well as chronic disease risk factors for Singaporean women aged above 50 years. This article examines the participation, dose, fidelity, reach, satisfaction and reasons for completion and non-completion of the SPANS. Methods: The SPANS program integrated constructs of Social Cognitive Theory (SCT) and is composed of PA activities; nutrition workshops; dietary counselling coupled with motivational interviewing (MI) through phone calls; and text messages promoting healthy behaviours. Printed educational resources and health incentives were provided to participants. Data were collected via a mixed-method design strategy from a sample of 295 intervention participants. Quantitative data were collected using self-completed survey (n = 209); qualitative data were collected via research assistants’ notes, post feedback sessions and exit interviews with program completers (n = 13) and non-completers (n = 12). Results: Majority of participants reported high ‘satisfactory to excellent’ ratings for the program pace, suitability of interest and overall program (96.2-99.5%). Likewise, similar ratings for clarity of presentation; presentation skills, approachability, knowledge; and overall rating of trainers and program ambassadors were achieved (98.6-100%). Phone dietary counselling had the highest level of participation (72%) at less than or equal to 75% attendance rate followed by nutrition workshops (65%) and PA classes (60%). Attrition rate of the program was 19%; major reasons for withdrawal were personal commitments, relocation and health issues. All participants found the program resources to be colourful, informative and practical for their own reference. Reasons for program completion and maintenance were: desired health benefits; social bonding opportunities and to learn more about PA and nutrition. Conclusions: Process evaluation serves as an appropriate tool to identify recruitment challenges, effective intervention strategies and to ensure program fidelity. Program participants were satisfied with the educational resources, program components and delivery strategies implemented by the trainers and program ambassadors. The combination of printed materials and intervention components, when guided by the SCT and MI, were supportive in encouraging and reinforcing lifestyle behavioural changes. Mixed method evaluation approaches are integral processes to pinpoint barriers, motivators, improvements and effective program components in optimising the health status of Singaporean women.

Keywords: process evaluation, Singapore, older adults, lifestyle changes, program challenges

Procedia PDF Downloads 101
6253 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 31
6252 A User Centred Based Approach for Designing Everyday Product: A Case Study of an Alarm Clock

Authors: Obokhai Kess Asikhia

Abstract:

This work explores design concept generation by understanding user needs through observation and interview. The aim is to examine several principles and guidelines in obtaining evidence from observing how users interact with the targeted product and interviewing them to acquire deep insights of their needs. With the help of Quality Function Deployment (QFD), the identified needs of the users while interacting with the product were ranked using the normalised weighting approach. Furthermore, a low fidelity prototype of the alarm clock is developed with a view of addressing the identified needs of the users. Finally, the low fidelity prototype design was evaluated with two design prototypes already existing in the market through a study involving 30 participants. Preliminary results reveal higher performance ratings by the majority of the participants of the new prototype compared to the other existing alarm clocks in the market used in the study.

Keywords: design concept, low fidelity prototype, normalised weighting approach, quality function deployment, user needs

Procedia PDF Downloads 159
6251 Discovering User Behaviour Patterns from Web Log Analysis to Enhance the Accessibility and Usability of Website

Authors: Harpreet Singh

Abstract:

Finding relevant information on the World Wide Web is becoming highly challenging day by day. Web usage mining is used for the extraction of relevant and useful knowledge, such as user behaviour patterns, from web access log records. Web access log records all the requests for individual files that the users have requested from the website. Web usage mining is important for Customer Relationship Management (CRM), as it can ensure customer satisfaction as far as the interaction between the customer and the organization is concerned. Web usage mining is helpful in improving website structure or design as per the user’s requirement by analyzing the access log file of a website through a log analyzer tool. The focus of this paper is to enhance the accessibility and usability of a guitar selling web site by analyzing their access log through Deep Log Analyzer tool. The results show that the maximum number of users is from the United States and that they use Opera 9.8 web browser and the Windows XP operating system.

Keywords: web usage mining, web mining, log file, data mining, deep log analyzer

Procedia PDF Downloads 225
6250 Pull String to Stop: Public Utility Vehicle Modernization Program

Authors: Frederick Kobe O. Obar, Preity B. Quinzon, Trisha B. Tumbokon, Mario Joshua D. Marron, Kenichi Katsuo Kichiro A. Rimorin

Abstract:

The Public Utility Vehicle Modernization Program (PUVMP) is a program meant to reform the current state of the Philippines’ public transportation sector. This study determined the impact of the Public Utility Vehicle Modernization Program on San Fernando City, La Union's jeepney drivers, interviewing six individuals, three with traditional vehicles and three with modernized units. This study used a descriptive qualitative research design and employed purposive sampling to select the six participants suited for the study, who were then subjected to a semi-structured face-to-face interview. The gathered data was then analyzed through thematic analysis. The findings highlighted evidence that the jeepney drivers experienced abrupt and prevailing changes in their routine and in their everyday work. This study concludes that while the sentiment of the program was appreciated, it has changed the environment for jeepney drivers drastically, provoking many reactions. These changes have, of course, shifted the daily lives of the jeepney drivers significantly, but through adaptability, they found ways. Recommendations include flexible compliance policies, educational initiatives, and support for drivers, providing valuable insights for informed decision-making in the ongoing transportation modernization discussion. This study concluded that while the drivers are not opposed to reform, they are not entirely in approval of the current effects of the program as it is being implemented in their local area.

Keywords: transport reform, transport modernization, public transport, jeepney drivers, PUVMP, urban planning, public utility vehicles

Procedia PDF Downloads 36
6249 Problem of Services Selection in Ubiquitous Systems

Authors: Malika Yaici, Assia Arab, Betitra Yakouben, Samia Zermani

Abstract:

Ubiquitous computing is nowadays a reality through the networking of a growing number of computing devices. It allows providing users with context aware information and services in a heterogeneous environment, anywhere and anytime. Selection of the best context-aware service, between many available services and providers, is a tedious problem. In this paper, a service selection method based on Constraint Satisfaction Problem (CSP) formalism is proposed. The services are considered as variables and domains; and the user context, preferences and providers characteristics are considered as constraints. The Backtrack algorithm is used to solve the problem to find the best service and provider which matches the user requirements. Even though this algorithm has an exponential complexity, but its use guarantees that the service, that best matches the user requirements, will be found. A comparison of the proposed method with the existing solutions finishes the paper.

Keywords: ubiquitous computing, services selection, constraint satisfaction problem, backtrack algorithm

Procedia PDF Downloads 215
6248 Quality of Life Responses of Students with Intellectual Disabilities Entering an Inclusive, Residential Post-Secondary Program

Authors: Mary A. Lindell

Abstract:

Adults with intellectual disabilities (ID) are increasingly attending postsecondary institutions, including inclusive residential programs at four-year universities. The legislation, national organizations, and researchers support developing postsecondary education (PSE) options for this historically underserved population. Simultaneously, researchers are assessing the quality of life indicators (QOL) for people with ID. This study explores the quality of life characteristics for individuals with ID entering a two-year PSE program. A survey aligned with the PSE program was developed and administered to participants before they began their college program (in future studies, the same survey will be administered 6 months and 1 year after graduating). Employment, income, and housing are frequently cited QOL measures. People with disabilities, and especially people with ID, are more likely to experience unemployment and low wages than people without disabilities. PSE improves adult outcomes (e.g., employment, income, housing) for people with and without disabilities. Similarly, adults with ID who attend PSE are more likely to be employed than their peers who do not attend PSE; however, adults with ID are least likely among their typical peers and other students with disabilities to attend PSE. There is increased attention to providing individuals with ID access to PSE and more research is needed regarding the characteristics of students attending PSE. This study focuses on the participants of a fully residential two-year program for individuals with ID. Students earn an Applied Skills Certificate while focusing on five benchmarks: self-care, home care, relationships, academics, and employment. To create a QOL measure, the goals of the PSE program were identified, and possible assessment items were initially selected from the National Core Indicators (NCI) and the National Transition Longitudinal Survey 2 (NTLS2) that aligned with the five program goals. Program staff and advisory committee members offered input on potential item alignment with program goals and expected value to students with ID in the program. National experts in researching QOL outcomes of people with ID were consulted and concurred that the items selected would be useful in measuring the outcomes of postsecondary students with ID. The measure was piloted, modified, and administered to incoming students with ID. Research questions: (1) In what ways are students with ID entering a two-year PSE program similar to individuals with ID who complete the NCI and NTLS2 surveys? (2) In what ways are students with ID entering a two-year PSE program different than individuals with ID who completed the NCI and NTLS2 surveys? The process of developing a QOL measure specific to a PSE program for individuals with ID revealed that many of the items in comprehensive national QOL measures are not relevant to stake-holders of this two-year residential inclusive PSE program. Specific responses of students with ID entering an inclusive PSE program will be presented as well as a comparison to similar items on national QOL measures. This study explores the characteristics of students with ID entering a residential, inclusive PSE program. This information is valuable for, researchers, educators, and policy makers as PSE programs become more accessible for individuals with ID.

Keywords: intellectual disabilities, inclusion, post-secondary education, quality of life

Procedia PDF Downloads 77
6247 Protection of Television Programme Formats in Comparative Law

Authors: Mustafa Arikan, Ibrahim Ercan

Abstract:

In this paper, protection of program formats was investigated in terms of program formats. Protection of program formats was studied in the French Law in the sense of competition law and CPI. Since the English Judicial system exhibits differences from the legal system of Continental Europe, its investigation bears a special significance. The subject was also handled in German Law at length. Indeed, German Law was investigated in detail within the overall framework of the study. Here, the court decisions in the German Law and the views in the doctrine were expressed in general. There are many court decisions in the American legal system concerning the subject. These decisions also present alternatives in terms of a solution to the problem.

Keywords: comparative law, protection of television programme formats, intellectual property, american legal system

Procedia PDF Downloads 302
6246 User Authentication Using Graphical Password with Sound Signature

Authors: Devi Srinivas, K. Sindhuja

Abstract:

This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.

Keywords: security, graphical password, persuasive cued click points

Procedia PDF Downloads 515
6245 Educational Plan and Program of the Subject: Maintenance of Electric Power Equipment

Authors: Rade M. Ciric, Sasa Mandic

Abstract:

Students of Higher Education Technical School of Professional Studies, in Novi Sad follow the subject Maintenance of electric power equipment at the Electrotechnical Department. This paper presents educational plan and program of the subject Maintenance of electric power equipment. The course deals with the problems of preventive and investing maintenance of transformer stations (TS), performing and maintenance of grounding of TS and pillars, as well as tracing and detection the location of the cables failure. There is a special elaborated subject concerning the safe work conditions for the electrician during network maintenance, as well as the basics of making and keeping technical documentation of the equipment.

Keywords: educational plan and program, electric power equipment, maintenance, technical documentation, safe work

Procedia PDF Downloads 437
6244 A Pervasive System Architecture for Smart Environments in Internet of Things Context

Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço

Abstract:

Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.

Keywords: internet of things, cloud, intelligent personal assistant, architecture

Procedia PDF Downloads 485
6243 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 147