Search results for: frequent user discount program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6840

Search results for: frequent user discount program

6450 Study of Village Scale Community Based Water Supply and Sanitation Program (Pamsimas) in Indonesia

Authors: Reza Eka Putra

Abstract:

Pamsimas is a community based drinking water supply and sanitation program which is contributed by local community, local government, central government, and World Bank with the aim of achieving Water Supply and Sanitation - the Millennium Development Goals (WSS-MDGs) target. This program is supported by the Ministry of Public Works as the executing agency with the cooperation of Ministry of Interior and the Ministry of Health. Field observations were conducted in two rural samples of 2009 beneficiaries Pamsimas West Java, which is in Ponggang Village, Subang District. The study was evaluated through several parameters, including technical, health, and empowerment aspect. Evaluation was done by comparing the parameters of success that has been set by Pamsimas through Pamsimas book manuals with the parameters from Sanitation & Infrastructure course regarding the appropriate application of technology in society. The result of the study is that the potency of the community before the program is implemented in the village is the determining factor. Stronger cooperation pattern in Ponggang Vilage results in a successful program. Both villages showed a pattern of behavior changes from indiscriminate defecation to sanitary latrine use. Besides, there is a decline in the number of cases of diarrheal disease since the year of Pamsimas implementation.

Keywords: millenium development goals, community develpoment, water supply, sanitation

Procedia PDF Downloads 254
6449 A Proposed Training Program for the Development of the Kindergarten Teacher According To Her Contemporary Professionàĺ Needs

Authors: Abdulhakim Ali Mosleh Alzubidy

Abstract:

The study's aim was to establish a proposed training program for kindergarten teachers according to their modern professional demands so that they could effectively teach children through movement education and play. The sample, which consisted of (46) teachers and administrators selected at random from the Ibb governorate, represented the study population of kindergarten teachers and administrators. The researcher developed three survey forms as a tool for data collection, and the forms were used with the research sample. The researcher used the descriptive method due to its applicability and the nature of the study, and he also used the appropriate statistical treatment of the data, which is to extract the percentage and the percentage of agreement. The study came to the following conclusions: ● The proposed program is of great importance in preparing the kindergarten teacher in an appropriate manner that keeps pace with modern developments in this field. ● The field of movement education is a necessity for the kindergarten teacher, through which she will be able to prepare the child physically and kinetically and teach him effectively the principles of reading, writing, and numerical and arithmetic concepts.

Keywords: training program, professional needs, kindergarten, kindergarten teacher

Procedia PDF Downloads 85
6448 The Analyzer: Clustering Based System for Improving Business Productivity by Analyzing User Profiles to Enhance Human Computer Interaction

Authors: Dona Shaini Abhilasha Nanayakkara, Kurugamage Jude Pravinda Gregory Perera

Abstract:

E-commerce platforms have revolutionized the shopping experience, offering convenient ways for consumers to make purchases. To improve interactions with customers and optimize marketing strategies, it is essential for businesses to understand user behavior, preferences, and needs on these platforms. This paper focuses on recommending businesses to customize interactions with users based on their behavioral patterns, leveraging data-driven analysis and machine learning techniques. Businesses can improve engagement and boost the adoption of e-commerce platforms by aligning behavioral patterns with user goals of usability and satisfaction. We propose TheAnalyzer, a clustering-based system designed to enhance business productivity by analyzing user-profiles and improving human-computer interaction. The Analyzer seamlessly integrates with business applications, collecting relevant data points based on users' natural interactions without additional burdens such as questionnaires or surveys. It defines five key user analytics as features for its dataset, which are easily captured through users' interactions with e-commerce platforms. This research presents a study demonstrating the successful distinction of users into specific groups based on the five key analytics considered by TheAnalyzer. With the assistance of domain experts, customized business rules can be attached to each group, enabling The Analyzer to influence business applications and provide an enhanced personalized user experience. The outcomes are evaluated quantitatively and qualitatively, demonstrating that utilizing TheAnalyzer’s capabilities can optimize business outcomes, enhance customer satisfaction, and drive sustainable growth. The findings of this research contribute to the advancement of personalized interactions in e-commerce platforms. By leveraging user behavioral patterns and analyzing both new and existing users, businesses can effectively tailor their interactions to improve customer satisfaction, loyalty and ultimately drive sales.

Keywords: data clustering, data standardization, dimensionality reduction, human computer interaction, user profiling

Procedia PDF Downloads 73
6447 Developing Future New Roles for Traditional Birth Attendants in Nigeria

Authors: Hauwau Mohammed

Abstract:

Research purpose: the integration of Traditional Birth Attendants (TBAs) has long been initiated into healthcare systems. This has been to help improve maternal mortality, particularly in developing countries. Nigeria is seen as one of the countries with a high maternal death rate due to common pregnancy complications and low resources. Communities with challenges of universal coverage of skilled workers rely on TBAs for pregnancy-related services, including delivery. The Sokoto State government has conducted several training programs on a significant number of TBAs to enable a formal integration of relationships with skilled healthcare for women in rural regions. This study aims to explore a standard method and develop an assessment framework for improving TBAs training programs in Sokoto State. Research Design, Methodology & Methods : Using a qualitative design, an interpretive phenomenology approach will be applied to explore the lived-experiences of 28 TBAs, who have undergone a form of training while also examining the strategies used to develop those programs through 8 policymakers and/or program trainers. For the collection stage, a focus group discussion and a face-to-face interview will be conducted, where the latter is for TBAs and the former for policymakers and training officials. Analysis: Data will be analyse through IPA format while using Nvivo to code and catalog personal experiential generated patterns. Secondary review: a scoping review of secondary data from Nigeria was used to map the knowledge gap and the extent of available data. The thematic analytic findings suggested that there are various approaches used to incorporate TBAs into the healthcare system, which include interventional programs targeted at specific health issues. In addition, incentives were used to encourage TBAs to facilitate the frequent use of skilled care for women.

Keywords: traditional birth attendants, Nigeria, training, program

Procedia PDF Downloads 83
6446 A Drawing Software for Designers: AutoCAD

Authors: Mayar Almasri, Rosa Helmi, Rayana Enany

Abstract:

This report describes the features of AutoCAD software released by Adobe. It explains how the program makes it easier for engineers and designers and reduces their time and effort spent using AutoCAD. Moreover, it highlights how AutoCAD works, how some of the commands used in it, such as Shortcut, make it easy to use, and features that make it accurate in measurements. The results of the report show that most users of this program are designers and engineers, but few people know about it and find it easy to use. They prefer to use it because it is easy to use, and the shortcut commands shorten a lot of time for them. The feature got a high rate and some suggestions for improving AutoCAD in Aperture, but it was a small percentage, and the highest percentage was that they didn't need to improve the program, and it was good.

Keywords: artificial intelligence, design, planning, commands, autodesk, dimensions

Procedia PDF Downloads 131
6445 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 359
6444 Development of Web-Based Remote Desktop to Provide Adaptive User Interfaces in Cloud Platform

Authors: Shuen-Tai Wang, Hsi-Ya Chang

Abstract:

Cloud virtualization technologies are becoming more and more prevalent, cloud users usually encounter the problem of how to access to the virtualized remote desktops easily over the web without requiring the installation of special clients. To resolve this issue, we took advantage of the HTML5 technology and developed web-based remote desktop. It permits users to access the terminal which running in our cloud platform from anywhere. We implemented a sketch of web interface following the cloud computing concept that seeks to enable collaboration and communication among users for high performance computing. Given the development of remote desktop virtualization, it allows to shift the user’s desktop from the traditional PC environment to the cloud platform, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: virtualization, remote desktop, HTML5, cloud computing

Procedia PDF Downloads 339
6443 Project Management Tools within SAP S/4 Hana Program Environment

Authors: Jagoda Bruni, Jan Müller-Lucanus, Gernot Stöger-Knes

Abstract:

The purpose of this article is to demonstrate modern project management approaches in the SAP S/R Hana surrounding a programming environment composed of multiple focus-diversified projects. We would like to propose innovative and goal-oriented management standards based on the specificity of the SAP transformations and customer-driven expectations. Due to the regular sprint-based controlling and management tools' application, it has been data-proven that extensive analysis of productive hours of the employees as much as a thorough review of the project progress (per GAP, per business process, and per Lot) within the whole program, can have a positive impact on customer satisfaction and improvement for projects' budget. This has been a collaborative study based on real-life experience and measurements in collaboration with our customers.

Keywords: project management, program management, SAP, controlling

Procedia PDF Downloads 91
6442 Transmission Loss Analysis for Panels Laminated with Felt and Film

Authors: Yoshio Kurosawa

Abstract:

To reduce the interior noise of cars in high-frequency region, sound proof materials are laminated with the body panels and the interior trims. Therefore, sound proof properties of the laminates play an important role for the efficient acoustical design. A program code which predicts both sound absorption properties and sound insulation properties of the laminates are developed. This program code is used for transfer matrix method by Biot theory. This report described the outline of this program code, and the calculation results almost agreed with the experimental results.

Keywords: porous media, transmission loss, Biot theory, transfer matrix method

Procedia PDF Downloads 274
6441 A Bi-Objective Model to Address Simultaneous Formulation of Project Scheduling and Material Ordering

Authors: Babak H. Tabrizi, Seyed Farid Ghaderi

Abstract:

Concurrent planning of project scheduling and material ordering has been increasingly addressed within last decades as an approach to improve the project execution costs. Therefore, we have taken the problem into consideration in this paper, aiming to maximize schedules quality robustness, in addition to minimize the relevant costs. In this regard, a bi-objective mathematical model is developed to formulate the problem. Moreover, it is possible to utilize the all-unit discount for materials purchasing. The problem is then solved by the constraint method, and the Pareto front is obtained for a variety of robustness values. The applicability and efficiency of the proposed model is tested by different numerical instances, finally.

Keywords: e-constraint method, material ordering, project management, project scheduling

Procedia PDF Downloads 295
6440 The Effect of Group Counseling Program on 9th Grade Students' Assertiveness Levels

Authors: Ismail Seçer, Kerime Meryem Dereli̇oğlu

Abstract:

This study is conducted to determine the effects of group counseling program on secondary school 9th grade students’ assertiveness skills. The study group was formed of 100 students who have received education in Erzurum Kültür Elementary School in 2015-2016 education years. RAE-Rathus Assertiveness Schedule developed by Voltan Acar was applied on this group to gather data. 40 students who got lower grades from the inventory were divided randomly into experimental and control groups. Each group is formed of 20 students. Group counseling program was carried out on the experimental group to improve the students’ assertiveness skills for 8 weeks. Single-way and two-way analysis of covariance (ANCOVA) were used in the analysis of the data. The data was analyzed by using the SPSS 19.00. The results of the study show that assertiveness skills of the students who participate in the group counseling program increased meaningfully compared to the control group and pre-experiment. Besides, it was determined that the change observed in the experimental group occurred separately from the age and socio-economic level variables, and it was determined with the monitoring test applied after four months that this affect was continued. According to this result, it can be said that the applied group counseling program is an effective means to improve the assertiveness skills of secondary school students.

Keywords: high school, assertiveness, assertiveness inventory, assertiveness education

Procedia PDF Downloads 246
6439 Knowledge-Driven Decision Support System Based on Knowledge Warehouse and Data Mining by Improving Apriori Algorithm with Fuzzy Logic

Authors: Pejman Hosseinioun, Hasan Shakeri, Ghasem Ghorbanirostam

Abstract:

In recent years, we have seen an increasing importance of research and study on knowledge source, decision support systems, data mining and procedure of knowledge discovery in data bases and it is considered that each of these aspects affects the others. In this article, we have merged information source and knowledge source to suggest a knowledge based system within limits of management based on storing and restoring of knowledge to manage information and improve decision making and resources. In this article, we have used method of data mining and Apriori algorithm in procedure of knowledge discovery one of the problems of Apriori algorithm is that, a user should specify the minimum threshold for supporting the regularity. Imagine that a user wants to apply Apriori algorithm for a database with millions of transactions. Definitely, the user does not have necessary knowledge of all existing transactions in that database, and therefore cannot specify a suitable threshold. Our purpose in this article is to improve Apriori algorithm. To achieve our goal, we tried using fuzzy logic to put data in different clusters before applying the Apriori algorithm for existing data in the database and we also try to suggest the most suitable threshold to the user automatically.

Keywords: decision support system, data mining, knowledge discovery, data discovery, fuzzy logic

Procedia PDF Downloads 335
6438 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script

Authors: Yash Goyal, Manish Korde, Juned Siddiqui

Abstract:

Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.

Keywords: responsive, accessible, attractive, interface, objective, security.

Procedia PDF Downloads 102
6437 Characterising Stable Model by Extended Labelled Dependency Graph

Authors: Asraful Islam

Abstract:

Extended dependency graph (EDG) is a state-of-the-art isomorphic graph to represent normal logic programs (NLPs) that can characterize the consistency of NLPs by graph analysis. To construct the vertices and arcs of an EDG, additional renaming atoms and rules besides those the given program provides are used, resulting in higher space complexity compared to the corresponding traditional dependency graph (TDG). In this article, we propose an extended labeled dependency graph (ELDG) to represent an NLP that shares an equal number of nodes and arcs with TDG and prove that it is isomorphic to the domain program. The number of nodes and arcs used in the underlying dependency graphs are formulated to compare the space complexity. Results show that ELDG uses less memory to store nodes, arcs, and cycles compared to EDG. To exhibit the desirability of ELDG, firstly, the stable models of the kernel form of NLP are characterized by the admissible coloring of ELDG; secondly, a relation of the stable models of a kernel program with the handles of the minimal, odd cycles appearing in the corresponding ELDG has been established; thirdly, to our best knowledge, for the first time an inverse transformation from a dependency graph to the representing NLP w.r.t. ELDG has been defined that enables transferring analytical results from the graph to the program straightforwardly.

Keywords: normal logic program, isomorphism of graph, extended labelled dependency graph, inverse graph transforma-tion, graph colouring

Procedia PDF Downloads 212
6436 Kinematic Behavior of Geogrid Reinforcements during Earthquakes

Authors: Ahmed Hosny Abdel-Rahman, Mohamed Abdel-Moneim

Abstract:

Reinforced earth structures are generally subjected to cyclic loading generated from earthquakes. This paper presents a summary of the results and analyses of a testing program carried out in a large-scale multi-function geosynthetic testing apparatus that accommodates soil samples up to 1.0 m3. This apparatus performs different shear and pullout tests under both static and cyclic loading. The testing program was carried out to investigate the controlling factors affecting soil/geogrid interaction under cyclic loading. The extensibility of the geogrids, the applied normal stresses, the characteristics of the cyclic loading (frequency, and amplitude), and initial static load within the geogrid sheet were considered in the testing program. Based on the findings of the testing program, the effect of these parameters on the pullout resistance of geogrids, as well as the displacement mobility under cyclic loading were evaluated. Conclusions and recommendations for the design of reinforced earth walls under cyclic loading are presented.

Keywords: geogrid, soil, interface, cyclic loading, pullout, large scale testing

Procedia PDF Downloads 622
6435 Positive Psychology and Parenting: A Case Study

Authors: Victor William Harris

Abstract:

Objective. This study examined the impact of the Positive Behavioral Management Skills (PBMS) online educational program on participants (n = 624) in a Southeastern region of the United States. The PBMS program incorporates established positive psychology behavioral management principles with new research-based practices designed to promote healthy and satisfying relationships between adults and children while constructively managing and preventing problematic behavior. Additionally, the PBMS program assists parents and teachers in recognizing the motivations behind a wide range of misbehaviors. The program also offers to forewarn some of the most common mistakes (or “parent traps”) in child behavioral management and describes how they can be avoided. It also describes how to recognize and capitalize on “teachable moments,” which are indispensable in the developmental process. Design. A retrospective-pre-test-then-post-test design was used to reduce response shift bias when assessing knowledge and skill intervention outcomes for twenty-two behavioral management variables. Results. The PBMS program was shown to be effective for increasing knowledge and skills related to managing misbehavior while reinforcing interpersonal relationships and fostering a sense of responsibility and capability within the child. Large standardized mean effect size changes from before to after program intervention was documented for PBMS participants on all twenty-two variables studied. Conclusion. The PBMS program showed initial positive outcomes to assist participants in the sample studied to increase their knowledge and skills in managing child behavior successfully. Implications for parents, educators and practitioners are discussed.

Keywords: behavioral management, discipline, parent education, positive parenting, positive psychology-parenting

Procedia PDF Downloads 221
6434 Player Experience: A Research on Cross-Platform Supported Games

Authors: Salih Akkemik

Abstract:

User Experience has a characterized perspective based on two fundamentals: the usage process and the product. Digital games can be considered as a special interactive system. This system has a very specific purpose and this is to make the player feel good while playing. At this point, Player Experience (PX) and User Experience (UX) are similar. UX focuses on the user feels good, PX focuses on the player feels good. The most important difference between the two is the action taken. These are actions of using and playing. In this study, the player experience will be examined primarily. PX may differ on different platforms. Nowadays, companies are releasing the successful and high-income games that they have developed with cross-platform support. Cross-platform is the most common expression that an application can run on different operating systems, in other words, be developed to support different operating systems. In terms of digital games, cross-platform support means that a game can be played on a computer, console or mobile device environment, more specifically, the game developed is designed and programmed to be played in the same way on at least two different platforms, such as Windows, MacOS, Linux, iOS, Android, Orbis OS or Xbox OS. Different platforms also accommodate different player groups, profiles and preferences. This study aims to examine these different player profiles in terms of player experience and to determine the effects of cross-platform support on player experience.

Keywords: cross-platform, digital games, player experience, user experience

Procedia PDF Downloads 206
6433 Making Waves: Preparing the Next Generation of Bilingual Medical Doctors

Authors: Edith Esparza-Young, Ángel M. Matos, Yaritza Gonzalez, Kirthana Sugunathevan

Abstract:

Introduction: This research describes the existing medical school program which supports a multicultural setting and bilingualism. The rise of Spanish speakers in the United States has led to the recruitment of bilingual medical students who can serve the evolving demographics. This paper includes anecdotal evidence, narratives and the latest research on the outcomes of supporting a multilingual academic experience in medical school and beyond. People in the United States will continue to need health care from physicians who have experience with multicultural competence. Physicians who are bilingual and possess effective communication skills will be in high demand. Methodologies: This research is descriptive. Through this descriptive research, the researcher will describe the qualities and characteristics of the existing medical school programs, curriculum, and student services. Additionally, the researcher will shed light on the existing curriculum in the medical school and also describe specific programs which help to serve as safety nets to support diverse populations. The method included observations of the existing program and the implementation of the medical school program, specifically the Accelerated Review Program, the Language Education and Professional Communication Program, student organizations and the Global Health Institute. Concluding Statement: This research identified and described characteristics of the medical school’s program. The research explained and described the current and present phenomenon of this medical program, which has focused on increasing the graduation of bilingual and minority physicians. The findings are based on observations of the curriculum, programs and student organizations which evolves and remains innovative to stay current with student enrollment.

Keywords: bilingual, English, medicine, doctor

Procedia PDF Downloads 139
6432 Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol

Authors: Saransh Sharma, Atharv Dekhne

Abstract:

Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly.

Keywords: passwordless, OAuth, bitcoin, ZKP, SIN, BIP

Procedia PDF Downloads 95
6431 Integrated Grey Rational Analysis-Standard Deviation Method for Handover in Heterogeneous Networks

Authors: Mohanad Alhabo, Naveed Nawaz, Mahmoud Al-Faris

Abstract:

The dense deployment of small cells is a promising solution to enhance the coverage and capacity of the heterogeneous networks (HetNets). However, the unplanned deployment could bring new challenges to the network ranging from interference, unnecessary handovers and handover failures. This will cause a degradation in the quality of service (QoS) delivered to the end user. In this paper, we propose an integrated Grey Rational Analysis Standard Deviation based handover method (GRA-SD) for HetNet. The proposed method integrates the Standard Deviation (SD) technique to acquire the weight of the handover metrics and the GRA method to select the best handover base station. The performance of the GRA-SD method is evaluated and compared with the traditional Multiple Attribute Decision Making (MADM) methods including Simple Additive Weighting (SAW) and VIKOR methods. Results reveal that the proposed method has outperformed the other methods in terms of minimizing the number of frequent unnecessary handovers and handover failures, in addition to improving the energy efficiency.

Keywords: energy efficiency, handover, HetNets, MADM, small cells

Procedia PDF Downloads 116
6430 Power Allocation in User-Centric Cell-Free Massive Multiple-Input Multiple-Output Systems with Limited Fronthaul Capacity

Authors: Siminfar Samakoush Galougah

Abstract:

In this paper, we study two power allocation problems for an uplink user-centric (UC) cell-free massive multiple-input multiple-output (CF-mMIMO) system. Besides, we assume each access point (AP) is connected to a central processing unit (CPU) via a fronthaul link with limited capacity. To efficiently use the fronthaul capacity, two strategies for transmitting signals from APs to the CPU are employed, namely, compress-forward estimate (CFE), estimate-compress-forward (ECF). The capacity of the aforementioned strategies in user-centric CF-mMIMO is drived. Then, we solved the two power allocation problems with minimum Spectral Efficiency (SE) and sum-SE maximization objectives for ECF and CFE strategies.

Keywords: cell-free massive MIMO, limited capacity fronthaul, spectral efficiency

Procedia PDF Downloads 70
6429 Universal Health Coverage 2019 in Indonesia: The Integration of Family Planning Services in Current Functioning Health System

Authors: Fathonah Siti, Ardiana Irma

Abstract:

Indonesia is currently on its track to achieve Universal Health Coverage (UHC) by 2019. The program aims to address issues on disintegration in the implementation and coverage of various health insurance schemes and fragmented fund pooling. Family planning service is covered as one of benefit packages under preventive care. However, little has been done to examine how family planning program are appropriately managed across levels of governments and how family planning services are delivered to the end user. The study is performed through focus group discussion to related policy makers and selected programmers at central and district levels. The study is also benefited from relevant studies on family planning in the UHC scheme and other supporting data. The study carefully investigates some programmatic implications when family planning is integrated in the UHC program encompassing the need to recalculate contraceptive logistics for beneficiaries (eligible couple); policy reformulation for contraceptive service provision including supply chain management; establishment of family planning standard of procedure; and a call to update Management Information System. The study confirms that there is a significant increase in the numbers of contraceptive commodities needs to be procured by the government. Holding an assumption that contraceptive prevalence rate and commodities cost will be as expected increasing at 0.5% annually, the government need to allocate almost IDR 5 billion by 2019, excluded fee for service. The government shifts its focus to maintain eligible health facilities under National Population and Family Planning Board networks. By 2019, the government has set strategies to anticipate the provision of family planning services to 45.340 health facilities distributed in 514 districts and 7 thousand sub districts. Clear division of authorities has been established among levels of governments. Three models of contraceptive supply planning have been developed and currently in the process of being institutionalized. Pre service training for family planning services has been piloted in 10 prominent universities. The position of private midwives has been appreciated as part of the system. To ensure the implementation of quality and health expenditure control, family planning standard has been established as a reference to determine set of services required to deliver to the clients properly and types of health facilities to conduct particular family planning services. Recognition to individual status of program participation has been acknowledged in the Family Enumeration since 2015. The data is precisely recorded by name by address for each family and its members. It supplies valuable information to 15.131 Family Planning Field Workers (FPFWs) to provide information and education related to family planning in an attempt to generate demand and maintain the participation of family planning acceptors who are program beneficiaries. Despite overwhelming efforts described above, some obstacles remain. The program experiences poor socialization and yet removes geographical barriers for those living in remote areas. Family planning services provided for this sub population conducted outside the scheme as a complement strategy. However, UHC program has brought remarkable improvement in access and quality of family planning services.

Keywords: beneficiary, family planning services, national population and family planning board, universal health coverage

Procedia PDF Downloads 189
6428 Improving Student Retention with Summer Bridge Programs

Authors: Elizabeth Watson, Sara Vogt

Abstract:

The transition from high school to college can be an exciting and confusing time for many students, especially college students with disabilities. In 1983, the University of Wisconsin-Whitewater created a Summer Transition Program (STP) for such students as part of a US Department of Education Demonstration Grant. This program offers incoming students the opportunity to take 2 college courses and live on campus for 4 weeks to help introduce and familiarize them with typical college expectations and support services. Over the past 30 years, 48% of the students have graduated, exceeding the national college graduation rate for students with disabilities. This mixed methods longitudinal study will discuss how this program has increased retention and graduation rates, and success in the co-curricular and living environments for students with disabilities.

Keywords: disability, transition, post-secondary education, retention

Procedia PDF Downloads 292
6427 Human-Computer Interaction: Strategies for Ensuring the Design of User-Centered Web Interfaces for Smartphones

Authors: Byron Joseph A. Hallar, Annjeannette Alain D. Galang, Maria Visitacion N. Gumabay

Abstract:

The widespread adoption and increasing proliferation of smartphones that started during the first decade of the twenty-first century have enabled their users to communicate and access information in ways that were merely thought of as possibilities in the few years before the smartphone revolution. A product of the convergence of the cellular phone and portable computer, the smartphone provides an additional important function that used to be the exclusive domain of desktop-bound computers and portable computers: Web Browsing. For increasing numbers of users, the smartphone and allied devices such as tablet computers have become their first and often their only means of accessing the World Wide Web. This has led to the development of websites that cater to the needs of the new breed of smartphone-carrying web users. The smaller size of smartphones as compared with conventional computers has provided unique challenges to web interface designers. The smaller screen size and touchscreen interface have made it much more difficult to read and navigate through web pages that were in most part designed for traditional desktop and portable computers. Although increasing numbers of websites now provide an alternate website formatted for smartphones, problems with ease of use, reliability and usability still remain. This study focuses on the identification of the problems associated with smartphone web interfaces, the compliance with accepted standards of user-oriented web interface design, the strategies that could be utilized to ensure the design of user-centric web interfaces for smartphones, and the identification of the current trends and developments related to user-centric web interface design intended for the consumption of smartphone users.

Keywords: human-computer interaction, user-centered design, web interface, mobile, smartphone

Procedia PDF Downloads 356
6426 Integration Program Through Physical Education Lessons for The Influence of Some Physical Fitness Health-Related Components in Visual Handicapped Children

Authors: Said S. Almaiuof

Abstract:

Integration Program Through Physical Education Lessons for The Influence of Some Physical Fitness Health-Related Components in Visual Handicapped Children. Propose of the study: The aim of this study is to design and evaluate a program for the physical education lesson to improve the cardio-respiratory endurance, considering the lesson of physical education as one of the educational means to achieve the society aims toward health and fitness, concerning the importance of the cardio-respiratory endurance as an essential one of the physical fitness health-related components. And this program tried to give them hand of help as a part of the society having the same rights as the rest of the society. Methodology: The researcher used the experimental method as a suitable method for this study and tested its hypothesis. The subject of the research selected randomly of the two classes from primary education in TRIPOLI-LIBYA, it was 28 boys (14-15) years old, then divided into groups, experimental group, n=13, which practiced the special exercises program and control group, n=15, which only practiced the normal school program. The selected child subjected to a medical examination in order to make sure that they are healthy, and the Vo2max measured by cycle ergometry and test some physical fitness makers before and after the program. Results: The study cleared that the experimental group developed in all physical variation in comparison with the control group which has a little development in a general balance only. Results are following: 1. The experimental group was successful more than the control group in all the research variation. 2. There were some improvements in time of keeping Balance in control group only. Discussion /conclusion: According to statistical analysis of data related to the values of the variables in this study; the suggested exercise program according to development the cardio respiratory endurance (CRE), and some physical fitness more than the program which already implemented in the school was less effective, just there is developing on keep balancing. It’s statistically significant (p<0.05) after applying this program. Improving the experimental group on (CRE), balance, running, sit and reach, from the suggested exercise program of what indicate the partaking program positive in improve those physical variables, and the selected exercises may contributed in improving the (CRE) for visual impairment and its pivotal in visual impairment children’s life. A health-related physical education curriculum can provide students with substantially more physical activity during physical education classes. The results show that the physical rehabilitation program for visual impairment children helped them in developing their defects due to the injury which means that this program should be in every organization having this part of people to increase their production and give them hand of help as a part of the society having the same rights as the rest of the society and to establish the idea of sport for all.

Keywords: visual handicapped, cardio-respiratory endurance, health, ergometry, education

Procedia PDF Downloads 435
6425 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 172
6424 The Key to the Success of Hotel Loyalty Program Enrolments: An Assessment of the Best Practices within the Three Hospitality Tiers

Authors: Nicole Anne Bass Monsanto

Abstract:

The objective of this study were to identify the numerous effective ways of capturing new members to participate in the brand hotel loyalty programs through the following objectives: (1) To differentiate the appropriate approach on selling the loyalty program to the different consumer market within their tier; (2) to evaluate the different behavioural degree of guests from different aspects of class and preference; (3) to compare the 3 hospitality tiers and the best tactic of approach according to their target market; (4) to assess the best practices suitable to the category of hotel in their specific tier. This study is a mixed methods research which involves both qualitative and quantitative. The qualitative research consisted of twelve management level respondents from 6 different hotels. These hotels were subdivided into 3 hotel tiers -- Luxury Hotels Upper Upscale Hotels and Mid-Scale Hotels—and the research studied two hotels of each hotel tier. Meanwhile, the quantitative research was conducted to further confirm and enhance the results by the means of guest post-stay surveys. Research findings of the qualitative research were as follows: (1) There are no differentiated best practices in capturing new enrolments based on the hotel tier. (2) There is only one key tool that determines the hotel loyalty program enrolment success. Meanwhile, the research findings of the quantitative research lead to the conclusion that most guests do not participate in the loyalty program was because they were not invited from the start.

Keywords: best practices, loyalty program, hospitality tier, enrollment success

Procedia PDF Downloads 280
6423 Innovations in International Trauma Education: An Evaluation of Learning Outcomes and Community Impact of a Guyanese trauma Training Graduate Program

Authors: Jeffrey Ansloos

Abstract:

International trauma education in low and emerging economies requires innovative methods for capacity building in existing social service infrastructures. This study details the findings of a program evaluation used to assess the learning outcomes and community impact of an international trauma-focused graduate degree program in Guyana. Through a collaborative partnership between Lesley University, the Government of Guyana, and UNICEF, a 2-year low-residency masters degree graduate program in trauma-focused assessment, intervention, and treatment was piloted with a cohort of Guyanese mental health professionals. Through an analytical review of the program development, as well as qualitative data analysis of participant interviews and focus-groups, this study will address the efficacy of the programming in terms of preparedness of professionals to understand, evaluate and implement trauma-informed practices across various child, youth, and family mental health service settings. Strengths and limitations of this international trauma-education delivery model will be discussed with particular emphasis on the role of capacity-building interventions, community-based participatory curriculum development, innovative technological delivery platforms, and interdisciplinary education. Implications for further research and subsequent program development will be discussed.

Keywords: mental health promotion, global health promotion, trauma education, innovations in education, child, youth, mental health education

Procedia PDF Downloads 367
6422 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 57
6421 A User Centred Based Approach for Designing Everyday Product: A Case Study of an Alarm Clock

Authors: Obokhai Kess Asikhia

Abstract:

This work explores design concept generation by understanding user needs through observation and interview. The aim is to examine several principles and guidelines in obtaining evidence from observing how users interact with the targeted product and interviewing them to acquire deep insights of their needs. With the help of Quality Function Deployment (QFD), the identified needs of the users while interacting with the product were ranked using the normalised weighting approach. Furthermore, a low fidelity prototype of the alarm clock is developed with a view of addressing the identified needs of the users. Finally, the low fidelity prototype design was evaluated with two design prototypes already existing in the market through a study involving 30 participants. Preliminary results reveal higher performance ratings by the majority of the participants of the new prototype compared to the other existing alarm clocks in the market used in the study.

Keywords: design concept, low fidelity prototype, normalised weighting approach, quality function deployment, user needs

Procedia PDF Downloads 184