Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5538

Search results for: general attacks

5148 Educaton for Social Reconstruction: Impact of Social Terrorism on Women Education in Nigeria

Authors: Theresa Chinyere ONU

Abstract:

This paper examines the effect of social terrorism on education in Nigeria. The article looked into some prevailing conditions of international political unrest and insecurity. The fear and risk of these conditions to national security and the struggle for power establishment which has further intensified and taken the shape of terrorism has imposed devastating effects on the growth and prosperity of Nigeria; as traffic patterns get disturbed, hospitals and schools get dysfunctional. This has also affected the educational standard in Nigeria as parents are no longer comfortable in sending their children to schools in some states for the fear of terrorist attacks. The study emphasized the integrated the effort of the government management institutions.

Keywords: education, social terrorism, women, Nigeria

Procedia PDF Downloads 562
5147 Investigation of the EEG Signal Parameters during Epileptic Seizure Phases in Consequence to the Application of External Healing Therapy on Subjects

Authors: Karan Sharma, Ajay Kumar

Abstract:

Epileptic seizure is a type of disease due to which electrical charge in the brain flows abruptly resulting in abnormal activity by the subject. One percent of total world population gets epileptic seizure attacks.Due to abrupt flow of charge, EEG (Electroencephalogram) waveforms change. On the display appear a lot of spikes and sharp waves in the EEG signals. Detection of epileptic seizure by using conventional methods is time-consuming. Many methods have been evolved that detect it automatically. The initial part of this paper provides the review of techniques used to detect epileptic seizure automatically. The automatic detection is based on the feature extraction and classification patterns. For better accuracy decomposition of the signal is required before feature extraction. A number of parameters are calculated by the researchers using different techniques e.g. approximate entropy, sample entropy, Fuzzy approximate entropy, intrinsic mode function, cross-correlation etc. to discriminate between a normal signal & an epileptic seizure signal.The main objective of this review paper is to present the variations in the EEG signals at both stages (i) Interictal (recording between the epileptic seizure attacks). (ii) Ictal (recording during the epileptic seizure), using most appropriate methods of analysis to provide better healthcare diagnosis. This research paper then investigates the effects of a noninvasive healing therapy on the subjects by studying the EEG signals using latest signal processing techniques. The study has been conducted with Reiki as a healing technique, beneficial for restoring balance in cases of body mind alterations associated with an epileptic seizure. Reiki is practiced around the world and is recommended for different health services as a treatment approach. Reiki is an energy medicine, specifically a biofield therapy developed in Japan in the early 20th century. It is a system involving the laying on of hands, to stimulate the body’s natural energetic system. Earlier studies have shown an apparent connection between Reiki and the autonomous nervous system. The Reiki sessions are applied by an experienced therapist. EEG signals are measured at baseline, during session and post intervention to bring about effective epileptic seizure control or its elimination altogether.

Keywords: EEG signal, Reiki, time consuming, epileptic seizure

Procedia PDF Downloads 394
5146 Global and Domestic Response to Boko Haram Terrorism on Cameroon 2014-2018

Authors: David Nchinda Keming

Abstract:

The present study is focused on both the national and international collective fight against Boko Haram terrorism on Cameroon and the rule played by the Lake Chad Basin Countries (LCBCs) and the global community to suffocate the sect’s activities in the region. Although countries of the Lake Chad Basin include: Cameroon, Chad, Nigeria and Niger others like Benin also joined the course. The justification for the internationalisation of the fight against Boko Haram could be explained by the ecological and international climatic importance of the Lake Chad and the danger posed by the sect not only to the Lake Chad member countries but to global armed, civil servants and the international political economy. The study, therefore, kick start with Cameroon’s reaction to Boko Haram’s terrorist attacks on its territory. It further expounds on Cameroon’s request on bilateral diplomacy from members of the UN Security Council for an international collective support to staple the winds of the challenging sect. The study relies on the hypothesis that Boko Haram advanced terrorism on Cameroon was more challenging to the domestic military intelligence thus forcing the government to seek for bilateral and multilateral international collective support to secure its territory from the powerful sect. This premise is tested internationally via (multilateral cooperation, bilateral response, regional cooperation) and domestically through (solidarity parade, religious discourse, political manifestations, war efforts, the vigilantes and the way forward). To accomplish our study, we made used of the mixed research methodologies to interpret the primary, secondary and tertiary sources consulted. Our results reveal that the collective response was effectively positive justified by the drastic drop in the sect’s operations in Cameroon and the whole LCBCs. Although the sect was incapacitated, terrorism remains an international malaise and Cameroon hosts a fertile ground for terrorists’ activism. Boko Haram was just weakened and not completely defeated and could reappear someday even under a different appellation. Therefore, to absolutely eradicate terrorism in general and Boko Haram in particular, LCBCs must improve their military intelligence on terrorism and continue to collaborate with advanced experienced countries in fighting terrorism.

Keywords: Boko Haram, terrorism, domestic, international, response

Procedia PDF Downloads 142
5145 An Algorithm Based on the Nonlinear Filter Generator for Speech Encryption

Authors: A. Belmeguenai, K. Mansouri, R. Djemili

Abstract:

This work present a new algorithm based on the nonlinear filter generator for speech encryption and decryption. The proposed algorithm consists on the use a linear feedback shift register (LFSR) whose polynomial is primitive and nonlinear Boolean function. The purpose of this system is to construct Keystream with good statistical properties, but also easily computable on a machine with limited capacity calculated. This proposed speech encryption scheme is very simple, highly efficient, and fast to implement the speech encryption and decryption. We conclude the paper by showing that this system can resist certain known attacks.

Keywords: nonlinear filter generator, stream ciphers, speech encryption, security analysis

Procedia PDF Downloads 283
5144 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 423
5143 Cognitive Fusion and Obstacles to Valued Living: Beyond Pain-Specific Events in Chronic Pain

Authors: Sergio A. Carvalho, Jose Pinto-Gouveia, David Gillanders, Paula Castilho

Abstract:

The role of psychological processes has long been recognized as crucial factors in depressive symptoms in chronic pain (CP). Although some studies have explored the negative impact of being entangled with internal experiences (e.g., thoughts, emotions, physical sensations) – cognitive fusion, it is not extensively explored 1) whether these are pain-related or rather general difficult experiences, and 2) how they relate to experiencing obstacles in committing to valued actions. The current study followed a cross-sectional design in a sample of 231 participants with CP, in which a mediational model was tested through path analyses in AMOS software. The model presented a very good model fit (Χ²/DF = 1.161; CFI = .999; TLI = .996; RMSEA = .026, PCLOSE = .550.), and results showed that pain intensity was not directly related to depressive symptoms (β = .055; p = .239) but was mediated by cognitive fusion with both general and pain-related internal experiences (β = .181, 95%CI [.097; .271]; p = .015). Additionally, results showed that only general cognitive fusion (but not pain-specific fusion) was associated with experiencing obstacles to living a meaningful life, which mediated its impact on depressive symptoms (β = .197, 95%CI [.102; .307]; p = .001). Overall, this study adds on current literature by suggesting that psychological interventions to pain management should not be focused only on management of pain-related experiences, but also on developing more effective ways of relating to overall internal experiences.

Keywords: cognitive fusion, chronic pain, depressive symptoms, valued living

Procedia PDF Downloads 201
5142 An Ensemble Learning Method for Applying Particle Swarm Optimization Algorithms to Systems Engineering Problems

Authors: Ken Hampshire, Thomas Mazzuchi, Shahram Sarkani

Abstract:

As a subset of metaheuristics, nature-inspired optimization algorithms such as particle swarm optimization (PSO) have shown promise both in solving intractable problems and in their extensibility to novel problem formulations due to their general approach requiring few assumptions. Unfortunately, single instantiations of algorithms require detailed tuning of parameters and cannot be proven to be best suited to a particular illustrative problem on account of the “no free lunch” (NFL) theorem. Using these algorithms in real-world problems requires exquisite knowledge of the many techniques and is not conducive to reconciling the various approaches to given classes of problems. This research aims to present a unified view of PSO-based approaches from the perspective of relevant systems engineering problems, with the express purpose of then eliciting the best solution for any problem formulation in an ensemble learning bucket of models approach. The central hypothesis of the research is that extending the PSO algorithms found in the literature to real-world optimization problems requires a general ensemble-based method for all problem formulations but a specific implementation and solution for any instance. The main results are a problem-based literature survey and a general method to find more globally optimal solutions for any systems engineering optimization problem.

Keywords: particle swarm optimization, nature-inspired optimization, metaheuristics, systems engineering, ensemble learning

Procedia PDF Downloads 80
5141 Functional and Efficient Query Interpreters: Principle, Application and Performances’ Comparison

Authors: Laurent Thiry, Michel Hassenforder

Abstract:

This paper presents a general approach to implement efficient queries’ interpreters in a functional programming language. Indeed, most of the standard tools actually available use an imperative and/or object-oriented language for the implementation (e.g. Java for Jena-Fuseki) but other paradigms are possible with, maybe, better performances. To proceed, the paper first explains how to model data structures and queries in a functional point of view. Then, it proposes a general methodology to get performances (i.e. number of computation steps to answer a query) then it explains how to integrate some optimization techniques (short-cut fusion and, more important, data transformations). It then compares the functional server proposed to a standard tool (Fuseki) demonstrating that the first one can be twice to ten times faster to answer queries.

Keywords: data transformation, functional programming, information server, optimization

Procedia PDF Downloads 146
5140 Bulk Viscous Bianchi Type V Cosmological Model with Time Dependent Gravitational Constant and Cosmological Constant in General Relativity

Authors: Reena Behal, D. P. Shukla

Abstract:

In this paper, we investigate Bulk Viscous Bianchi Type V Cosmological Model with Time dependent gravitational constant and cosmological constant in general Relativity by assuming ξ(t)=ξ_(0 ) p^m where ξ_(0 ) and m are constants. We also assume a variation law for Hubble parameter as H(R) = a (R^(-n)+1), where a>0, n>1 being constant. Two universe models were obtained, and their physical behavior has been discussed. When n=1 the Universe starts from singular state whereas when n=0 the cosmology follows a no singular state. The presence of bulk viscosity increase matter density’s value.

Keywords: Bulk Viscous Bianchi Type V Cosmological Model, hubble constants, gravitational constant, cosmological constants

Procedia PDF Downloads 163
5139 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 499
5138 Empowering Teachers to Bolster Vocational Education in Cameroon

Authors: Ambissah Asah Brigitte

Abstract:

This research is guided by observations in the types of education offered at the secondary level in Cameroon. The secondary education system in Cameroon comprises two types of education, including General Education and Technical and Vocational Education. Although General Education and, Technical and Vocational Education are given equal importance by public authorities, General Education remains on the thriving trend, enjoying the greatest enrolment. In the meantime, Technical and Vocational Education is still to reach the adequate momentum expected to fostering the country’s full-fledged development, as specified in the National Development Strategy, which is the blue print of State policies in Cameroon for the 2020-2030 decade. Vocational Education is credited for its ability to foster a country’s development, since it teaches students the precise skills and knowledge needed to carry out a specific craft, technical skill or trade. Yet, formal training on Vocational Education for teachers offers a pale face in secondary education. This limits the ability of the educational system to nurture vocations and provide the country’s economy with the manpower necessary to achieving development goals. This article seeks to analyse how concretely does the institutional framework spur vocational skills in secondary school teachers. It overviews the instruments instituting Vocational Education at the secondary level in Cameroon, then assesses their effective implementation on the ground. Questionnaires addressed to both active teachers and vocational education policy-makers serve to collect data which are analysed using descriptive statistics. The final objective is to contribute in the debate urging to rethink the role of teachers in bolstering Vocational Education, which is the cornerstone of industrial development. This is true everywhere in the world. In Cameroon and in Africa in general, teachers must be empowered in this field with specific sets of competencies they will need to pass on to learners. They equally need to be given opportunities to acquire and adapt their knowledge and teaching skills accordingly.

Keywords: vocational education, cameroon, institutional framework, national development, competencies and skills

Procedia PDF Downloads 57
5137 Improving the Performance of Requisition Document Online System for Royal Thai Army by Using Time Series Model

Authors: D. Prangchumpol

Abstract:

This research presents a forecasting method of requisition document demands for Military units by using Exponential Smoothing methods to analyze data. The data used in the forecast is an actual data requisition document of The Adjutant General Department. The results of the forecasting model to forecast the requisition of the document found that Holt–Winters’ trend and seasonality method of α=0.1, β=0, γ=0 is appropriate and matches for requisition of documents. In addition, the researcher has developed a requisition online system to improve the performance of requisition documents of The Adjutant General Department, and also ensuring that the operation can be checked.

Keywords: requisition, holt–winters, time series, royal thai army

Procedia PDF Downloads 291
5136 Magneto-Rheological Damper Based Semi-Active Robust H∞ Control of Civil Structures with Parametric Uncertainties

Authors: Vedat Senol, Gursoy Turan, Anders Helmersson, Vortechz Andersson

Abstract:

In developing a mathematical model of a real structure, the simulation results of the model may not match the real structural response. This is a general problem that arises during dynamic motion of the structure, which may be modeled by means of parameter variations in the stiffness, damping, and mass matrices. These changes in parameters need to be estimated, and the mathematical model is updated to obtain higher control performances and robustness. In this study, a linear fractional transformation (LFT) is utilized for uncertainty modeling. Further, a general approach to the design of an H∞ control of a magneto-rheological damper (MRD) for vibration reduction in a building with mass, damping, and stiffness uncertainties is presented.

Keywords: uncertainty modeling, structural control, MR Damper, H∞, robust control

Procedia PDF Downloads 130
5135 Improvement of Healthcare Quality and Psychological Stress Relieve for Transition Program in Intensive Care Units

Authors: Ru-Yu Lien, Shih-Hsin Hung, Shu-Fen Lu, Shu-I Chin, Wen-Ju Yang, Wan Ming-Shang, Chien-Ying Wang

Abstract:

Background: Upon recovery from critical condition, patients are normally transferred from the intensive care units (ICUs) to the general wards. However, transferring patients to a new environment causes stressful experiences for both patients and their families. Therefore, there is a necessity to communicate with the patients and their families to reduce psychological stress and unplanned return. Methods: This study was performed in the general ICUs from January 1, 2021, to December 31, 2021, in Taipei Veteran General Hospital. The patients who were evaluated by doctors and liaison nurses transferred to the general wards were selected as the research objects and ranked by the Critical Care Transition Program (CCTP). The plan was applied to 40 patients in a study group and usual care support for a control group of 40 patients. The psychological condition of patients was evaluated by a migration stress scale and a hospital anxiety and depression scale. In addition, the rate of return to ICU was also measured. Results: A total of 63 patients out of 80 (78.8%) experienced moderate to severe degrees of anxiety, and 42 patients (52.6%) experienced moderate to severe degrees of depression before being transferred. The difference between anxiety and depression changed more after the transfer; moreover, when a transition program was applied, it was lower than without a transition program. The return to ICU rate in the study group was lower than in the usual transition group, with an adjusted odds ratio of 0.21 (95% confidence interval: 0.05-0.888, P=0.034). Conclusion: Our study found that the transfer program could reduce the anxiety and depression of patients and the associated stress on their families during the transition from ICU. Before being transferred out of ICU, the healthcare providers need to assess the needs of patients to set the goals of the care plan and perform patient-centered decision-making with multidisciplinary support.

Keywords: ICU, critical care transition program, healthcare, transition program

Procedia PDF Downloads 62
5134 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices

Authors: Robin Singh, Jing-Chiou Liou

Abstract:

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secure

Keywords: cybersecurity, DDoS, IoT, medical devices

Procedia PDF Downloads 71
5133 Executive Deficits in Non-Clinical Hoarders

Authors: Thomas Heffernan, Nick Neave, Colin Hamilton, Gill Case

Abstract:

Hoarding is the acquisition of and failure to discard possessions, leading to excessive clutter and significant psychological/emotional distress. From a cognitive-behavioural approach, excessive hoarding arises from information-processing deficits, as well as from problems with emotional attachment to possessions and beliefs about the nature of possessions. In terms of information processing, hoarders have shown deficits in executive functions, including working memory, planning, inhibitory control, and cognitive flexibility. However, this previous research is often confounded by co-morbid factors such as anxiety, depression, or obsessive-compulsive disorder. The current study adopted a cognitive-behavioural approach, specifically assessing executive deficits and working memory in a non-clinical sample of hoarders, compared with non-hoarders. In this study, a non-clinical sample of 40 hoarders and 73 non-hoarders (defined by The Savings Inventory-Revised) completed the Adult Executive Functioning Inventory, which measures working memory and inhibition, Dysexecutive Questionnaire-Revised, which measures general executive function and the Hospital Anxiety and Depression Scale, which measures mood. The participant sample was made up of unpaid young adult volunteers who were undergraduate students and who completed the questionnaires on a university campus. The results revealed that, after observing no differences between hoarders and non-hoarders on age, sex, and mood, hoarders reported significantly more deficits in inhibitory control and general executive function when compared with non-hoarders. There was no between-group difference on general working memory. This suggests that non-clinical hoarders have a specific difficulty with inhibition-control, which enables you to resist repeated, unwanted urges. This might explain the hoarder’s inability to resist urges to buy and keep items that are no longer of any practical use. These deficits may be underpinned by general executive function deficiencies.

Keywords: hoarding, memory, executive, deficits

Procedia PDF Downloads 184
5132 Engaging Students with Special Education Needs through Technology-Enhanced Interactive Activities in Class

Authors: Pauli P.Y. Lai

Abstract:

Students with Special Education Needs (SEN) face many challenges in learning. Various challenges include difficulty in handwriting, slow understanding and assimilation, difficulty in paying attention during class, and lack of communication skills. To engage students with Special Education Needs in class with general students, Blackboard Collaborate is used as a teaching and learning tool to deliver a lecture with interactive activities. Blackboard Collaborate provides a good platform to create and enhance active, collaborative and interactive learning experience whereby the SEN students can easily interact with their general peers and the instructor by using the features of drawing on a virtual whiteboard, file sharing, classroom chatter, breakout room, hand-raising feature, polling, etc. By integrating a blended learning approach with Blackboard Collaborate, the students with Special Education Needs could engage in interactive activities with ease in class. Our research aims at exploring and discovering the use of Blackboard Collaborate for inclusive education based on a qualitative design with in-depth interviews. Being served in a general education environment, three university students with different kinds of learning disabilities have participated in our study. All participants agreed that functions provided by Blackboard Collaborate have enhanced their learning experiences and helped them learn better. Their academic performances also showed that SEN students could perform well with the help of technology. This research studies different aspects of using Blackboard Collaborate to create an inclusive learning environment for SEN students.

Keywords: blackboard collaborate, enhanced learning experience, inclusive education, special education needs

Procedia PDF Downloads 121
5131 General and Sport Specific Fitness Testing Practices: Global Developments

Authors: Peter Smolianov, Jed Smith, Lisa Chen, Steven Dion, Christopher Schoen, Jaclyn Norberg

Abstract:

This study compared general conditioning and sport specific fitness tests used in China, European Union (EU), Russia, and the United States. A constant content comparison method was used to identify the differences. Data from the study indicated that there were shared test components, including aerobic fitness, muscular strength, endurance, and flexibility. However, the testing components and items, as well as the cut-off values of the analyzed tests varied by country for the same gender and age. Culturally unique methods of testing and preparing for the tests were identified. Additionally, evidence revealed support for lifelong fitness and long-term sport participation through comprehensive fitness and wellness guidelines for different age groups and through new internet-based technologies.

Keywords: fitness testing, global trends, new developments, worldwide comparison

Procedia PDF Downloads 143
5130 Euthanasia in Dementia Cases: An Interview Study of Dutch Physicians' Experiences

Authors: J. E. Appel, R. N. Bouwmeester, L. Crombach, K. Georgieva, N. O’Shea, T. I. van Rijssel, L. Wingens

Abstract:

The Netherlands has a unique and progressive euthanasia law. Even people with advanced neurodegenerative diseases, like dementia, can request euthanasia when an Advanced Euthanasia Directive (AED) was written. Although the law sets some guidelines, in practice many complexities occur. Especially doctors experience difficult situations, as they have to decide whether euthanasia is justified. Research suggests that this leads to an emotional burden for them, due to feelings of isolation, fear of prosecution, as well as pressures from patient, family, or society. Existing literature, however, failed to address problems arising in dementia cases in particular, as well as possible sources of support. In order to investigate these issues, semi-structured in-depth interviews with 20 Dutch general practitioners and elderly care physicians will be conducted. Results are expected to be obtained by the end of December 2017.

Keywords: dementia, euthanasia, general practitioners, elderly care physicians, palliative care

Procedia PDF Downloads 202
5129 Demand Forecasting Using Artificial Neural Networks Optimized by Particle Swarm Optimization

Authors: Daham Owaid Matrood, Naqaa Hussein Raheem

Abstract:

Evolutionary algorithms and Artificial neural networks (ANN) are two relatively young research areas that were subject to a steadily growing interest during the past years. This paper examines the use of Particle Swarm Optimization (PSO) to train a multi-layer feed forward neural network for demand forecasting. We use in this paper weekly demand data for packed cement and towels, which have been outfitted by the Northern General Company for Cement and General Company of prepared clothes respectively. The results showed superiority of trained neural networks using particle swarm optimization on neural networks trained using error back propagation because their ability to escape from local optima.

Keywords: artificial neural network, demand forecasting, particle swarm optimization, weight optimization

Procedia PDF Downloads 434
5128 Effect of Progressive Muscle Relaxation on the Postpartum Depression and General Comfort Levels

Authors: İlknur Gökşin, Sultan Ayaz Alkaya

Abstract:

Objective: Progressive muscle relaxation (PMR) include the deliberate stretching and relaxation of the major muscle groups of the human body. This study was conducted to evaluate the effect of PMR applied in women on the postpartum depression and general comfort level. Methods: The study population of this quasi-experimental study with pre-test, post-test and control group consisted of primipara women who had vaginal delivery in the obstetric service of a university hospital. The experimental and control groups consisted of 35 women each. The data were collected by questionnaire, the Edinburgh Postnatal Depression Scale (EPDS) and the General Comfort Questionnaire (GCQ). The women were matched according to their age and education level and divided into the experimental and control groups by simple random selection. Postpartum depression risk and general comfort was evaluated at the 2nd and 5th days, 10th and 15th days, fourth week and eighth week after birth. The experimental group was visited at home and PMR was applied. After the first visit, women were asked to apply PMR regularly three times a week for eight weeks. During the application, the researcher called the participants twice a week to follow up the continuity of the application. No intervention was performed in the control group. For data analysis, descriptive statistics such as number, percentage, mean, standard deviation, significance test of difference between two means and ANOVA were used. Approval of the ethics committee and permission of the institution were obtained for the study. Results: There were no significant differences between the women in the experimental and control groups in terms of age, education status and employment status (p>0.05). There was no statistically significant difference between the experimental and control groups in terms of EPDS pre-test, 1st, 2nd and 3rd follow-up mean scores (p>0.05). There was a statistically significant difference between EPDS pre-test and 3rd follow-up scores of the experimental group (p<0.05), whereas there was no such difference in the control group (p>0.05). There was no statistically significant difference between the experimental and control groups in terms of mean GCQ pre-test scores (p>0.05), whereas in the 1st, 2nd and 3rd follow-ups there was a statistically significant difference between the mean GCQ scores (p<0.05). It was found that there was a significant increase in the GCQ physical, psychospiritual and sociocultural comfort sub-scales, relief and relaxation levels of the experimental group between the pre-test and 3rd follow-ups scores (p<0.05). And, a significant decrease was found between pre-test and 3rd follow-up GCQ psychospiritual, environmental and sociocultural comfort sub-scale, relief, relaxation and superiority levels (p<0.05). Conclusion: Progressive muscle relaxation was effective on reducing the postpartum depression risk and increasing general comfort. It is recommended to provide progressive muscle relaxation training to women in the postpartum period as well as ensuring the continuity of this practice.

Keywords: general comfort, postpartum depression, postpartum period, progressive muscle relaxation

Procedia PDF Downloads 248
5127 Digital Divide and Its Impact on the Students’ Performance

Authors: Aissa Hanifi

Abstract:

People across different world societies are using information and communication technology (ICT) for different purposes. Unfortunately, in contemporary societies, some people have little access to ICT and thus cannot have effective participation in society compared with those who have better access. The purpose of this study is to test the impact of ICTs on university life in general and students' performance in particular. The study relied on an online survey questionnaire that was administered to 30 undergraduate students at Chef University. The findings of the survey revealed that there is still an important number of students who do not have easy access to ICT. Such limited access to ICTs is attributed to varied factors. Some students live in rural areas, where due to the poor internet coverage, they face difficulties in competing with students who live in urban areas with better ICT access. The lack of ICT access has hindered the students' university performance in general and their language skills, and the exchange of information with teachers and classmates.

Keywords: access, communication, ICT, performance, technology

Procedia PDF Downloads 102
5126 Quasistationary States and Mean Field Model

Authors: Sergio Curilef, Boris Atenas

Abstract:

Systems with long-range interactions are very common in nature. They are observed from the atomic scale to the astronomical scale and exhibit anomalies, such as inequivalence of ensembles, negative heat capacity, ergodicity breaking, nonequilibrium phase transitions, quasistationary states, and anomalous diffusion. These anomalies are exacerbated when special initial conditions are imposed; in particular, we use the so-called water bag initial conditions that stand for a uniform distribution. Several theoretical and practical implications are discussed here. A potential energy inspired by dipole-dipole interactions is proposed to build the dipole-type Hamiltonian mean-field model. As expected, the dynamics is novel and general to the behavior of systems with long-range interactions, which is obtained through molecular dynamics technique. Two plateaus sequentially emerge before arriving at equilibrium, which are corresponding to two different quasistationary states. The first plateau is a type of quasistationary state the lifetime of which depends on a power law of N and the second plateau seems to be a true quasistationary state as reported in the literature. The general behavior of the model according to its dynamics and thermodynamics is described. Using numerical simulation we characterize the mean kinetic energy, caloric curve, and the diffusion law through the mean square of displacement. The present challenge is to characterize the distributions in phase space. Certainly, the equilibrium state is well characterized by the Gaussian distribution, but quasistationary states in general depart from any Gaussian function.

Keywords: dipole-type interactions, dynamics and thermodynamics, mean field model, quasistationary states

Procedia PDF Downloads 202
5125 Comparison of Two Maintenance Policies for a Two-Unit Series System Considering General Repair

Authors: Seyedvahid Najafi, Viliam Makis

Abstract:

In recent years, maintenance optimization has attracted special attention due to the growth of industrial systems complexity. Maintenance costs are high for many systems, and preventive maintenance is effective when it increases operations' reliability and safety at a reduced cost. The novelty of this research is to consider general repair in the modeling of multi-unit series systems and solve the maintenance problem for such systems using the semi-Markov decision process (SMDP) framework. We propose an opportunistic maintenance policy for a series system composed of two main units. Unit 1, which is more expensive than unit 2, is subjected to condition monitoring, and its deterioration is modeled using a gamma process. Unit 1 hazard rate is estimated by the proportional hazards model (PHM), and two hazard rate control limits are considered as the thresholds of maintenance interventions for unit 1. Maintenance is performed on unit 2, considering an age control limit. The objective is to find the optimal control limits and minimize the long-run expected average cost per unit time. The proposed algorithm is applied to a numerical example to compare the effectiveness of the proposed policy (policy Ⅰ) with policy Ⅱ, which is similar to policy Ⅰ, but instead of general repair, replacement is performed. Results show that policy Ⅰ leads to lower average cost compared with policy Ⅱ. 

Keywords: condition-based maintenance, proportional hazards model, semi-Markov decision process, two-unit series systems

Procedia PDF Downloads 106
5124 VDGMSISS: A Verifiable and Detectable Multi-Secret Images Sharing Scheme with General Access Structure

Authors: Justie Su-Tzu Juan, Ming-Jheng Li, Ching-Fen Lee, Ruei-Yu Wu

Abstract:

A secret image sharing scheme is a way to protect images. The main idea is dispersing the secret image into numerous shadow images. A secret image sharing scheme can withstand the impersonal attack and achieve the highly practical property of multiuse  is more practical. Therefore, this paper proposes a verifiable and detectable secret image-sharing scheme called VDGMSISS to solve the impersonal attack and to achieve some properties such as encrypting multi-secret images at one time and multi-use. Moreover, our scheme can also be used for any genera access structure.

Keywords: multi-secret image sharing scheme, verifiable, de-tectable, general access structure

Procedia PDF Downloads 115
5123 Establishing Multi-Leveled Computability as a Living-System Evolutionary Context

Authors: Ron Cottam, Nils Langloh, Willy Ranson, Roger Vounckx

Abstract:

We start by formally describing the requirements for environmental-reaction survival computation in a natural temporally-demanding medium, and develop this into a more general model of the evolutionary context as a computational machine. The effect of this development is to replace deterministic logic by a modified form which exhibits a continuous range of dimensional fractal diffuseness between the isolation of perfectly ordered localization and the extended communication associated with nonlocality as represented by pure causal chaos. We investigate the appearance of life and consciousness in the derived general model, and propose a representation of Nature within which all localizations have the character of quasi-quantal entities. We compare our conclusions with Heisenberg’s uncertainty principle and nonlocal teleportation, and maintain that computability is the principal influence on evolution in the model we propose.

Keywords: computability, evolution, life, localization, modeling, nonlocality

Procedia PDF Downloads 389
5122 iSEA: A Mobile Based Learning Application for History and Culture Knowledge Enhancement for the ASEAN Region

Authors: Maria Visitacion N. Gumabay, Byron Joseph A. Hallar, Annjeannette Alain D. Galang

Abstract:

This study was intended to provide a more efficient and convenient way for mobile users to enhance their knowledge about ASEAN countries. The researchers evaluated the utility of the developed crossword puzzle application and assessed the general usability of its user interface for its intended purpose and audience of users. The descriptive qualitative research method for the research design and the Mobile-D methodology was employed for the development of the software application output. With a generally favorable reception from its users, the researchers concluded that the iSEA Mobile Based Learning Application can be considered ready for general deployment and use. It was also concluded that additional studies can also be done to make a more complete assessment of the knowledge gained by its users before and after using the application.

Keywords: mobile learning, eLearning, crossword, ASEAN, iSEA

Procedia PDF Downloads 297
5121 Impact of Foreign Trade on Economic Growth: A Panel Data Analysis for OECD Countries

Authors: Burcu Guvenek, Duygu Baysal Kurt

Abstract:

The impact of foreign trade on economic growth has been discussed since the Classical Economists. Today, foreign trade has become more important for the country's economy with the increasing globalization. When it comes to foreign trade, policies which may vary from country to country and from time to time as protectionism or free trade are implemented. In general, the positive effect of foreign trade on economic growth is alleged. However, as studies supporting this general acceptance take place in the economics literature, there are also studies in the opposite direction. In this paper, the impact of foreign trade on economic growth will be investigated with the help of panel data analysis. For this research, 24 OECD countries’ GDP and foreign trade data, including the period of 1990 and 2010, will be used.

Keywords: foreign trade, economic growth, OECD countries, panel data analysis

Procedia PDF Downloads 373
5120 The Fight against Terrorist Radicalization: A French Perspective

Authors: Julia Burchett

Abstract:

After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.

Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism

Procedia PDF Downloads 420
5119 Regional Anesthesia in Carotid Surgery: A Single Center Experience

Authors: Daniel Thompson, Muhammad Peerbux, Sophie Cerutti, Hansraj Riteesh Bookun

Abstract:

Patients with carotid stenosis, which may be asymptomatic or symptomatic in the form of transient ischaemic attack (TIA), amaurosis fugax, or stroke, often require an endarterectomy to reduce stroke risk. Risks of this procedure include stroke, death, myocardial infarction, and cranial nerve damage. Carotid endarterectomy is most commonly performed under general anaesthetic, however, it can also be undertaken with a regional anaesthetic approach. Our tertiary centre generally performs carotid endarterectomy under regional anaesthetic. Our major tertiary hospital mostly utilises regional anaesthesia for carotid endarterectomy. We completed a cross-sectional analysis of all cases of carotid endarterectomy performed under regional anaesthesia across a 10-year period between January 2010 to March 2020 at our institution. 350 patients were included in this descriptive analysis, and demographic details for patients, indications for surgery, procedural details, length of surgery, and complications were collected. Data was cross tabulated and presented in frequency tables to describe these categorical variables. 263 of the 350 patients in the analysis were male, with a mean age of 71 ± 9. 172 patients had a history of ischaemic heart disease, 104 had diabetes mellitus, 318 had hypertension, and 17 patients had chronic kidney disease greater than Stage 3. 13.1% (46 patients) were current smokers, and the majority (63%) were ex-smokers. Most commonly, carotid endarterectomy was performed conventionally with patch arterioplasty 96% of the time (337 patients). The most common indication was TIA and stroke in 64% of patients, 18.9% were classified as asymptomatic, and 13.7% had amaurosis fugax. There were few general complications, with 9 wound complications/infections, 7 postoperative haematomas requiring return to theatre, 3 myocardial infarctions, 3 arrhythmias, 1 exacerbation of congestive heart failure, 1 chest infection, and 1 urinary tract infection. Specific complications to carotid endarterectomy included 3 strokes, 1 postoperative TIA, and 1 cerebral bleed. There were no deaths in our cohort. This analysis of a large cohort of patients from a major tertiary centre who underwent carotid endarterectomy under regional anaesthesia indicates the safety of such an approach for these patients. Regional anaesthesia holds the promise of less general respiratory and cardiac events compared to general anaesthesia, and in this vulnerable patient group, calls for comparative research between local and general anaesthesia in carotid surgery.

Keywords: anaesthesia, carotid endarterectomy, stroke, carotid stenosis

Procedia PDF Downloads 109