Search results for: security program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6511

Search results for: security program

5881 Contingency Screening Using Risk Factor Considering Transmission Line Outage

Authors: M. Marsadek, A. Mohamed

Abstract:

Power system security analysis is the most time demanding process due to large number of possible contingencies that need to be analyzed.  In a power system, any contingency resulting in security violation such as line overload or low voltage may occur for a number of reasons at any time.  To efficiently rank a contingency, both probability and the extent of security violation must be considered so as not to underestimate the risk associated with the contingency. This paper proposed a contingency ranking method that take into account the probabilistic nature of power system and the severity of contingency by using a newly developed method based on risk factor.  The proposed technique is implemented on IEEE 24-bus system.

Keywords: line overload, low voltage, probability, risk factor, severity

Procedia PDF Downloads 547
5880 Multi Criteria Authentication Method in Cognitive Radio Networks

Authors: Shokoufeh Monjezi Kouchak

Abstract:

Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods.

Keywords: authentication, cognitive radio, security, radio networks

Procedia PDF Downloads 396
5879 Psychological Well-Being and Perception of Disease Severity in People with Multiple Sclerosis, Who Underwent a Program of Self-Regulation to Promote Physical Activity

Authors: Luísa Pedro, José Pais-Ribeiro, João Páscoa Pinheiro

Abstract:

Multiple Sclerosis (MS) is a chronic disease of the central nervous system that affects more often young adults in the prime of his career and personal development, with no cure and unknown causes. The most common signs and symptoms are fatigue, muscle weakness, changes in sensation, ataxia, changes in balance, gait difficulties, memory difficulties, cognitive impairment and difficulties in problem solving. MS is a relatively common neurological disorder in which various impairments and disabilities impact strongly on function and daily life activities. The aim of this study is to examine the implications of the program of self-regulation in the perception of illness and mental health (psychological well-being domain) in MS patients. MS is a relatively common neurological disorder in which various impairments and disabilities impact strongly on function and daily life activities. The aim of this study is to examine the implications of the program of self-regulation in the perception of illness and mental health (psychological well-being domain) in MS patients. After this, a set of exercises was implemented to be used in daily life activities, according to studies developed with MS patients. We asked the subjects the question “Please classify the severity of your disease?” and used the domain of psychological well-being, the Mental Health Inventory (MHI-38) at the beginning (time A) and end (time B) of the program of self-regulation. We used the Statistical Package for the Social Sciences (SPSS) version 20. A non-parametric statistical hypothesis test (Wilcoxon test) was used for the variable analysis. The intervention followed the recommendations of the Helsinki Declaration. The age range of the subjects was between 20 and 58 years with a mean age of 44 years. 58.3 % were women, 37.5 % were currently married, 67% were retired and the mean level of education was 12.5 years. In the correlation between the severity of the disease perception and psychological well before the self-regulation program, an obtained result (r = 0.26, p <0.05), then the self-regulation program, was (r = 0.37, p <0.01), from a low to moderate correlation. We conclude that the program of self-regulation for physical activity in patients with MS can improve the relationship between the perception of disease severity and psychological well-being.

Keywords: psychological well-being, multiple sclerosis, self-regulation, physical activity

Procedia PDF Downloads 491
5878 Household Food Security and Poverty Reduction in Cameroon

Authors: Bougema Theodore Ntenkeh, Chi-bikom Barbara Kyien

Abstract:

The reduction of poverty and hunger sits at the heart of the United Nations 2030 Agenda for Sustainable Development, and are the first two of the Sustainable Development Goals. The World Food Day celebrated on the 16th of October every year, highlights the need for people to have physical and economic access at all times to enough nutritious and safe food to live a healthy and active life; while the world poverty day celebrated on the 17th of October is an opportunity to acknowledge the struggle of people living in poverty, a chance for them to make their concerns heard, and for the community to recognize and support poor people in their fight against poverty. The association between household food security and poverty reduction is not only sparse in Cameroon but mostly qualitative. The paper therefore investigates the effect of household food security on poverty reduction in Cameroon quantitatively using data from the Cameroon Household Consumption Survey collected by the Government Statistics Office. The methodology employed five indicators of household food security using the Multiple Correspondence Analysis and poverty is captured as a dummy variable. Using a control function technique, with pre and post estimation test for robustness, the study postulates that household food security has a positive and significant effect on poverty reduction in Cameroon. A unit increase in the food security score reduces the probability of the household being poor by 31.8%, and this effect is statistically significant at 1%. The result further illustrates that the age of the household head and household size increases household poverty while households residing in urban areas are significantly less poor. The paper therefore recommends that households should diversify their food intake to enhance an effective supply of labour in the job market as a strategy to reduce household poverty. Furthermore, family planning methods should be encouraged as a strategy to reduce birth rate for an equitable distribution of household resources including food while the government of Cameroon should also develop the rural areas given that trend in urbanization are associated with the concentration of productive economic activities, leading to increase household income, increased household food security and poverty reduction.

Keywords: food security, poverty reduction, SDGs, Cameroon

Procedia PDF Downloads 83
5877 Clinical Prediction Rules for Using Open Kinetic Chain Exercise in Treatment of Knee Osteoarthritis

Authors: Mohamed Aly, Aliaa Rehan Youssef, Emad Sawerees, Mounir Guirgis

Abstract:

Relevance: Osteoarthritis (OA) is the most common degenerative disease seen in all populations. It causes disability and substantial socioeconomic burden. Evidence supports that exercise are the most effective conservative treatment for patients with OA. Therapists experience and clinical judgment play major role in exercise prescription and scientific evidence for this regard is lacking. The development of clinical prediction rules to identify patients who are most likely benefit from exercise may help solving this dilemma. Purpose: This study investigated whether body mass index and functional ability at baseline can predict patients’ response to a selected exercise program. Approach: Fifty-six patients, aged 35 to 65 years, completed an exercise program consisting of open kinetic chain strengthening and passive stretching exercises. The program was given for 3 sessions per week, 45 minutes per session, for 6 weeks Evaluation: At baseline and post treatment, pain severity was assessed using the numerical pain rating scale, whereas functional ability was being assessed by step test (ST), time up and go test (TUG) and 50 feet time walk test (50 FTW). After completing the program, global rate of change (GROC) score of greater than 4 was used to categorize patients as successful and non-successful. Thirty-eight patients (68%) had successful response to the intervention. Logistic regression showed that BMI and 50 FTW test were the only significant predictors. Based on the results, patients with BMI less than 34.71 kg/m2 and 50 FTW test less than 25.64 sec are 68% to 89% more likely to benefit from the exercise program. Conclusions: Clinicians should consider the described strengthening and flexibility exercise program for patents with BMI less than 34.7 Kg/m2 and 50 FTW faster than 25.6 seconds. The validity of these predictors should be investigated for other exercise.

Keywords: clinical prediction rule, knee osteoarthritis, physical therapy exercises, validity

Procedia PDF Downloads 427
5876 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 233
5875 Axial Flux Permanent Magnet Motor Design and Optimization by Using Artificial Neural Networks

Authors: Tugce Talay, Kadir Erkan

Abstract:

In this study, the necessary steps for the design of axial flow permanent magnet motors are shown. The design and analysis of the engine were carried out based on ANSYS Maxwell program. The design parameters of the ANSYS Maxwell program and the artificial neural network system were established in MATLAB and the most efficient design parameters were found with the trained neural network. The results of the Maxwell program and the results of the artificial neural networks are compared and optimal working design parameters are found. The most efficient design parameters were submitted to the ANSYS Maxwell 3D design and the cogging torque was examined and design studies were carried out to reduce the cogging torque.

Keywords: AFPM, ANSYS Maxwell, cogging torque, design optimisation, efficiency, NNTOOL

Procedia PDF Downloads 225
5874 Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology

Authors: Bala Adamu Malami

Abstract:

The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range.

Keywords: electronic, GPS, GSM modem, communication, vehicle

Procedia PDF Downloads 104
5873 Do Interventions for Increasing Minorities' Access to Higher Education Work? The Case of Ethiopians in Israel

Authors: F. Nasser-Abu Alhija

Abstract:

In many countries, much efforts and resources are devoted to empowering and integrating minorities within the mainstream population. Major ventures in this route are crafted in higher education institutions where different outreach programs and methods such as lenient entry requirements, monitory incentives, learning skills workshops, tutoring and mentoring, are utilized. Although there is some information regarding these programs, their effectiveness still needs to be thoroughly examined. The Ethiopian community In Israel is one of the minority groups that has been targeted by sponsoring foundations and higher education institutions with the aim to ease the access, persistence and success of its young people in higher education and later in the job market. The evaluation study we propose to present focuses on the implementation of a program designed for this purpose. This program offers relevant candidates for study at a prestigious university a variety of generous incentives that include tuitions, livening allowance, tutoring, mentoring, skills and empowerment workshops and cultural meetings. Ten students were selected for the program and they started their studies in different subject areas before three and half years. A longitudinal evaluation has been conducted since the implementation of the program. Data were collected from different sources: participating students, program coordinator, mentors, tutors, program documents and university records. Questionnaires and interviews were used for collecting data on the different components of the program and on participants' perception of their effectiveness. Participants indicate that the lenient entry requirements and the monitory incentives are critical for starting their studies. During the first year, skills and empowering workshops, torturing and mentoring were evaluated as very important for persistence and success in studies. Tutoring was perceived as very important also at the second year but less importance is attributed to mentoring. Mixed results regarding integration in the Israeli culture emerged. The results are discussed with reference to findings from different settings around the world.

Keywords: access to higher education, minority groups, monitory incentives, torturing, mentoring

Procedia PDF Downloads 373
5872 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 63
5871 Examining Attrition in English Education: A Qualitative Study of the Impact of Preparation, Persistence, and Dispositions in Teacher Education

Authors: Pamela K. Coke, Heidi Frederiksen, Ann Sebald

Abstract:

Over the past three years, the researchers have been tracking a rise in the number of teacher education candidates leaving the field before completing their university’s educator preparation program. At their institution, this rise is most pronounced in English Education. The purpose of this qualitative research study is to understand English Education teacher candidates' expectations in becoming prepared educators at each phase of their four phase teacher education program at one institution of higher education in the United States. Research questions include: To what extent do we find differences in teacher candidates' expectations of their teacher training program and student teaching experiences based upon undergraduate and graduate programs? Why do (or do not) teacher candidates persist in their teacher training program and student teaching experiences? How do dispositions develop through the course of the teacher training program? What supports do teacher candidates self-identify as needing at each phase of the teacher training program? Based upon participant interviews at each phase of the teacher education program, the researchers, all teacher educators, examine the extent to which English Education students feel prepared to student teach, focusing on preparation, persistence, and dispositions. The Colorado State University Center for Educator Preparation (CEP) provides students with information about teaching dispositions, or desired professional behaviors, throughout their education program. CEP focuses these dispositions around nine categories: Professional Behaviors, Initiative and Dependability, Tact and Judgment, Ethical Behavior and Integrity, Collegiality and Responsiveness, Effective Communicator, Desire to Improve Own Performance, Culturally Responsive, and Commitment to the Profession. Currently, in the first phase of a four phase study, initial results indicate participants expect their greatest joys will be working with and learning from students. They anticipate their greatest challenges will involve discipline and confidence. They predict they will persist in their program because they believe the country needs well-prepared teachers and they have a commitment to their professional growth. None of the participants thus far could imagine why they would leave the program. With regard to strongest and weakest dispositions, results are mixed. Some participants see Tact and Judgment as their strongest disposition; others see it as their weakest. All participants stated mentoring is a necessary support at every phase of the teacher preparation process. This study informs the way teacher educators train and evaluate teacher candidates, and has implications for the frequency and types of feedback students receive from mentors and supervisors. This research contributes to existing work on teacher retention, candidate persistence, and dispositional development.

Keywords: English education, dispositions, persistence, teacher preparation

Procedia PDF Downloads 323
5870 Implementation of Inclusive Education in DepEd-Dasmarinas: Basis for Inclusion Program Framework

Authors: Manuela S. Tolentino, John G. Nepomuceno

Abstract:

The purpose of this investigation was to assess the implementation of inclusive education (IE) in 6 elementary and 5 secondary public schools in the City Schools Division of Dasmarinas. Participants in this study were 11 school heads, 73 teachers, 22 parents and 22 students (regular and with special needs) who were selected using purposive sampling. A 30-item questionnaire was used to gather data on the extent of the implementation of IE in the division while focus group discussion (FGD) was used to gather insights on what facilitate and hinder the implementation of the IE program. This study assessed the following variables: school culture and environment, inclusive education policy implementation, and curriculum design and practices. Data were analyzed using frequency count, mean and ranking. Results revealed that participants have similar assessment on the extent of the implementation of IE. School heads rated school culture and environment as highest in terms of implementation while teachers and pupils chose curriculum design and practices. On the other hand, parents felt that inclusive education policies are implemented best. School culture and environment are given high ratings. Participants perceived that the IE program in the division is making everyone feel welcome regardless of age, sex, social status, physical, mental and emotional state; students with or without disability are equally valued, and students help each. However, some aspects of the IE program implementation are given low ratings namely: partnership between staff, parents and caregivers, school’s effort to minimize discriminatory practice, and stakeholders sharing the philosophy of inclusion. As regards education policy implementation, indicators with the highest ranks were school’s effort to admit students from the locality especially students with special needs, and the implementation of the child protection policy and anti-bullying policy. The results of the FGD revealed that both school heads and teachers possessed the welcoming gesture to accommodate students with special needs. This can be linked to the increasing enrolment of SNE in the division. However, limitations of the teachers’ knowledge on handling learners, facilities and collaboration among stakeholders hinder the implementation of IE program. Based on the findings, inclusion program framework was developed for program enhancement. This will be the basis for the improvement of the program’s efficiency, the relationship between stakeholders, and formulation of solutions.

Keywords: inclusion, inclusive education, framework, special education

Procedia PDF Downloads 175
5869 A Decrease in the Anxiety Levels of Participants with Autoimmune Disease: Efficacy of a Community-Based Educational Program

Authors: Jennifer Hunter, Francisco Ramirez, Neil A. Nedley, Thania Solorio, Christian Freed, Erica Kinjo

Abstract:

People who have autoimmune disease are often at an increased risk for psychological disorders such as anxiety. Untreated psychological conditions can affect the development of disease and can affect one’s general quality of life. In this study, it was hypothesized that an educational community-based intervention would be useful in decreasing the anxiety levels of participants with autoimmune disease. Programs, 2-hours long each, were held weekly over a period of eight weeks. During every meeting, a 45-minute DVD presentation by a skilled physician was shown, a small group discussion was guided by trained facilitators, and weekly practical assignments were given to each participant. The focus of the program was to educate participants about healthy lifestyle behaviors such as exercise, nutrition, sleep hygiene, helpful thought patterns etc., and to provide a group environment in which each participant was supported. Participants were assessed pre-post program for anxiety using the Depression and Anxiety Assessment Test (registration TX 7-398-022), a validated mental health test based on DSM-5 criteria and demographics. Anxiety scores were classified according to the DSM-5 criteria into 4 categories: none (0-6), mild (7-10), moderate (11-19) or severe (20 or more). Out of the participants who participated in programs conducted in the manner explained above (n=431), the average age was 54.9 (SD 16.6) and 81.9% were female. At baseline, the mean group anxiety level was 9.4 (SD 5.4). Within the baseline group, anxiety levels were as follows: none (21.1%), mild (22.0%), moderate (27.1%) and severe (29.7%). After the program, mean group anxiety decreased to 4.7 (SD 4.0). Post-program anxiety levels were as follows: none (54.8%), mild (27.1%), moderate (12.5%), severe (5.6%). The decrease in overall anxiety levels was significant t(431)=19.3 p<.001, 95% CI [0.815, 1.041]. It was concluded that the eight-week intensive was beneficial in decreasing the anxiety levels of participants. A long-term follow-up study would be beneficial in determining how lasting such improvements are especially since autoimmune diseases are often chronic. Additionally, future studies that utilize a control group would aid in establishing whether the improvements seen are due to the use of this specific lifestyle-educational program.

Keywords: anxiety, auto-immune disease, community-based educational program, lifestyle

Procedia PDF Downloads 121
5868 The Development of Group Counseling Program for Elderly's Caregivers by Base on Person-Centered Theory to Promoting for the Resilience Quotient in Elderly People

Authors: Jirapan Khruesarn, Wimwipa Boonklin

Abstract:

Background: Currently, Thailand has an aging population. In 2017, the elderly population was over 11.14 million. There will be an increase in the number of elderly people, 8.39 million, some people grumble to themselves and have conflicts with their offspring or those close to them. It is a source of stress. Mental health promotion should be given to the elderly in order to cope with these changes. Due to the family characteristics of Thai society, these family members will act as caregivers for the elderly. Therefore, a group-counseling program based on Personnel-Centered Theory for Elderly Caregivers in Mental Health Promotion for Older People in Na Kaeo Municipality, Kau Ka District, Lampang Province, has been developed to compare the elderly care behavior before and after the participation. Methods: This research was study for 20 elderly' caregiver: Those aimed to compare the before and after use of group program for caregiver to promoting for the elderly by the following methods: Step 1 Establish a framework for evaluating elderly care behaviors and develop a group counseling program for promote mental health for elderly on: 1) Body 2) Willpower 3) Social and community management and 4) Organizing learning process. Step 2 Assessing an Elderly Care Behaviors by using "The behavior assessment on caring for the elderly" and assessing the mental health power level of the elderly and follow the counseling program 9 times and compare of the elderly care behaviors before and after joined a group program, and compare of mental health level of caregiver attends a group program. Results: This study is developing a group counseling program to promoting for the resilience quotient in elderly people that the results of the study could be summarized as follows: 1) Before the elderly's caregivers join a group counseling program: Mental health promotion behaviors of the elderly were at the high level of (3.32), and after: were at the high level of (3.44). 2) Before the elderly's caregiver attends a group counseling program: the mental health level of the elderly the mean score was (47.85 percent), and the standard deviation was (0.21 percent) and after. The elderly had a higher score of (51.45 percent) In summary, after the elderly caregivers joined the group, the elderly are higher in all aspects promote mental health for elderly and the statistically significance at the 0.05, It shows that programs are fit for personal and community condition in promoting the mental health of the elderly because this theory has the idea that: Humans have the ability to use their intelligence to solve problems or make decisions effectively, And member of group counseling program have ventured and express grievances that the counselor is a facilitator who focuses on personal development by building relationships among people. In other words, the factors contributing to higher levels of elderly care behaviors is group counseling, that isn't a hypothetical process but focus on building relationships that are based on mutual trust and Unconditional acceptance.

Keywords: group counseling base on person-centered theory, elderly person, resilience quotient: RQ, caregiver

Procedia PDF Downloads 96
5867 Emotional Security in Relation to Students' Emotional Efficiency

Authors: Ibtisam Mahmoud Mohammed Sultan

Abstract:

The present research aimed to identify the level of both emotional and emotional competence among students in Tikrit University aimed to know the assumptions in statistical significance for both variables as gender variables (m-f) and specialty (scientific-humanistic), as research to learn what Relationship between emotional safety and efficiency alanfaalet Tikrit University students. The researcher built emotional security measure (54) as built measure emotional competence (46), as the researcher extract full alsaykomtrih characteristics of both scales. The research sample consisted of (600) students selected by the random way and applying the scales on a basic search sample and processed statistical data using a variety of methods, including statistical test (test T.) and Pearson correlation coefficient, the researcher found a set of results. The following: 1. that the Tikrit University students possess a high level of emotional security. 2. to safely enjoy passionate males more than females. 3. that there is no difference between students of scientific and humanitarian specialization in variable emotional security. 4. that the Tikrit University students enjoy a high level of emotional competence. 5. the female-male outperforming in emotional competence level. 6. the humanitarian specialization students Excel in emotional competence for those of specialty. 7. the existence of a positive correlation between variables. Through search results, the researcher has developed a set of conclusions, proposals, and recommendations.

Keywords: relation, emotional security, students, efficiency

Procedia PDF Downloads 123
5866 Reducing The Frequency of Flooding Accompanied by Low pH Wastewater In 100/200 Unit of Phosphate Fertilizer 1 Plant by Implementing The 3R Program (Reduce, Reuse and Recycle)

Authors: Pradipta Risang Ratna Sambawa, Driya Herseta, Mahendra Fajri Nugraha

Abstract:

In 2020, PT Petrokimia Gresik implemented a program to increase the ROP (Run Of Pile) production rate at the Phosphate Fertilizer 1 plant, causing an increase in scrubbing water consumption in the 100/200 area unit. This increase in water consumption causes a higher discharge of wastewater, which can further cause local flooding, especially during the rainy season. The 100/200 area of the Phosphate Fertilizer 1 plant is close to the warehouse and is often a passing area for trucks transporting raw materials. This causes the pH in the wastewater to become acidic (the worst point is up to pH 1). The problem of flooding and exposure to acidic wastewater in the 100/200 area of Phosphate Fertilizer Plant 1 was then resolved by PT Petrokimia Gresik through wastewater optimization steps called the 3R program (Reduce, Reuse, and Recycle). The 3R (Reduce, reuse, and recycle) program consists of an air consumption reduction program by considering the liquid/gas ratio in scrubbing unit of 100/200 Phosphate Fertilizer 1 plant, creating a wastewater interconnection line so that wastewater from unit 100/200 can be used as scrubbing water in the Phonska 1, Phonska 2, Phonska 3 and unit 300 Phosphate Fertilizer 1 plant and increasing scrubbing effectiveness through scrubbing effectiveness simulations. Through a series of wastewater optimization programs, PT Petrokimia Gresik has succeeded in reducing NaOH consumption for neutralization up to 2,880 kg/day or equivalent in saving up to 314,359.76 dollars/year and reducing process water consumption up to 600 m3/day or equivalent in saving up to 63,739.62 dollars/year.

Keywords: fertilizer, phosphate fertilizer, wastewater, wastewater treatment, water management

Procedia PDF Downloads 32
5865 Modeling Pronunciations of Arab Broca’s Aphasics Using Mosstalk Words Technique

Authors: Sadeq Al Yaari, Fayza Alhammadi, Ayman Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Adham Al Yaari, Sajedah Al Yaari, Saleh Al Yami

Abstract:

Background: There has been a debate in the literature over the years as to whether or not MossTalk Words program fits Arab Broca’s aphasics (BAs) due to that language differences and also the fact that the technique has not yet been used for aphasics with semantic dementia (SD aphasics). Aims: To oversimplify the above mentioned debate slightly for purposes of exposition, the purpose of the present study is to investigate the “usability” of this program as well as pictures and community as therapeutic techniques for both Arab BAs and SD aphasics. Method: The subjects of this study are two Saudi aphasics (53 and 57 years old, respectively). The former suffers from Broca’s aphasia due to a stroke, while the latter suffers from semantic dementia. Both aphasics can speak English and have used the Moss Talk Words program in addition to intensive picture-naming therapeutic sessions for two years. They were tested by one of the researchers four times (a time per six months). The families of the two subjects, in addition to their relatives and friends, played a major part in all therapeutic sessions. Conclusion: Results show that in averages across the entire therapeutic sessions, MossTalk Words program was clearly found more effective in modeling BAs’ pronunciation than that of SD aphasic. Furthermore, picture-naming intensive exercises in addition to the positive role of the community members played a major role in the progress of the two subjects’ performance.

Keywords: moss talk words, program, technique, Broca’s aphasia, semantic dementia, subjects, picture, community

Procedia PDF Downloads 50
5864 IEP Curriculum to Include For-Credit University English Classes

Authors: Cheyne Kirkpatrick

Abstract:

In an attempt to make the university intensive English program more worthwhile for students, many English language programs are redesigning curriculum to offer for-credit English for Academic Purposes classes, sometimes marketed as “bridge” courses. These programs are designed to be accredited to national language standards, provide communicative language learning, and give students the opportunity to simultaneously earn university language credit while becoming proficient in academic English. This presentation will discuss the curriculum design of one such program in the United States at a large private university that created its own for-credit “bridge” program. The planning, development, piloting, teaching, and challenges of designing this type of curriculum will be presented along with the aspects of accreditation, communicative language learning, and integration within various university programs. Attendees will learn about how such programs are created and what types of objectives and outcomes are included in American EAP classes.

Keywords: IEP, AEP, Curriculum, CEFR, University Credit, Bridge

Procedia PDF Downloads 489
5863 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 517
5862 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 313
5861 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges

Authors: Alvite Singh Ningthoujam

Abstract:

The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.

Keywords: India, Islamic State, Muslim, Security

Procedia PDF Downloads 377
5860 The Study of Self-Management of Stress (SMS) of Yoga Program for Pregnant Women in Early Pregnancy in Taiwan

Authors: Shau-Ping Shiu, Shu-Ling Lin

Abstract:

Pregnancy lead a process of changing in the endocrine system. Either pregnancy itself or the surrounding affect such as the attitude of family to the pregnant lady can bring lots of stress. Sever stress may lead pregnant women display serious mental problem such as mood swings, impulsivity, and abnormal behavior. A method of self management of stress(SMS) has been proved that help patient of cancer in release their stress. This study were going to use SMS to help pregnant women. Methods: In this study, 42 ladies in the first to third months of pregnancy process applied to join SMS of program have divided into 21 participants in both control and experimental group by draw. 24 sessions of Yoga program were conducted once a week for 6 months for experimental group. Verbatim used to gather more feedbacks from the interview followed by each Yoga sessions. Brief symptom Rating scale also conducted pre and post experiment for 42 participations. Results: Overall score of Brief Symptom Rating Scale reduced 17.82 points and suicide drop 9 points in experimental group, compared to the control group increasing 10.24 point of overall score and suicide add 7 points. Feedback from interviews showed participations improved in emotion, physical health and stress management. They indicated having more positive emotion daily, having better gastrointestinal peristalsis movement, releasing back tention, well weight control, reducing stress and changing the quality of interpersonal relationships. Conclusion: SMS of Yoga program in this study included four key training directions which were stimulation, relaxation, awareness and pranayama lead a great improvment of stress management for pregnant lady. Throughout this Yoga program, women learned to ignite eustress, remove distress, create calmness and breath slows down. As the result, Yoga program has helped women in experiment group lower their tension, and bring the extra benifits in emotion and relationships. It support women to overcome their pregnancy. Suggestion: An unexpected result of this study showed all participants had no morning sickness since they engaged in SMS program, and no one absent from course due to the benefits of it. We strongly suggest that SMS of Yoga program can be a add of medication for women in pregnancy, however, the position of Forward in the SMS sequence has been point out pressing participant’s stomach, which can be replace to Bridge position to comfort participants.

Keywords: self-management of stress(SMS), yoga program, pregnant women, early pregnancy

Procedia PDF Downloads 333
5859 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 193
5858 Adaptation and Validation of the Program Sustainability Assessment Tool

Authors: Henok Metaferia Gebremariam

Abstract:

Worldwide, considerable resources are spent implementing public health interventions that are interrupted soon after the initial funding ends. However, ambiguity remains as to how health programs can be effectively sustained over time because of the diversity of perspectives, definitions, study methods, outcomes measures and timeframes. From all the above-mentioned research challenges, standardized measures of sustainability should ultimately become a key research issue. To resolve this key challenge, the objective of the study was to adapt a tool for measuring the program’s capacity for sustainability and evaluating its reliability and validity. To adapt and validate the tool, a cross-sectional and cohort study design was conducted at 26 programs in Addis Ababa between September 2014 and May 2015. An adapted version of the tool after the pilot test was administered to 220 staff. The tool was analyzed for reliability and validity. Results show that a 40-item PSAT tool had been adapted into the Amharic version with good internal consistency (Cronbach’s alpha= 0.80), test-retest reliability(r=0.916) and construct validity. Factor analysis resulted in 7 components explaining 56.67 % of the variance. In conclusion, it was found that the Amharic version of PAST was a reliable and valid tool for measuring the program’s capacity for sustainability.

Keywords: program sustainability, public health interventions, reliability, validity

Procedia PDF Downloads 53
5857 System Analysis of Quality Assurance in Online Education

Authors: Keh-Wen Carin Chuang, Kuan-Chou Chen

Abstract:

Our society is in a constant state of change. Technology advancements continue to affect our daily lives. How we work, communicate and entertain ourselves has changed dramatically in the past decades. As our society learns to accept and adapt to the many different technological advances that seem to inundate every part of our lives, the education institutions must migrate from traditional methods of instruction to online education in order to take full advantage of the opportunities provided by these technology advancements. There are many benefits that can be gained for university and society from offering online programs by utilizing advanced technologies. But the programs must not be implemented carelessly. The key to providing a quality online program is the issue of perceived quality, which takes into account the viewpoint of all stakeholders involved. To truly ensure the institutional quality, however, a systemic view of all factors contributing to the quality must be analyzed and linked to one another — allowing education administrators to understand how each factor contributes to the perceived quality of online education. The perceived quality of an online program will be positively reinforced only through an organizational-wide effort that focuses on managed administration, augmenting online program branding, skilled faculty, supportive alumni, student satisfaction, and effective delivery systems — each of which is vital to a quality online program. This study focuses on the concept of quality assurance in the start-up, implementation, and sustainability of online education. A case of online MBA program will be analyzed to explore the quality assurance. The difficulties in promoting online education quality is the fact that universities are complex networks of disciplinary, social, economic, and political fiefdoms, both internal and external factors to the institutions. As such, the system analysis, a systems-thinking approach, on the issue of perceived quality is ideal to investigate the factors and how each factor contributes to the perceived quality in the online education domain.

Keywords: systems thinking, quality assurance, online education, MBA program

Procedia PDF Downloads 240
5856 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 157
5855 The Effect of Training Program by Using Especial Strength on the Performance Skills of Hockey Players

Authors: Wesam El Bana

Abstract:

The current research aimed at designing a training program for improving specific muscular strength through using the especial strength and identifying its effects on the performance level skills of hockey players. The researcher used the quasi-experimental approach (two – group design) with pre- and post-measurements. Sample: (n= 35) was purposefully chosen from sharkia sports club. Five hockey player were excluded due to their non-punctuality. The rest were divided into two equal groups (experimental and control). The researcher concluded the following: The traditional training program had a positive effect on improving the physical variables under investigation as it led to increasing the improvement percentages of the physical variables and the performance level skills of the control group between the pre- and post-measurement. The recommended training program had a positive effect on improving the physical variables under investigation as it led to increasing the improvement percentages of the physical variable and the performance level skills of the experimental group between the pre- and post-measurements. Exercises using the especial strength training had a positive effect on the post-measurement of the experimental group.

Keywords: hockey, especial strength, performance skills

Procedia PDF Downloads 243
5854 Developing an Intervention Program to Promote Healthy Eating in a Catering System Based on Qualitative Research Results

Authors: O. Katz-Shufan, T. Simon-Tuval, L. Sabag, L. Granek, D. R. Shahar

Abstract:

Meals provided at catering systems are a common source of workers' nutrition and were found as contributing high amounts calories and fat. Thus, eating daily catering food can lead to overweight and chronic diseases. On the other hand, the institutional dining room may be an ideal environment for implementation of intervention programs that promote healthy eating. This may improve diners' lifestyle and reduce their prevalence of overweight, obesity and chronic diseases. The significance of this study is in developing an intervention program based on the diners’ dietary habits, preferences and their attitudes towards various intervention programs. In addition, a successful catering-based intervention program may have a significant effect simultaneously on a large group of diners, leading to improved nutrition, healthier lifestyle, and disease-prevention on a large scale. In order to develop the intervention program, we conducted a qualitative study. We interviewed 13 diners who eat regularly at catering systems, using a semi-structured interview. The interviews were recorded, transcribed and then analyzed by the thematic method, which identifies, analyzes and reports themes within the data. The interviews revealed several major themes, including expectation of diners to be provided with healthy food choices; their request for nutrition-expert involvement in planning the meals; the diners' feel that there is a conflict between sensory attractiveness of the food and its' nutritional quality. In the context of the catering-based intervention programs, the diners prefer scientific and clear messages focusing on labeling healthy dishes only, as opposed to the labeling of unhealthy dishes; they were interested in a nutritional education program to accompany the intervention program. Based on these findings, we have developed an intervention program that includes: changes in food served such as replacing several menu items and nutritional improvement of some of the recipes; as well as, environmental changes such as changing the location of some food items presented on the buffet, placing positive nutritional labels on healthy dishes and an ongoing healthy nutrition campaign, all accompanied by a nutrition education program. The intervention program is currently being tested for its impact on health outcomes and its cost-effectiveness.

Keywords: catering system, food services, intervention, nutrition policy, public health, qualitative research

Procedia PDF Downloads 198
5853 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis

Authors: Sarthak Mishra, Astha Sinha

Abstract:

There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.

Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats

Procedia PDF Downloads 235
5852 Securing Land Rights for Food Security in Africa: An Appraisal of Links Between Smallholders’ Land Rights and the Right to Adequate Food in Ethiopia

Authors: Husen Ahmed Tura

Abstract:

There are strong links between secure land rights and food security in Africa. However, as land is owned by governments, land users do not have adequate legislative protection. This article explores normative and implementation gaps in relation to small-scale farmers’ land rights under the Ethiopia’s law. It finds that the law facilitates eviction of small-scale farmers and indigenous peoples from their land without adequate alternative means of livelihood. It argues that as access to land and other natural resources is strongly linked to the right to adequate food, Ethiopia should reform its land laws in the light of its legal obligations under international human rights law to respect, protect and fulfill the right to adequate food and ensure freedom from hunger.

Keywords: smallholder, secure land rights , food security, right to food, land grabbing, forced evictions

Procedia PDF Downloads 312