Search results for: Development of a security group
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24209

Search results for: Development of a security group

23549 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 75
23548 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment

Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 448
23547 The Effectiveness of Group Spiritual Therapy on Increasing the Life Expectancy and Mental Health in Elderlies

Authors: Seyed Reza Mirmahdi, Seyedeh Maryam Hashemi Jabali

Abstract:

This research was conducted to evaluate the effects of group spiritual therapy on increasing the life expectancy and mental health among the elderlies. This was a quasi-experimental research using a pretest-posttest design with a control group conducted over a population including all the elderly people of Tehran in 2012-13. A randomized sampling method was used to select 30 elderly people living in Parham nursing home that were then randomly assigned into two control and experimental groups of 15 people each. The instruments used were Miller’s life expectancy and mental health test (SCL.90.R) standard questionnaires. Individuals in experimental group received 12 sessions of group spiritual therapy while those in control group did not receive any kind of therapy. The tests were performed again for all the subjects (30 individuals) at the end of the experiment. To test the hypotheses, the data collected by questionnaires were analyzed using descriptive methods through relevant tables and charts and also inferential methods through the analysis of covariance using the SPSS software. Results showed that group spiritual therapy leads to a significant increase in both mental health and life expectancy in the experimental group of elderlies living in Parham nursing home compared to those in the control group.

Keywords: spiritual therapy, life expectancy, mental health, elderlies

Procedia PDF Downloads 562
23546 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 227
23545 Effects of Visual Agnosia in Children’s Linguistic Abilities: Psychoneurolinguistic Approach

Authors: Sadeq Al Yaari, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaari

Abstract:

Objective: The aim of the study is to examine the relationship between visual agnosia and learning delay in Yemeni children. Method: A total of 80 subjects (experimental group= 60, 30 males and 30 females and control group= 20, 10 males and 10 females) in two institutions (old and new). The age of all subjects at hand ranges between 6- and 12 years old. Pre and post-tests were administered. Results: Outline results show severe effects on the performance of the children due to visual agnosia this effect was benign in the group that received the treatment, and this can be clearly seen in their results in the post-test compared to the other group that did not receive the treatment and outcomes in general can be better understood in light of the control group.

Keywords: visual, agnosia, linguistics, abilities, effects, psychoneurolinguistics

Procedia PDF Downloads 20
23544 A Shift in Approach from Cereal Based Diet to Dietary Diversity in India: A Case Study of Aligarh District

Authors: Abha Gupta, Deepak K. Mishra

Abstract:

Food security issue in India has surrounded over availability and accessibility of cereal which is regarded as the only food group to check hunger and improve nutrition. Significance of fruits, vegetables, meat and other food products have totally been neglected given the fact that they provide essential nutrients to the body. There is a need to shift the emphasis from cereal-based approach to a more diverse diet so that aim of achieving food security may change from just reducing hunger to an overall health. This paper attempts to analyse how far dietary diversity level has been achieved across different socio-economic groups in India. For this purpose, present paper sets objectives to determine (a) percentage share of different food groups to total food expenditure and consumption by background characteristics (b) source of and preference for all food items and, (c) diversity of diet across socio-economic groups. A cross sectional survey covering 304 households selected through proportional stratified random sampling was conducted in six villages of Aligarh district of Uttar Pradesh, India. Information on amount of food consumed, source of consumption and expenditure on food (74 food items grouped into 10 major food groups) was collected with a recall period of seven days. Per capita per day food consumption/expenditure was calculated through dividing consumption/expenditure by household size and number seven. Food variety score was estimated by giving 0 values to those food groups/items which had not been eaten and 1 to those which had been taken by households in last seven days. Addition of all food group/item score gave result of food variety score. Diversity of diet was computed using Herfindahl-Hirschman index. Findings of the paper show that cereal, milk, roots and tuber food groups contribute a major share in total consumption/expenditure. Consumption of these food groups vary across socio-economic groups whereas fruit, vegetables, meat and other food consumption remain low and same. Estimation of dietary diversity show higher concentration of diet due to higher consumption of cereals, milk, root and tuber products and dietary diversity slightly varies across background groups. Muslims, Scheduled caste, small farmers, lower income class, food insecure, below poverty line and labour families show higher concentration of diet as compared to their counterpart groups. These groups also evince lower mean intake of number of food item in a week due to poor economic constraints and resultant lower accessibility to number of expensive food items. Results advocate to make a shift from cereal based diet to dietary diversity which not only includes cereal and milk products but also nutrition rich food items such as fruits, vegetables, meat and other products. Integrating a dietary diversity approach in food security programmes of the country would help to achieve nutrition security as hidden hunger is widespread among the Indian population.

Keywords: dietary diversity, food Security, India, socio-economic groups

Procedia PDF Downloads 332
23543 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures

Authors: Zeinab Ranjbar

Abstract:

Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.

Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security

Procedia PDF Downloads 367
23542 Cooperative Jamming for Implantable Medical Device Security

Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed

Abstract:

Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.

Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing

Procedia PDF Downloads 92
23541 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria

Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba

Abstract:

As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.

Keywords: food, accessibility, availability, security

Procedia PDF Downloads 359
23540 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 104
23539 The Effect of Aerobics and Yogic Exercise on Selected Physiological and Psychological Variables of Middle-Aged Women

Authors: A. Pallavi, N. Vijay Mohan

Abstract:

A nation can be economically progressive only when the citizens have sufficient capacity to work efficiently to increase the productivity. So, good health must be regarded as a primary need of the community. This helps the growth and development of the body and the mind, which in turn leads to progress and prosperity of the nation. An optimum growth is a necessity for an efficient existence in a biologically adverse and economically competitive world. It is also necessary for the execution of daily routine work. Yoga is a method or a system for the complete development of the personality in a human being. It can be further elaborated as an all-around and complete development of the body, mind, morality, intellect and soul of a being. Sri Aurobindo defines yoga as 'a methodical effort towards self-perfection by the development of the potentialities in the individual.' Aerobic exercise as any activity that uses large muscle groups, can be maintained continuously, and is rhythmic I nature. It is a type of exercise that overloads the heart and lungs and causes them to work harder than at rest. The important idea behind aerobic exercise today, is to get up and get moving. There are more activities that ever to choose from, whether it is a new activity or an old one. Find something you enjoy doing that keeps our heart rate elevated for a continuous time period and get moving to a healthier life. Middle aged selected and served as the subjects for the purpose of this study. The selected subjects were in the age group of 30 to 40 years. By going through the literature and after consulting the experts in yoga and aerobic training, the investigator had chosen the variables which are specifically related to the middle-aged men. The selected physiological variables are pulse rate, diastolic blood pressure, systolic blood pressure; percent body fat and vital capacity. The selected psychological variables are job anxiety, occupational stress. The study was formulated as a random group design consisting of aerobic exercise and yogic exercises groups. The subjects (N=60) were at random divided into three equal groups of twenty middle-aged men each. The groups were assigned the names as follows: 1. Experimental group I- aerobic exercises group, 2. Experimental group II- yogic exercises, 3. Control group. All the groups were subjected to pre-test prior to the experimental treatment. The experimental groups participated in their respective duration of twenty-four weeks, six days in a week throughout the study. The various tests administered were: prior to training (pre-test), after twelfth week (second test) and twenty-fourth weeks (post-test) of the training schedule.

Keywords: pulse rate, diastolic blood pressure, systolic blood pressure; percent body fat and vital capacity, psychological variables, job anxiety, occupational stress, aerobic exercise, yogic exercise

Procedia PDF Downloads 438
23538 Circadian Disruption in Polycystic Ovary Syndrome Model Rats

Authors: Fangfang Wang, Fan Qu

Abstract:

Polycystic ovary syndrome (PCOS), the most common endocrinopathy among women of reproductive age, is characterized by ovarian dysfunction, hyperandrogenism and reduced fecundity. The aim of this study is to investigate whether the circadian disruption is involved in pathogenesis of PCOS in androgen-induced animal model. We established a rat model of PCOS using single subcutaneous injection with testosterone propionate on the ninth day after birth, and confirmed their PCOS-like phenotypes with vaginal smears, ovarian hematoxylin and eosin (HE) staining and serum androgen measurement. The control group rats received the vehicle only. Gene expression was detected by real-time quantitative PCR. (1) Compared with control group, PCOS model rats of 10-week group showed persistently keratinized vaginal cells, while all the control rats showed at least two consecutive estrous cycles. (2) Ovarian HE staining and histological examination showed that PCOS model rats of 10-week group presented many cystic follicles with decreased numbers of granulosa cells and corpora lutea in their ovaries, while the control rats had follicles with normal layers of granulosa cells at various stages of development and several generations of corpora lutea. (3) In the 10-week group, serum free androgen index was notably higher in PCOS model rats than controls. (4) Disturbed mRNA expression patterns of core clock genes were found in ovaries of PCOS model rats of 10-week group. Abnormal expression of key genes associated with circadian rhythm in ovary may be one of the mechanisms for ovarian dysfunction in PCOS model rats induced by androgen.

Keywords: polycystic ovary syndrome, androgen, animal model, circadian disruption

Procedia PDF Downloads 218
23537 Receptive Vocabulary Development in Adolescents and Adults with Down Syndrome

Authors: Esther Moraleda Sepúlveda, Soraya Delgado Matute, Paula Salido Escudero, Raquel Mimoso García, M Cristina Alcón Lancho

Abstract:

Although there is some consensus when it comes to establishing the lexicon as one of the strengths of language in people with Down Syndrome (DS), little is known about its evolution throughout development and changes based on age. The objective of this study was to find out if there are differences in receptive vocabulary between adolescence and adulthood. In this research, 30 people with DS between 11 and 40 years old, divided into two age ranges (11-18; 19 - 30) and matched in mental age, were evaluated through the Peabody Vocabulary Test. The results show significant differences between both groups in favor of the group with the oldest chronological age and a direct correlation between chronological age and receptive vocabulary development, regardless of mental age. These data support the natural evolution of the passive lexicon in people with DS.

Keywords: down syndrome, language, receptive vocabulary, adolescents, adults

Procedia PDF Downloads 188
23536 Data Security in Cloud Storage

Authors: Amir Rashid

Abstract:

Today is the world of innovation and Cloud Computing is becoming a day to day technology with every passing day offering remarkable services and features on the go with rapid elasticity. This platform took business computing into an innovative dimension where clients interact and operate through service provider web portals. Initially, the trust relationship between client and service provider remained a big question but with the invention of several cryptographic paradigms, it is becoming common in everyday business. This research work proposes a solution for building a cloud storage service with respect to Data Security addressing public cloud infrastructure where the trust relationship matters a lot between client and service provider. For the great satisfaction of client regarding high-end Data Security, this research paper propose a layer of cryptographic primitives combining several architectures in order to achieve the goal. A survey has been conducted to determine the benefits for such an architecture would provide to both clients/service providers and recent developments in cryptography specifically by cloud storage.

Keywords: data security in cloud computing, cloud storage architecture, cryptographic developments, token key

Procedia PDF Downloads 282
23535 Variation of Hedonic Capacity of People According to Age and Its Correlation with Chronotype

Authors: T. Hojageldiyev, Y. Bolmammedov

Abstract:

Increasing evidence suggests late chronotype individuals are at increased risk of developing psychopathological conditions. Our previously conducted study aimed to know the distribution of chronotypes according to age revealed that evening-types reaching a peak at age 14. While there is growing number of studies evaluating associations between chronotype and affective symptoms, to our best knowledge there are no studies addressing the issue of prevalence of anhedonia according to age groups of people. The sample included 545 healthy students between 13-21 years old from secondary schools and universities of Turkmenistan. Self-report 14 item Snaith-Hamilton Pleasure Scale (SHAPS) was used to assess hedonic tone of students. SHAPS score of 3 or higher indicates the criteria for the anhedonia. According to similarity of hedonic capacity participants divided into three age groups. Group I (age 13-14-15) includes 206 students (92 female), group II (age 16-17) includes 256 students (111 female) and group III (age 18-19-20-21) includes 83 (37 female). Statistical analysis was performed using Microsoft Excel 2013 and GraphPad Prism 7.0 programs. According to results average SHAPS scores of group I is 1.93 ± 1.94, group II 1.08 ± 1.43 and group III 1.29 ± 1.62. Students with anhedonia in group I consisted 30.5%, in group II 13,2% and in group III 12.04%. There are no gender differences. According to questionnaire results, higher prevalence of anhedonia is at the age between 13-15 than other age groups, and hedonic capacity increases as the age of students increases (p < 0.05). As a result, distribution of evening-types according to age correlates with hedonic capacity which is evening-types tends to have lower hedonic capacity.

Keywords: anhedonia, age, chronotype, hedonic capacity

Procedia PDF Downloads 152
23534 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance

Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz

Abstract:

The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.

Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor

Procedia PDF Downloads 54
23533 Assessing Smallholder Rice and Vegetable Farmers’ Constraints and Needs to Adopt Small-Scale Irrigation in South Tongu District, Ghana

Authors: Tamekloe Michael Kossivi, Kenichi Matsui

Abstract:

Irrigation access is one of the essential rural development investment options that can significantly improve smallholder farmers’ agriculture productivity. Investment in irrigation infrastructural development to supply adequate water could improve food security, growth in income for farmers, poverty alleviation, and improve business and livelihood. This paper assesses smallholder farmers’ constraints and the needs to adopt small-scale irrigation for crops production in the South Tongu District of Ghana. The data collection involved database search, questionnaire survey, interview, and field work. The structured questionnaire survey was administered from September to November 2020 among 120 respondents in six purposively sampled irrigation communities in the District. The questions focused on small-scale irrigation development constraints and needs. As a result, we found that the respondents relied mainly on rainfall for agriculture production. They did not have adequate irrigation access. Even though the District is blessed with open arable lands and rich water sources for rice and vegetable production on a massive scale, water sources like the Lower Volta River, Tordzi River, and Avu Lagoon were not close enough to the respondents. The respondents faced inadequate credit support (100%), unreliable rainfall (76%), insufficient water supply (54%), and unreliable water delivery challenges on their farms (53%). Physical constraints for the respondents to adopt irrigation included flood (77%), drought (93%), inadequate irrigation technology (59%), and insufficient technical know-how (65%). Farmers were interested in investing in irrigation infrastructural development to enhance productivity on their farms only if they own the farmlands. External support from donors on irrigation systems did not allow smallholder farmers to control irrigation facilities.

Keywords: constraints, food security, needs, smallholder farmers, small-scale irrigation

Procedia PDF Downloads 108
23532 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 282
23531 The Impact of Undocumented Migration on Human Security in Northern Nigeria

Authors: Targba Aondowase

Abstract:

Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.

Keywords: human security, impact, migration, undocumented

Procedia PDF Downloads 324
23530 Is There a Group of "Digital Natives" at Secondary Schools?

Authors: L. Janská, J. Kubrický

Abstract:

The article describes a research focused on the influence of the information and communication technology (ICT) on the pupils' learning. The investigation deals with the influences that distinguish between the group of pupils influenced by ICT and the group of pupils not influenced by ICT. The group influenced by ICT should evince a different approach in number of areas (in managing of two and more activities at once, in a quick orientation and searching for information on the Internet, in an ability to quickly and effectively assess the data sources, in the assessment of attitudes and opinions of the other users of the network, in critical thinking, in the preference to work in teams, in the sharing of information and personal data via the virtual social networking, in insisting on the immediate reaction on their every action etc.).

Keywords: ICT influence, digital natives, pupil´s learning

Procedia PDF Downloads 280
23529 Narrative Therapy as a Way of Terrorist Rehabilitation at Mohammad Bin Naif Counselling and Care Center: A Case Study

Authors: Yasser Almazrua

Abstract:

Terrorism is a multidimensional phenomenon that has increased recently. Many countries started combating terrorism through security forces; however, there has been relatively little attention given to rehabilitation programs for people involved in such terrorism acts. In Saudi Arabia, after facing so many terrorist attacks, they started understanding and countering terrorism differently by establishing Mohammad bin Naif Counselling and Care Center in 2006. The center now is considered one of the top experience centers in the world for terrorist rehabilitation and ideology correction. The center offers different programs such as training, educational, social, art and psychological programs. One of the approaches that have been used by psychological experts at the center is Narrative Therapy. It is a therapeutic approach that focuses on the ability of the client to identify their personal life story. The client during therapy works as a storyteller where he or she gets insight, meaning and better understanding of their own lives. Because each client at the center had a story, it can be better fit method for rehabilitation towards healing and personal development. The case describes a 34-years-old man who was involved in some terrorism activities locally by technically and financially supporting a terrorist group related to Al-Qaida. The beneficiary joined Mohammad bin Naif Counseling and Care Center after serving his sentence. Informed of consent has been given to the beneficiary before starting the therapeutic program. Both qualitative and quantitative data on the beneficiary are collected by self-reporting during the initial session, and by using a psychological measurement. The result found that the beneficiary was not insightful about himself, and he had a high level of repression which relatedly moved him to be targeted for recruitment in the terrorist group. With rehabilitation and by using the therapeutic approach, the beneficiary improved on the level of insight, specifically about himself and also about the experience. This case illustrates the importance of considering the effect of Narrative Therapy in terrorist rehabilitation programs.

Keywords: narrative therapy, rehabilitation, Saudi Arabia, terrorism

Procedia PDF Downloads 274
23528 Agriculture, Food Security and Poverty Reduction in Nigeria: Cointegration and Granger Causality Approach

Authors: Ogunwole Cecilia Oluwakemi, Timothy Ayomitunde Aderemi

Abstract:

Provision of sufficient food and elimination of abject poverty have usually been the conventional benefits of agriculture in any society. Meanwhile, despite the fact that Nigeria is an agrarian society, food insecurity and poverty have become the issues of concern among both scholars and policymakers in the recent times. Against this backdrop, this study examined the nexus among agriculture, food security, and poverty reduction in Nigeria from 1990 to 2019 within the framework of the Cointegration and Granger Causality approach. Data was collected from the Central Bank of Nigeria Statistical Bulletin and the World Development Indicators, respectively. The following are the major results that emanated from the study. A long run equilibrium relationship exists among agricultural value added, food production index, and GDP per capita in Nigeria. Similarly, there is a unidirectional causality which flows from food production index to poverty reduction in Nigeria. In the same vein, one way causality flows from poverty reduction to agricultural value added in Nigeria. Consequently, this study makes the following recommendation for the policymakers in Nigeria, and other African countries by extension, that agricultural value added and food production are the important variables that cannot be undermined when poverty reduction occupies the central focus of the policymakers. Therefore, any time these policymakers want to reduce poverty, policies that drive agricultural value added and food production should be embarked upon. Therefore, this study will contribute to the literature by establishing the type of linkage that exists between agriculture, food security, and poverty reduction in Nigeria.

Keywords: agriculture, value added, food production, GDP per capita, Nigeria

Procedia PDF Downloads 165
23527 Experimental Investigations on Group Interaction Effects of Laterally Loaded Piles in Submerged Sand

Authors: Jasaswini Mishra, Ashim K. Dey

Abstract:

This paper aims to investigate the group interaction effects of laterally loaded pile groups driven into a medium dense sand layer in submerged state. Static lateral load tests were carried out on pile groups consisting of varying number of piles and at different spacings. The test setup consists of a load cell (500 kg capacity) and an LVDT (50 mm) to measure the load and pile head deflection respectively. The piles were extensively instrumented with strain gauges so as to study the variation of soil resistance within the group. The bending moments at various depths were calculated from strain gauge data and these curves were fitted using a higher order polynomial in order to get 'p-y' curves. A comparative study between a single pile and a pile under a group has also been done for a better understanding of the group effect. It is observed that average load per pile is significantly reduced relative to single pile and it decreases with increase in the number of piles in a pile group. The loss of efficiency of the piles in the group, commonly referred to as "shadowing" effect, has been expressed by the use of a 'p-multiplier'. Leading rows carries greater amount of load when compared with the trailing rows. The variations of bending moment with depth for different rows of pile within a group and different spacing have been analyzed and compared with that of a single pile. p multipliers within different rows in a pile group were evaluated from the experimental study.

Keywords: group action, laterally loaded piles, p-multiplier, strain gauge

Procedia PDF Downloads 228
23526 Effect of Preoperative Single Dose Dexamethasone and Lignocaine on Post-Operative Quality of Recovery and Pain Relief after Laparoscopic Cholecystectomy

Authors: Gurjeet Khurana, Surender Singh, Poonam Arora, Praveendra K. Sachan

Abstract:

Introduction: Post-operative quality of recovery is the key outcome in the perspective of anesthesiologist. It is directly related to patient satisfaction. This is unsurprising, considering most aspects of a poor quality recovery after surgery will impair satisfaction with care. This study was thus undertaken to evaluate effects of Dexamethasone and Lignocaine on Quality of Recovery using QoR- 40 questionnaire and compare their effects. Material and methods: After obtaining the ethical committee approval and written informed consent, 67 patients of 18-60 years, ASA grade I and II scheduled for elective laparoscopic cholecystectomy were randomly allocated into two groups. Group I of 34 patients received 2mg/kg lignocaine diluted to 10ml with normal saline. Group 2 of 33 patients received 0.1 mg/kg I/V Dexamethasone diluted to 10ml with normal saline. QoR-40 was assessed on pre-operative day, and again QoR-40 was assessed at 24 hr post-operative day-1. Postoperative pain scores, nausea and vomiting and shoulder pain were secondary outcomes. Results: The Global QoR-40 was more than 180 at 24 hr in both the groups. The Dexamethasone group had higher Global QoR-40 than lignocaine group 187.94 v/s 182.85. Amongst dimensions of QoR-40 Dexamethasone had statistically better physical comfort, physical independence, and pain relief as compared to Lignocaine. Positive items had excellent responses in Dexamethasone group. Headache, backache and sore throat were also less severe in Dexamethasone group as compared to Lignocaine group. Dexamethasone group had lower VAS compared to lignocaine group. Similarly, there was less fentanyl consumption in dexamethasone group (364.08 ± 127.31) in postoperative period when compared to the lignocaine group (412.31 ± 147.8). Group receiving dexamethasone had 36% increase in appetite compared to lignocaine group (17.6%), which facilitated early oral feeding. Frequency of PONV was less in group-2 at different time interval as compared to group 1. Total episode of PONV were 18 in group 1 and 7 in group 2. Statistically significant difference was seen among two groups (p value= 0.007). Use of antiemetic was more in group 1 as compared to group 2 at all the times, though it was not statistically significant at different time intervals. Antiemetics were administered to 18 patients in group 1 as compared to 5 patients in group 2 postoperatively. Statistically significant difference (p value= 0.011) was seen in total antiemetic consumption. Conclusion: Our study demonstrated that pre-operative administration of a single dose of dexamethasone enhanced the quality of recovery after laparoscopic cholecystectomy as compared to Lignocaine bolus dose.

Keywords: dexamethasone, lignocaine, QoR-40 questionnaire, quality of recovery

Procedia PDF Downloads 114
23525 Effect of Erythropoietin Hormone Supplementation on Hypoxia-Inducible Factor1-Alpha in Rat Kidneys with Experimental Diabetic Nephropathy

Authors: Maha Deif, Alaa Eldin Hassan, Eman Shaat, Nesrine Elazhary, Eman Magdy

Abstract:

Background: Erythropoietin (EPO) is a hematopoietic factor with multiple protective effects. The aim of the present study was to investigate the potential effect of EPO administration on renal functions and hypoxia inducible factor 1-alpha (HIF-1a) in diabetic rat kidneys. Methodology: The current study was carried out on 40 male albino rats divided into four groups (n= 10 in each). Group I served as normal control, group II was the diabetic control, group III rats received EPO on the same day of diagnosis of diabetes mellitus (DM), while group IV received the first dose of EPO 2 weeks after the diagnosis of DM. Results: The results showed that EPO supplementation leads to a significant decrease in serum urea, urinary protein and creatinine clearance as well as a significant increase in renal HIF-1a in group III and IV rats compared to the diabetic control group (group II). However, fasting blood glucose was significantly decreased in group III as compared to the diabetic control group in the third week, but no significant difference was reported in the fourth week among groups II, III and IV. Conclusion: EPO administration leads to the improvement of renal functions and increased levels of HIF-1a in diabetic rats.

Keywords: erythropoietin, diabetic nephropathy, hypoxia-inducible factor1-alpha, renal functions

Procedia PDF Downloads 277
23524 Effect of Aquatic Seed Extract of (Cichorium intybus L.) and Metformin on Nitric Oxide in Type 2 Diabetic Rats

Authors: Lotfollah Rezagholizadeh

Abstract:

Background and Aim: Diabetes mellitus is related to high mortality and morbidity caused by the early development of atherosclerosis correlated to diabetic macroangiopathy. The endothelium-derived vasodilator, nitric oxide (NO) has been implicated in the development of vascular complications via the regulation of blood flow, and various antiatherosclerotic actions. Patients with type 2 diabetes (T2D) have a decreased level of endothelial nitric oxide release. In this study we aimed to examine the effect of aquatic seed extract of Cichorium intybus L. (chicory) and metformin (a known prescription drug for diabetes) on NO levels in T2D rats. Methods: Five groups of adult male Wistar rats were used (n=6): Non-diabetic controls without extract treatment (Control), Non-diabetic controls with extract treatment (Chicory-control), T2D rats without extract treatment (NIA/STZ), T2D rats treated with the extract (Chicory-NIA/STZ), and T2D groups that received metformin (100 mg/kg) but no extract (Metformin-NIA/STZ). T2D was induced with intraperitoneal (i.p) injection of niacinamide (NIA, 200 mg/kg), 15 min after an i.p administration of streptozotocin (STZ, 55 mg/kg). Lyophilized chicory extract (125 mg/kg) was dissolved in 0.2 ml normal saline and administered one dose a day. The experiments lasted for 3 weeks after the diabetes induction. NO analysis was performed by assay based on the Griess reaction. Data were reported as the mean ± SD and statistical analysis was performed by ANOVA. Results: Serum nitric oxide levels decreased significantly in NIA/STZ group compared with Control and Chicory-control. Treatment with chicory extract caused a significant increase in serum levels of NO in Chicory-NIA/STZ group compare to NIA/STZ group (p<05). Metformin-NIA/STZ group did not show considerable difference when compared with NIA/STZ, with respect to NO levels. In a group of rats made diabetic by STZ alone (type 1 diabetic rats, T1D), chicory did not have a significant ameliorating effect. Conclusion: In this study, we clearly showed a relationship between low serum nitric oxide levels and diabetes mellitus in rats. The increase in serum nitric oxide by chicory extract is an indication of antiatherogenic effect of this plant. Chicory seed extract was more efficient than metformin in improving the NO levels in NO-deficient T2D diabetic rats.

Keywords: type 2 diabetes mellitus, nitric oxide, chicory, metformin

Procedia PDF Downloads 321
23523 Security Analysis of SIMSec Protocol

Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: End-to-end encryption, key exchange, SIM card, smart card

Procedia PDF Downloads 273
23522 e-Learning Security: A Distributed Incident Response Generator

Authors: Bel G Raggad

Abstract:

An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.

Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection

Procedia PDF Downloads 422
23521 Institutional Determinants of Economic Growth in Georgia and in Other Post-Communist Economies

Authors: Nazira Kakulia, Tsotne Zhghenti

Abstract:

The institutional development is one of the actual topics in economics science. New trends and directions of institutional development mostly depend on its structure and framework. Transformation of institutions is an important problem for every economy, especially for developing countries. The first research goal is to determine the importance and interactions between different institutions in Georgia. Using World Governance Indicators and Economic Freedom indexes it can be calculated the size for each institutional group. The second aim of this research is to evaluate Georgian institutional backwardness in comparison to other post-communist economies. We use statistical and econometric methods to evaluate the difference between the levels of institutional development in Georgia and in leading post-communist economies. Within the scope of this research, major findings are coefficients which are an assessment of their deviation (i.e. lag) of institutional indicators between Georgia and leading post-communist country which should be compared. The last part of the article includes analysis around the selected coefficients.

Keywords: post-communist transition, institutions, economic growth, institutional development

Procedia PDF Downloads 178
23520 The Digital Video and Online Media Development for Integrated Marketing Communication and Tourism Promote in Taling Chan District, Bangkok

Authors: Somsak Klaysung

Abstract:

This study purpose to develop video to promote cultural tourism in Taling Chan District. For qualitative research, the sample size was 40 people from 5 group of the tourism entrepreneur in Taling Chan district, conducted the key informants’ content analysis by using focus group and structures in-depth interview from all stakeholders. Quota sampling was used for this kind of research. The findings indicated that get media video marketing and tourism contribute a set length 11.35 9 minutes there is plenty of social capital in Taling Chan District including detail like local wisdom, knowledge, and way of thinking related to nature, history, historic document, occupation, administration and attribute of local people. Additional research found the new path of travel through the water route according to Khlong Bang Ramat called Route 9 temples that travelers can travel by boat are available in the market in four areas Taling Chan also as well.

Keywords: digital video, integrated marketing communication, online media development, Taling Chan district

Procedia PDF Downloads 336