Search results for: security program
5851 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria
Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue
Abstract:
The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.Keywords: personal variables, students, perception, school security
Procedia PDF Downloads 815850 Aerobic Capacity Outcomes after an Aerobic Exercise Program with an Upper Body Ergometer in Diabetic Amputees
Authors: Cecilia Estela Jiménez Pérez Campos
Abstract:
Introduction: Amputation comes from a series of complications in diabetic persons; at that point, of the illness evolution they have a deplored aerobic capacity. Adding to that, cardiac rehabs programs are almost base in several activities in a standing position. The cardiac rehabilitation programs have to improve for them, based on scientific advice. Objective: Evaluation of aerobic capacity of diabetic amputee after an aerobic exercise program, with upper limb ergometer. Methodology: The design is longitudinal, prospective, comparative and no randomized. We include all diabetic pelvic limb amputees, who assist to the cardiac rehabilitation. We made 2 groups: an experimental and a control group. The patients did the exercise testing, with the author’s design protocol. The experimental group completed 24 exercise sessions (3 sessions/week), with an intensity determined with the training heart rate. At the end of 8 weeks period, the subjects did a second exercise test. Results: Both groups were a homogeneous sample in age (experimental n=15) 57.6+12.5 years old and (control n=8) 52.5+8.0 years old, sex, occupation, education and economic features. (square chi) (p=0.28). The initial aerobic capacity was similar in both groups. And the aerobic capacity accomplishes after the program was statistically greater in the experimental group than in the control one. The final media VO2peak (mlO2/kg/min) was experimental (17.1+3.8), control (10.5+3.8), p=0.001. (t student). Conclusions: The aerobic capacity improved after an arm ergometer exercise program and the quality of life improve too, in diabetic amputees. So this program is fundamental in diabetic amputee’s rehabilitation management.Keywords: aerobic fitness, metabolic equivalent (MET), oxygen output, upper limb ergometer
Procedia PDF Downloads 2365849 Teacher Trainers’ Motivation in Transformation of Teaching and Learning: The Fun Way Approach
Authors: Malathi Balakrishnan, Gananthan M. Nadarajah, Noraini Abd Rahim, Amy Wong On Mei
Abstract:
The purpose of the study is to investigate the level of intrinsic motivation of trainers after attending a Continuous Professional Development Course (CPD) organized by Institute of Teacher Training Malaysia titled, ‘Transformation of Teaching and Learning the Fun Way’. This study employed a survey whereby 96 teacher trainers were given Situational Intrinsic Motivational Scale (SIMS) Instruments. Confirmatory factor analysis was carried out to get validity of this instrument in local setting. Data were analyzed with SPSS for descriptive statistic. Semi structured interviews were also administrated to collect qualitative data on participants experiences after participating in the two-day fun-filled program. The findings showed that the participants’ level of intrinsic motivation showed higher mean than the amotivation. The results revealed that the intrinsic motivation mean is 19.0 followed by Identified regulation with a mean of 17.4, external regulation 9.7 and amotivation 6.9. The interview data also revealed that the participants were motivated after attending this training program. It can be concluded that this program, which was organized by Institute of Teacher Training Malaysia, was able to enhance participants’ level of motivation. Self-Determination Theory (SDT) as a multidimensional approach to motivation was utilized. Therefore, teacher trainers may have more success using the ‘The fun way approach’ in conducting training program in future.Keywords: teaching and learning, motivation, teacher trainer, SDT
Procedia PDF Downloads 4655848 Central American Security Issue: Civil War Legacy and Contemporary Challenges
Authors: Olga Andrianova, Lazar Jeifets
Abstract:
The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.Keywords: Central America, insecurity, instability, post-war countries, violence
Procedia PDF Downloads 4755847 Design of Low-Maintenance Sewer Pump Stations with High-Security Measures for Municipal Applications
Authors: H. V. Smit, V. H. J. de Wet
Abstract:
South African municipalities are dealing with aging and dilapidated infrastructure while faced with challenges in the form of expanding informal settlements, vandalism, theft, and a lack of maintenance which place even more pressure on existing infrastructure. The existing infrastructure was never designed to cater to these challenges, and this becomes evident when evaluating the current state of many municipal sewer pump stations. A need has thus arisen to develop a sewer pump station design concept that will address these challenges and allow for a long-term sustainable solution. This article deals with the design concepts which have been developed for sewer pump stations for an effective reduction in maintenance, improved grit handling, improvement to the operation and maintenance working conditions, and the adoption of high-security design philosophy.Keywords: high security, low maintenance, municipal application, sewer pump station
Procedia PDF Downloads 1125846 Health Care Providers' Perceptions on mHealth Workplace Nutrition Wellness Program: A Thematic Analysis
Authors: Kim H. K. Choy, Oliva H. K. Chu, W. Y. Keung, B. Lim, Winnie P. Y. Tang
Abstract:
Background: Health care providers have been identified as an at-risk group for obesity. Mobile health technology can be used to motivate lifestyle behavioral changes. The aim of this study was to investigate hospital-based health care providers’ perceptions of mHealth Workplace Nutrition Wellness Program. Methods: This qualitative study was conducted at a regional hospital in Hong Kong. Ten health care providers were purposively selected for the study. Qualitative data was collected by individual face-to-face semi-structured interviews which were audio-taped, transcribed verbatim and analyzed by thematic analysis. Results: Four themes were identified: (1) mobile health technology motivates lifestyle changes, (2) self-perceived body weight initiates health behavioral changes, (3) organizational support promotes healthy behavior, (4) lack of self-confidence hinders lifestyle modification. The health care providers’ perceptions of mobile health technology, barriers, and facilitators to participation in the mHealth Workplace Nutrition Wellness Program were discussed in the study. Conclusions: Barriers, facilitators, self-perceived body weight and experiences of mobile health technology were associated with intention of participation in mHealth Workplace Nutrition Wellness Program. The knowledge generated from the study could be used to guide the design and implementation of effective interventions, strategies and policies of workplace wellness programs to promote participation for hospital’s employees.Keywords: workplace wellness program, mobile health, barriers, facilitators, qualitative
Procedia PDF Downloads 2645845 Some Issues with Extension of an HPC Cluster
Authors: Pil Seong Park
Abstract:
Homemade HPC clusters are widely used in many small labs, because they are easy to build and cost-effective. Even though incremental growth is an advantage of clusters, it results in heterogeneous systems anyhow. Instead of adding new nodes to the cluster, we can extend clusters to include some other Internet servers working independently on the same LAN, so that we can make use of their idle times, especially during the night. However extension across a firewall raises some security problems with NFS. In this paper, we propose a method to solve such a problem using SSH tunneling, and suggest a modified structure of the cluster that implements it.Keywords: extension of HPC clusters, security, NFS, SSH tunneling
Procedia PDF Downloads 4325844 Creating Moments and Memories: An Evaluation of the Starlight 'Moments' Program for Palliative Children, Adolescents and Their Families
Authors: C. Treadgold, S. Sivaraman
Abstract:
The Starlight Children's Foundation (Starlight) is an Australian non-profit organisation that delivers programs, in partnership with health professionals, to support children, adolescents, and their families who are living with a serious illness. While supporting children and adolescents with life-limiting conditions has always been a feature of Starlight's work, providing a dedicated program, specifically targeting and meeting the needs of the paediatric palliative population, is a recent area of focus. Recognising the challenges in providing children’s palliative services, Starlight initiated a research and development project to better understand and meet the needs of this group. The aim was to create a program which enhances the wellbeing of children, adolescents, and their families receiving paediatric palliative care in their community through the provision of on-going, tailored, positive experiences or 'moments'. This paper will present the results of the formative evaluation of this unique program, highlighting the development processes and outcomes of the pilot. The pilot was designed using an innovation methodology, which included a number of research components. There was a strong belief that it needed to be delivered in partnership with a dedicated palliative care team, helping to ensure the best interests of the family were always represented. This resulted in Starlight collaborating with both the Victorian Paediatric Palliative Care Program (VPPCP) at the Royal Children's Hospital, Melbourne, and the Sydney Children's Hospital Network (SCHN) to pilot the 'Moments' program. As experts in 'positive disruption', with a long history of collaborating with health professionals, Starlight was well placed to deliver a program which helps children, adolescents, and their families to experience moments of joy, connection and achieve their own sense of accomplishment. Building on Starlight’s evidence-based approach and experience in creative service delivery, the program aims to use the power of 'positive disruption' to brighten the lives of this group and create important memories. The clinical and Starlight team members collaborate to ensure that the child and family are at the centre of the program. The design of each experience is specific to their needs and ensures the creation of positive memories and family connection. It aims for each moment to enhance quality of life. The partnership with the VPPCP and SCHN has allowed the program to reach families across metropolitan and regional locations. In late 2019 a formative evaluation of the pilot was conducted utilising both quantitative and qualitative methodologies to document both the delivery and outcomes of the program. Central to the evaluation was the interviews conducted with both clinical teams and families in order to gain a comprehensive understanding of the impact of and satisfaction with the program. The findings, which will be shared in this presentation, provide practical insight into the delivery of the program, the key elements for its success with families, and areas which could benefit from additional research and focus. It will use stories and case studies from the pilot to highlight the impact of the program and discuss what opportunities, challenges, and learnings emerged.Keywords: children, families, memory making, pediatric palliative care, support
Procedia PDF Downloads 1025843 The Use of Surveys to Combat Fake News in Media Literacy Education
Authors: Jaejun Jong
Abstract:
Fake news has recently become a serious international problem. Therefore, researchers and policymakers worldwide have sought to understand fake news and develop strategies to combat it. This study consists of two primary parts: (1) a literature review of how surveys were used to understand fake news and identify problems caused by fake news, and (2) a discussion of how surveys were used to fight back against fake news in educational settings. This second section specifically analyzes surveys used to evaluate a South Korean elementary school program designed to improve students’ metacognition and critical thinking. This section seeks to identify potential problems that may occur in the elementary school setting. The literature review shows that surveys can help people to understand fake news based on its traits rather than its definition due to the lack of agreement on the definition of fake news. The literature review also shows that people are not good at identifying fake news or evaluating their own ability to identify fake news; indeed, they are more likely to share information that aligns with their previous beliefs. In addition, the elementary school survey data shows that there may be substantial errors in the program evaluation process, likely caused by processing errors or the survey procedure, though the exact cause is not specified. Such a significant error in evaluating the effects of the educational program prevents teachers from making proper decisions and accurately evaluating the program. Therefore, identifying the source of such errors would improve the overall quality of education, which would benefit both teachers and students.Keywords: critical thinking, elementary education, program evaluation, survey
Procedia PDF Downloads 1085842 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)
Authors: Syed Sibtain Hussain Shah
Abstract:
The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat
Procedia PDF Downloads 1465841 Approaches to Ethical Hacking: A Conceptual Framework for Research
Authors: Lauren Provost
Abstract:
The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.Keywords: ethical hacking, literature review, penetration testing, social engineering
Procedia PDF Downloads 2235840 The Contribution of the Livestock Marketing Programme in Improving Household Food Security in Communal Areas of Umzimkhulu Local Municipality, Kwa-Zulu Natal
Authors: Sibongiseni Peacock, Denver Naidoo, Sikhalazo Dube
Abstract:
The study investigates the impact of the National Red Meat Development Programme on household food security in rural areas of uMzimkhulu. Self-administered questionnaires were employed to gather data from 77 smallholder beef farmers participating in the St. Paul feedlot project. Data analysis utilized the Household Food Insecurity Access Scale (HFIAS) developed by USAID to assess the household food security status of St. Paul feedlot beneficiaries, with descriptive statistics employed for result analysis. Findings indicate that the majority (80.50%) of beneficiaries experienced food insecurity, while (19.50%) were classified as food secure, with most participants falling within the category of moderate food insecurity. Food insecurity predominantly stemmed from challenges faced by farmers unable to sell their cattle or whose cattle were not market-ready due to bureaucratic obstacles hindering the programme. Farmers identified feed shortages as the primary constraint, resulting in missed income opportunities. These findings underscore the critical need to address feed challenges and bureaucratic barriers to enhance the efficacy of the National Red Meat Development Programme in promoting household food security in rural areas.Keywords: National Red Meat Development, household food security, St. Paul feedlot, livestock, HFIAS
Procedia PDF Downloads 595839 Nursing Students’ Opinions about Theoretical Lessons and Clinical Area: A Survey in a Nursing Department
Authors: Ergin Toros, Manar Aslan
Abstract:
This study was planned as a descriptive study in order to learn the opinions of the students who are studying in nursing undergraduate program about their theoretical/practical lessons and departments. The education in the undergraduate nursing programs has great importance because it contains the knowledge and skills to prepare student nurses to the clinic in the future. In order to provide quality-nursing services in the future, the quality of nursing education should be measured, and opinions of student nurses about education should be taken. The research population was composed of students educated in a university with 1-4 years of theoretical and clinical education (N=550), and the sample was composed of 460 students that accepted to take part in the study. It was reached to 83.6% of target population. Data collected through a survey developed by the researchers. Survey consists of 48 questions about sociodemographic characteristics (9 questions), theoretical courses (9 questions), laboratory applications (7 questions), clinical education (14 questions) and services provided by the faculty (9 questions). It was determined that 83.3% of the nursing students found the nursing profession to be suitable for them, 53% of them selected nursing because of easy job opportunity, and 48.9% of them stayed in state dormitory. Regarding the theoretical courses, 84.6% of the students were determined to agree that the question ‘Course schedule is prepared before the course and published on the university web page.’ 28.7% of them were determined to do not agree that the question ‘Feedback is given to students about the assignments they prepare.’. It has been determined that 41,5% of the students agreed that ‘The time allocated to laboratory applications is sufficient.’ Students said that physical conditions in laboratory (41,5%), and the materials used are insufficient (44.6%), and ‘The number of students in the group is not appropriate for laboratory applications.’ (45.2%). 71.3% of the students think that the nurses view in the clinics the students as a tool to remove the workload, 40.7% of them reported that nurses in the clinic area did not help through the purposes of the course, 39.6% of them said that nurses' communication with students is not good. 37.8% of students stated that nurses did not provide orientation to students, 37.2% of them think that nurses are not role models for students. 53.7% of the students stated that the incentive and support for the student exchange program were insufficient., %48 of the students think that career planning services, %47.2 security services,%45.4 the advisor spent time with students are not enough. It has been determined that nursing students are most disturbed by the approach of the nurses in the clinical area within the undergraduate education program. The clinical area education which is considered as an integral part of nursing education is important and affect to student satisfaction.Keywords: nursing education, student, clinical area, opinion
Procedia PDF Downloads 1785838 Automatic Teller Machine System Security by Using Mobile SMS Code
Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem
Abstract:
The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition
Procedia PDF Downloads 3695837 Factors Associated with Uptake of Influenza and Pertussis Vaccination in Pregnant Women
Authors: Hassen Mohammed, Michelle Clarke, Helen Marshall
Abstract:
Maternal immunization is an effective strategy to protect pregnant women and their offspring from vaccine-preventable diseases. Despite the recommendation of maternal influenza and more recently pertussis immunization in Australia, uptake of these vaccines has been suboptimal. Monitoring the impact of the current funded vaccine programs for pregnant women is limited. The study aimed to assess the impact of the funded program and determine factors associated with vaccine uptake in pregnant women. This observational prospective study was undertaken between November 2014 and July 2016 at the Women’s and Children’s Hospital in South Australia (WCH). Demographic details and vaccination history from South Australian pregnant women who attended the WCH were reviewed. A standardized self-reported survey was conducted in antenatal care with a follow up telephone interview at 8-10 weeks post-delivery. A midwife delivered immunization program for pregnant women in antenatal clinic commenced in April 2015. Of the 180 pregnant women who completed the survey questionnaire, 75.5% and 80.5 % received maternal influenza and pertussis vaccines respectively. First-time mothers had twice the odds of having received influenza vaccine during pregnancy than multiparous women (OR 2.4; CI 1.14 - 4.94; p= 0.021). The proportion of women who received pertussis vaccine during pregnancy, following the introduction of the midwife delivered pertussis vaccination program (140/155, 90.3%) was significantly higher compared with women who received maternal pertussis vaccination prior to the introduction of the program (5/22, 23.7%, p < 0.001). The odds of women receiving maternal pertussis vaccine following the implementation of the midwife delivered program were 31 times higher than women who delivered babies prior to the program (OR 31.7, CI 10.24- 98.27; p < 0.001). High uptake of influenza and pertussis vaccines during pregnancy can be attained with health care provider recommendation and inclusion of maternal immunization as part of standard antenatal care.Keywords: influenza, maternal immunization, pertussis, provider recommendation
Procedia PDF Downloads 2775836 Producing Graphical User Interface from Activity Diagrams
Authors: Ebitisam K. Elberkawi, Mohamed M. Elammari
Abstract:
Graphical User Interface (GUI) is essential to programming, as is any other characteristic or feature, due to the fact that GUI components provide the fundamental interaction between the user and the program. Thus, we must give more interest to GUI during building and development of systems. Also, we must give a greater attention to the user who is the basic corner in the dealing with the GUI. This paper introduces an approach for designing GUI from one of the models of business workflows which describe the workflow behavior of a system, specifically through activity diagrams (AD).Keywords: activity diagram, graphical user interface, GUI components, program
Procedia PDF Downloads 4685835 Assessing the Role of Water Research and Development Investment towards Water Security in South Africa: During the Five Years Period (2009/10 - 2013/14)
Authors: Hlamulo Makelane
Abstract:
The study aims at providing new insights regarding research and development (R&D) public and private activities based on the national R&D survey of the past five years. The main question of the study is what role does water R&D plays on water security; to then analyze what lessons could be extracted to improve the security of water through R&D. In particular, this work concentrates on three main aspects of R&D investments: (i) the level of expenditures, (ii) the sources of funding related to water R&D, and (iii) the personnel working in the field, both for the public and private sectors. The nonlinear regression approached will be used for data analysis based on secondary data gathered from the South African nation R&D survey conducted annually by the Centre for science, technology and innovation indicators (CeSTII).Keywords: water, R&D, investment, public sector, private sector
Procedia PDF Downloads 2405834 Multi-Agent TeleRobotic Security Control System: Requirements Definitions of Multi-Agent System Using The Behavioral Patterns Analysis (BPA) Approach
Authors: Assem El-Ansary
Abstract:
This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach in developing an Multi-Agent TeleRobotic Security Control System (MTSCS). The event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are the Behavioral Pattern Analysis (BPA) modeling methodology, and the development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.Keywords: analysis, multi-agent, TeleRobotics control, security, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases
Procedia PDF Downloads 4405833 Parents' Attitudes towards a School-Based Family Program in Early Literacy in Qatari Preschool Settings
Authors: Fathi Ihmeideh
Abstract:
The study aimed at investigating parents’ attitudes towards a school-based family program in developing kindergarten children’s literacy skills. The study surveyed 160 parents of preschool children, gathering information about their attitudes toward the development of children’s early literacy. Results indicated that parents hold positive attitudes towards the school-based family literacy program. The results also revealed statistically significant differences among parents due to a number of study variables. The study concludes with putting forward a number of practical and theoretical recommendations for the field of study. Acknowledgment: This paper was made possible by NPRP grant # (NPRP 8-921-5-122) from the Qatar national research fund (a member of Qatar foundation). The statements made herein are solely the responsibility of the authors.Keywords: parents, literacy development, preschool children, family involvement
Procedia PDF Downloads 2745832 Using ROVs to Teach a Blended STEM Curriculum
Authors: Geoffrey A. Wright
Abstract:
Over the past year we have developed and implemented a blended STEM curriculum based on ROV (Remotely Operated Vehicle) underwater technology with over 300 students in grades 2–9. This paper presents an overview of the curriculum, what we have learned from the development and implementation, with suggestions of how to build a similar statewide ROV program, and how we will continue and enhance the effort this next year with more than 300 additional students. The benefits of the program are the application and blending of STEM principles using inquiry based instruction, where students have shown to increase in STEM self-efficacy and interest.Keywords: STEM, technology, engineering, ROV
Procedia PDF Downloads 3675831 Interactive Learning Practices for Class Room Teaching
Authors: Shamshuddin K., Nagaraj Vannal, Diwakar Kulkarni
Abstract:
This paper presents details of teaching and learning pedagogical techniques attempted for the undergraduate engineering program to improve the concentration span of students in a classroom. The details of activities such as valid statement, quiz competition, classroom paper, group work and product marketing to make the students remain active for the entire class duration and to improve presentation skills are presented. These activities shown tremendous improvement in student’s performance in academics, also in asking questions, concept understanding and interaction with the course instructor. With these pedagogical activities we are able to achieve Program outcome elements and ABET Program outcomes such as d, i, g and h which are difficult to achieve through the conventional teaching methods.Keywords: activities, pedagogy, interactive learning, valid statement, quiz competition, classroom papers, group work, product marketing
Procedia PDF Downloads 6505830 Central American Security Issue: Civil Wars Legacy and Contemporary Challenges
Authors: Olga Andrianova, Lazar Jeifets
Abstract:
The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.Keywords: Central America, insecurity, instability, violence
Procedia PDF Downloads 3975829 Insurance of Agricultural Activities as the Basis for Food Security
Authors: J. B. Akshataeva, G. T. Aigarinova, A. Amankulova, D. S. Kalkanova
Abstract:
This article examines some aspects of the insurance of agricultural activities, strategic documents on deepening investment opportunities. Insurance market development is before the society and the state. It also examines problems of agricultural insurance development in the market economy of Kazakhstan as the basis for food security.Keywords: agriculture, food safety, insurance, privacy issues
Procedia PDF Downloads 5085828 Weapon Collection Initiatives and the Threat of Small Arms and Light Weapons Proliferation in Volatile Areas of North-Eastern Nigeria as a Way Forward for National Security and Development
Authors: Halilu Babaji, Adamu Buba
Abstract:
The proliferation of small arms and light weapons (SALW) and its illicit trafficking in West Africa and Nigeria in particular, pose a major threat to peace, security and development in the Sub-region. The high circulation of these weapons in the region is a product of the interplay of several factors, which derives principally from the internal socio-economic and political dynamics compounded by globalization. The process of globalization has congealed both time and space making it easier for ideas, goods, persons, services, information, products and money to move across borders with fewer restrictions. And this has a negative effect in the entire region making it easier for arms, ammunition, insurgents, criminal and drugs to flow within national boundaries. The failure of public security in most parts of Nigeria has lead communities to indulge in different forms of ‘self-help ‘security measures, ranging from vigilante groups to community-owned arms stockpiling. Having lost confidence in the Nigerian state, parties to some of these conflicts have become entangled in a security dilemma. The quest to procure more arms to guarantee personal and community protection from perceived and real enemies is fuelling the ‘domestic arms race ‘. Therefore, as small arms remain-and proliferate – development is impeded. The impact of SALW on economic well being and national development in Nigeria is of vast significant. Therefore the need to collect these arms in circulation in Nigeria particularly the volatile area of North-east is of very important. This will hopefully contribute to government effort in building a free, secured and peaceful society.Keywords: arms, development, proliferation, security
Procedia PDF Downloads 3295827 Importance of Hardware Systems and Circuits in Secure Software Development Life Cycle
Authors: Mir Shahriar Emami
Abstract:
Although it is fully impossible to ensure that a software system is quite secure, developing an acceptable secure software system in a convenient platform is not unreachable. In this paper, we attempt to analyze software development life cycle (SDLC) models from the hardware systems and circuits point of view. To date, the SDLC models pay merely attention to the software security from the software perspectives. In this paper, we present new features for SDLC stages to emphasize the role of systems and circuits in developing secure software system through the software development stages, the point that has not been considered previously in the SDLC models.Keywords: SDLC, SSDLC, software security, software process engineering, hardware systems and circuits security
Procedia PDF Downloads 2645826 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 935825 The Effects of the Parent Training Program for Obesity Reduction on Health Behaviors of School-Age Children
Authors: Muntanavadee Maytapattana
Abstract:
The purposes of the study were to evaluate the effectiveness of the Parent Training Program for Obesity Reduction (PTPOR) on health behaviors of school-age children. An Ecological Systems Theory (EST) was approached the study and a randomized control trial was used in this study. Participants were school-age overweight or obese children and their parents. One hundred and one parent-child dyads were recruited and random assigned into the PTPOR (N=30), Educational Intervention or EI (N=32), and control group (N=39). The parents in the PTPOR group participated in five sessions including an educational session, a cooking session, aerobic exercise training, 2-time group discussion sessions, and 4-time telephoned counseling sessions. Repeated Measure ANCOVA was used to analyze data. The results presented that the outcomes of the PTPOR group were better than the EI and the control groups at 1st, 8th, and 32nd weeks after finishing the program such as child exercise behavior (F(2,97) = 3.98, p = .02) and child dietary behavior (F(2,97) = 9.42, p = .00). The results suggest that nurses and health care providers should utilize the PTPOR for child weight reduction and for the health promotion of a lifestyle among overweight and obese children.Keywords: parent training program, obesity reduction, child health behaviors, school-age children
Procedia PDF Downloads 4465824 Evaluation of High Damping Rubber Considering Initial History through Dynamic Loading Test and Program Analysis
Authors: Kyeong Hoon Park, Taiji Mazuda
Abstract:
High damping rubber (HDR) bearings are dissipating devices mainly used in seismic isolation systems and have a great damping performance. Although many studies have been conducted on the dynamic model of HDR bearings, few models can reflect phenomena such as dependency of experienced shear strain on initial history. In order to develop a model that can represent the dependency of experienced shear strain of HDR by Mullins effect, dynamic loading test was conducted using HDR specimen. The reaction of HDR was measured by applying a horizontal vibration using a hybrid actuator under a constant vertical load. Dynamic program analysis was also performed after dynamic loading test. The dynamic model applied in program analysis is a bilinear type double-target model. This model is modified from typical bilinear model. This model can express the nonlinear characteristics related to the initial history of HDR bearings. Based on the dynamic loading test and program analysis results, equivalent stiffness and equivalent damping ratio were calculated to evaluate the mechanical properties of HDR and the feasibility of the bilinear type double-target model was examined.Keywords: base-isolation, bilinear model, high damping rubber, loading test
Procedia PDF Downloads 1265823 A Study on the Development of Self-Help Therapy for Bipolar Disorder
Authors: Bae Yu been, Choi Sung won, Lee Ju yeon, Yang Dan Bi
Abstract:
The purpose of this study is to develop a self-help therapy program for bipolar disorder (BD). Psychosocial treatment is adjunct to pharmacotherapy for BD, however, it is limited and they demand high costs. Therefore, the objective of the study is to overcome these limitations by developing the self-treatment for BD. The study was examined the efficacy of the self-treatment program for BD. A randomized controlled trial compared the self-help therapy (ST) intervention with a treatment as usual (TAU) group. ST group has conducted the program for 8 weeks (16 sessions). Mood chart, Quality of Life in Bipolar Disorder Questionnaire, Attitudes toward seeking professional help Scale, BIS, CERQ, YMRS, MADRS were used by pre, post, and follow up. The efficacy of the self-help therapy was analyzed by using mixed ANOVAs. There were significant differences in the rate of occurrence of mania or depression between the two groups. ST group reported stable moods on mood chart, and reductions in mood symptoms and improvements in quality of life and treatment adherence. This study was confirmed applicable to BD to the self-help therapy for patients with BD conducted first in Korea.Keywords: self help therapy, bipolar disorder, self help, self therapy
Procedia PDF Downloads 6815822 Recovery of Physical Performance in Postpartum Women: An Effective Physical Education Program
Authors: Julia A. Ermakova
Abstract:
This study aimed to investigate the efficacy of a physical rehabilitation program for postpartum women. The program was developed with the purpose of restoring physical performance in women during the postpartum period. The research employed a variety of methods, including an analysis of scientific literature, pedagogical testing and experimentation, mathematical processing of study results, and physical performance assessment using a range of tests. The program recommends refraining from abdominal exercises during the first 6-8 months following a cesarean section and avoiding exercises with weights. Instead, a feasible training regimen that gradually increases in intensity several times a week is recommended, along with moderate cardio exercises such as walking, bodyweight training, and a separate workout component that targets posture improvement. Stretching after strength training is also encouraged. The necessary equipment includes comfortable sports attire with a chest support top, mat, push-ups, resistance band, timer, and clock. The motivational aspect of the program is paramount, and the mentee's positive experience with the workout regimen includes feelings of lightness in the body, increased energy, and positive emotions. The gradual reduction of body size and weight loss due to an improved metabolism also serves as positive reinforcement. The mentee's progress can be measured through various means, including an external assessment of her form, body measurements, weight, BMI, and the presence or absence of slouching in everyday life. The findings of this study reveal that the program is effective in restoring physical performance in postpartum women. The mentee achieved weight loss and almost regained her pre-pregnancy shape while her self-esteem improved. Her waist, shoulder, and hip measurements decreased, and she displayed less slouching in her daily life. In conclusion, the developed physical rehabilitation program for postpartum women is an effective means of restoring physical performance. It is crucial to follow the recommended training regimen and equipment to avoid limitations and ensure safety during the postpartum period. The motivational component of the program is also fundamental in encouraging positive reinforcement and improving self-esteem.Keywords: physical rehabilitation, postpartum, methodology, postpartum recovery, rehabilitation
Procedia PDF Downloads 78