Search results for: Development of a security group
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24719

Search results for: Development of a security group

24029 Multi-Sensory Coding as Intervention Therapy for ESL Spellers with Auditory Processing Delays: A South African Case-Study

Authors: A. Van Staden, N. Purcell

Abstract:

Spelling development is complex and multifaceted and relies on several cognitive-linguistic processes. This paper explored the spelling difficulties of English second language learners with auditory processing delays. This empirical study aims to address these issues by means of an intervention design. Specifically, the objectives are: (a) to develop and implement a multi-sensory spelling program for second language learners with auditory processing difficulties (APD) for a period of 6 months; (b) to assess the efficacy of the multi-sensory spelling program and whether this intervention could significantly improve experimental learners' spelling, phonological awareness, and processing (PA), rapid automatized naming (RAN), working memory (WM), word reading and reading comprehension; and (c) to determine the relationship (or interplay) between these cognitive and linguistic skills (mentioned above), and how they influence spelling development. Forty-four English, second language learners with APD were sampled from one primary school in the Free State province. The learners were randomly assigned to either an experimental (n=22) or control group (n=22). During the implementation of the spelling program, several visual, tactile and kinesthetic exercises, including the utilization of fingerspelling were introduced to support the experimental learners’ (N = 22) spelling development. Post-test results showed the efficacy of the multi-sensory spelling program, with the experimental group who were trained in utilising multi-sensory coding and fingerspelling outperforming learners from the control group on the cognitive-linguistic, spelling and reading measures. The results and efficacy of this multi-sensory spelling program and the utilisation of fingerspelling for hearing second language learners with APD open up innovative perspectives for the prevention and targeted remediation of spelling difficulties.

Keywords: English second language spellers, auditory processing delays, spelling difficulties, multi-sensory intervention program

Procedia PDF Downloads 134
24028 Effect of Group Prenatal Care on Adolescent Pregnancy Outcomes: A Randomized Controlled Trial

Authors: Parvin Abedi, Fatemeh Malchi, Mina Iravani, Elham Maraghi, Eesa Mohammadi, Najmieh Saadati

Abstract:

Background: Adolescent pregnancy has major health and social consequences and can lead to adverse maternal and neonatal outcomes. Objectives: The objective of this study was to evaluate the impact of group prenatal care (GPNC) of adolescents on their maternal and neonatal outcomes. Methods: In this study, 294 adolescent pregnant women (aged 15-19) were randomly assigned into two groups of prenatal care (n=147) and individual prenatal care (IPNC) (n=147). Participants in the intervention group received GPNC at 16-20 weeks of gestational age, while the control group received (IPNC). The data were analyzed using the Chi-square test, independent t-test, and linear and logistic tests. Results: As far as weight gain was concerned, 91.7% and 62.1% of the participants in the GPNC and IPNC groups had an appropriate weight gain during pregnancy, respectively OR 6.72 (95% CI 3.40, 13.26). In the GPNC group, 79.2% of participants had exclusive breastfeeding in the first 6 weeks after childbirth and while this rate was 49.7% in the IPNC group, OR 3.92 (95% CI 2.36, 6.64). Preterm birth was observed in 3.4% of the participants in the GPNC group as opposed to 9.5% in the IPNC group OR 6.17 (95% CI 0.73, 51.93). Conclusion: Adolescent women in GPNC have more appropriate weight gain and a higher rate of exclusive breastfeeding compared to adolescent women in IPNC. Group prenatal care could be considered a viable method of care for adolescent pregnant women.

Keywords: group prenatal car, adolescents pregnant women, pregnancy outcomes, neonatal outcomes

Procedia PDF Downloads 16
24027 A Comparative Study of Granisetron and Palonosetron in Postoperative Nausea and Vomiting Following Laparoscopic Surgery

Authors: Burra Vijitha

Abstract:

A prospective randomized comparative study for the prevention of postoperative nausea and vomiting in the patients undergoing general anesthesia ,for elective laparoscopic surgeries with respect to efficacy and side effects of granisetron and palonosetron. Sixty adult patients of class ASA 1,2 of either sex in age group between 20-70 yrs,scheduled for elective laparoscopic surgeries were selected for the study.Patients were randomly divided into two groups 30 each. Group G: Granisetron group (n=30), 40µg/kg; Group P: Palonosetron group (n=30), 0.075 mg. at end of surgery before extubation group G patients 40 µg/kg of inj.granisetron and group P patients received 0.075 mg of inj.palonosetron slow iv over 30 sec.In post anesthesia care unit, episodes of nausea and vomiting experienced by each patient was recorded by direct questioning the patient .study medication was assessed in terms of incidence of nausea and vomiting during periods of 0-4 hrs,4-12 hrs,12-24 hrs,24-48hrs.our study demonstrated that complete response for those patients who received granisetron were 86.66%,80% and 66.66% ,while those received palonosetron were 100%,86.6%,90% between 0-4hrs,4-12hrs,12-24 hrs. It shows no statistically signidficant differences between the baseline values of hemodynamic variables beween two groups during study. Keywords: Granisetron, nausea, palonosetron, vomiting.

Keywords: granisetron, palonosetron, nausea, vomiting

Procedia PDF Downloads 234
24026 Elderly Health Care Process by Community Participation: A Sub-District in the Lower Northern Region of Thailand

Authors: Amaraporn Puraya, Roongtiva Boonpracom, Somsak Thojampa, Sirikanok Klankhajhon, Kittisak Kumpeera

Abstract:

The objective of this qualitative research was to study the elderly health care process by community participation. Data were collected by quality research methods, including secondary data study, observation, in-depth interviews, and focus group discussions and analyzed by content analysis, reflection and review of information. The research results pointed out that the important elderly health care process by community participation consisted of 2 parts, namely the community participation development process in elderly health care and the outcomes from the participation development process. The community participation development process consisted of 4 steps as follows: 1) Building the leadership team, an important social capital of the community, which started from searching for both formal and informal leaders by giving the opportunity for public participation and creating clear agreements defining roles, duties and responsibilities; 2) investigating the problems and the needs of the community, 3) designing the elderly health care activities under the concept of self-care potential development of the elderly through participation in community forums and meetings to exchange knowledge with common goals, plans and operation and 4) the development process of sustainable health care agreement at the local level, starting from opening communication channels to create awareness and participation in various activities at both individual and group levels as well as pushing activities/projects into the community development plan consistent with the local administration policy. The outcomes from the participation development process were as follows. 1) There was the integration of the elderly for doing the elderly health care activities/projects in the community managed by the elderly themselves. 2) The service system was changed from the passive to the proactive one, focusing on health promotion rather than treating diseases or illnesses. 3) The registered nurses / the public health officers can provide care for the elderly with chronic illnesses through the implementation of activities/projects of elderly health care so that the elderly can access the services more. 4) The local government organization became the main mechanism in driving the elderly health care process by community participation.

Keywords: elderly health care process, community participation, elderly, Thailand

Procedia PDF Downloads 210
24025 Efficacy and Safety of Inhaled Nebulized Chemotherapy in Treatment of Patients with Newly Diagnosed Pulmonary Tuberculosis in Comparison to Standard Antimycobacterial Therapy

Authors: M. Kuzhko, M. Gumeniuk, D. Butov, T. Tlustova, O. Denysov, T. Sprynsian

Abstract:

Abstract: The objective of this work was to study the efficacy and safety of inhaled nebulized chemotherapy in the treatment of patients with newly diagnosed pulmonary tuberculosis in comparison with standard antimycobacterial therapy. Materials and methods: The study involved 68 patients aged between 20 and 70 years with newly diagnosed pulmonary tuberculosis. Patients were allocated to two groups. The first (main, n=21) group of patients received standard chemotherapy and further 0.15 g of isoniazid and rifampicin 0.15 g inhaled through a nebulizer, also they received salmeterol 50 mcg + fluticasone propionate 250 mcg at 2 breaths twice a day for 2 months. The second (control, n=47) group of patients received standard chemotherapy, consisting of orally administered isoniazid (0.3 g), rifampicin (0.6 g), pyrazinamide (2 g), ethambutol (1.2 g) with a dose reduction after the intensive phase of the therapy. The anti-TB drugs were procured through the Ukraine’s centralized national supply system. Results: Intoxication symptoms in the first group reduced following 1.39±0.18 months, whereas in the second group, intoxication symptoms reduced following 2.7±0.1 months, p<.001. Moreover, respiratory symptoms regression in the first group was observed following 1.6±0.2 months, whereas in the second group – following 2.5±0.2 months, p<0.05. Bacillary excretion period evaluated within 1 month was reduced, as it was shown by 66.6±10.5% in the main group compared to 27.6±6.5%, p<0.05, in the control group. In addition, period of cavities healing was reduced to 2.9±0.2 months in the main group compared to 3.7±0.1 months, p<0.05, in the control group. Residual radiological lung damage findings (large residual changes) were observed in 22 (23.8±9.5 %) patients of the main group versus 24 (51.0±7.2 %) patients in the control group, p<0.05. After completion of treatment scar stenosis of the bronchi II-III art. diagnosed in 3 (14.2±7.8%) patients in main group and 17 (68.0±6.8%) - control group, p<0.05. The duration of hospital treatment was 2.4±0.4 months in main group and 4.1±0.4 months in control group, p<0.05. Conclusion: Administration of of inhaled nebulized chemotherapy in patients with newly diagnosed pulmonary tuberculosis resulted in a comparatively quick reduction of disease manifestation.

Keywords: inhaled nebulized chemotherapy, pulmonary tuberculosis, tuberculosis, treatment of tuberculosis

Procedia PDF Downloads 196
24024 Disaster Response Training Simulator Based on Augmented Reality, Virtual Reality, and MPEG-DASH

Authors: Sunho Seo, Younghwan Shin, Jong-Hong Park, Sooeun Song, Junsung Kim, Jusik Yun, Yongkyun Kim, Jong-Moon Chung

Abstract:

In order to effectively cope with large and complex disasters, disaster response training is needed. Recently, disaster response training led by the ROK (Republic of Korea) government is being implemented through a 4 year R&D project, which has several similar functions as the HSEEP (Homeland Security Exercise and Evaluation Program) of the United States, but also has several different features as well. Due to the unpredictiveness and diversity of disasters, existing training methods have many limitations in providing experience in the efficient use of disaster incident response and recovery resources. Always, the challenge is to be as efficient and effective as possible using the limited human and material/physical resources available based on the given time and environmental circumstances. To enable repeated training under diverse scenarios, an AR (Augmented Reality) and VR (Virtual Reality) combined simulator is under development. Unlike existing disaster response training, simulator based training (that allows remote login simultaneous multi-user training) enables freedom from limitations in time and space constraints, and can be repeatedly trained with different combinations of functions and disaster situations. There are related systems such as ADMS (Advanced Disaster Management Simulator) developed by ETC simulation and HLS2 (Homeland Security Simulation System) developed by ELBIT system. However, the ROK government needs a simulator custom made to the country's environment and disaster types, and also combines the latest information and communication technologies, which include AR, VR, and MPEG-DASH (Moving Picture Experts Group - Dynamic Adaptive Streaming over HTTP) technology. In this paper, a new disaster response training simulator is proposed to overcome the limitation of existing training systems, and adapted to actual disaster situations in the ROK, where several technical features are described.

Keywords: augmented reality, emergency response training simulator, MPEG-DASH, virtual reality

Procedia PDF Downloads 299
24023 To Individualisation of Subject, Donar, by Determination of Serological Markers from Obtain Biological Fluid at Crime Scene

Authors: Arun Kumar, Ravindra Pal Verma, Harsh Sharma, Shani Kumar

Abstract:

For the present study samples was collected from 20 donors with unknown blood group and secretor status had been determined from saliva by using biological fluid. ABO typing on the concentrated samples was successfully performed after 1 month of storage. Urine stained clothing samples are often submitted to forensic science laboratories for ABH blood group antigen determination. The serogenetic markers of semen stains submitted can be used to determine the origin of any of these samples. ABH blood group substances have previously been identified from urine. ABH blood group substance is low in urine in comparison with other body fluids.

Keywords: ABH blood group, crime scene, serological markers, body fluids and urine

Procedia PDF Downloads 585
24022 The Effectiveness of Group Spiritual Therapy on Increasing the Life Expectancy and Mental Health in Elderlies

Authors: Seyed Reza Mirmahdi, Seyedeh Maryam Hashemi Jabali

Abstract:

This research was conducted to evaluate the effects of group spiritual therapy on increasing the life expectancy and mental health among the elderlies. This was a quasi-experimental research using a pretest-posttest design with a control group conducted over a population including all the elderly people of Tehran in 2012-13. A randomized sampling method was used to select 30 elderly people living in Parham nursing home that were then randomly assigned into two control and experimental groups of 15 people each. The instruments used were Miller’s life expectancy and mental health test (SCL.90.R) standard questionnaires. Individuals in experimental group received 12 sessions of group spiritual therapy while those in control group did not receive any kind of therapy. The tests were performed again for all the subjects (30 individuals) at the end of the experiment. To test the hypotheses, the data collected by questionnaires were analyzed using descriptive methods through relevant tables and charts and also inferential methods through the analysis of covariance using the SPSS software. Results showed that group spiritual therapy leads to a significant increase in both mental health and life expectancy in the experimental group of elderlies living in Parham nursing home compared to those in the control group.

Keywords: spiritual therapy, life expectancy, mental health, elderlies

Procedia PDF Downloads 573
24021 Effects of Visual Agnosia in Children’s Linguistic Abilities: Psychoneurolinguistic Approach

Authors: Sadeq Al Yaari, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaari

Abstract:

Objective: The aim of the study is to examine the relationship between visual agnosia and learning delay in Yemeni children. Method: A total of 80 subjects (experimental group= 60, 30 males and 30 females and control group= 20, 10 males and 10 females) in two institutions (old and new). The age of all subjects at hand ranges between 6- and 12 years old. Pre and post-tests were administered. Results: Outline results show severe effects on the performance of the children due to visual agnosia this effect was benign in the group that received the treatment, and this can be clearly seen in their results in the post-test compared to the other group that did not receive the treatment and outcomes in general can be better understood in light of the control group.

Keywords: visual, agnosia, linguistics, abilities, effects, psychoneurolinguistics

Procedia PDF Downloads 34
24020 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 389
24019 Application of Neural Network in Portfolio Product Companies: Integration of Boston Consulting Group Matrix and Ansoff Matrix

Authors: M. Khajezadeh, M. Saied Fallah Niasar, S. Ali Asli, D. Davani Davari, M. Godarzi, Y. Asgari

Abstract:

This study aims to explore the joint application of both Boston and Ansoff matrices in the operational development of the product. We conduct deep analysis, by utilizing the Artificial Neural Network, to predict the position of the product in the market while the company is interested in increasing its share. The data are gathered from two industries, called hygiene and detergent. In doing so, the effort is being made by investigating the behavior of top player companies and, recommend strategic orientations. In conclusion, this combination analysis is appropriate for operational development; as well, it plays an important role in providing the position of the product in the market for both hygiene and detergent industries. More importantly, it will elaborate on the company’s strategies to increase its market share related to a combination of the Boston Consulting Group (BCG) Matrix and Ansoff Matrix.

Keywords: artificial neural network, portfolio analysis, BCG matrix, Ansoff matrix

Procedia PDF Downloads 140
24018 New Security Approach of Confidential Resources in Hybrid Clouds

Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel

Abstract:

Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.

Keywords: cloud, confidentiality, cryptography, security issues, trust issues

Procedia PDF Downloads 375
24017 Narrative Therapy as a Way of Terrorist Rehabilitation at Mohammad Bin Naif Counselling and Care Center: A Case Study

Authors: Yasser Almazrua

Abstract:

Terrorism is a multidimensional phenomenon that has increased recently. Many countries started combating terrorism through security forces; however, there has been relatively little attention given to rehabilitation programs for people involved in such terrorism acts. In Saudi Arabia, after facing so many terrorist attacks, they started understanding and countering terrorism differently by establishing Mohammad bin Naif Counselling and Care Center in 2006. The center now is considered one of the top experience centers in the world for terrorist rehabilitation and ideology correction. The center offers different programs such as training, educational, social, art and psychological programs. One of the approaches that have been used by psychological experts at the center is Narrative Therapy. It is a therapeutic approach that focuses on the ability of the client to identify their personal life story. The client during therapy works as a storyteller where he or she gets insight, meaning and better understanding of their own lives. Because each client at the center had a story, it can be better fit method for rehabilitation towards healing and personal development. The case describes a 34-years-old man who was involved in some terrorism activities locally by technically and financially supporting a terrorist group related to Al-Qaida. The beneficiary joined Mohammad bin Naif Counseling and Care Center after serving his sentence. Informed of consent has been given to the beneficiary before starting the therapeutic program. Both qualitative and quantitative data on the beneficiary are collected by self-reporting during the initial session, and by using a psychological measurement. The result found that the beneficiary was not insightful about himself, and he had a high level of repression which relatedly moved him to be targeted for recruitment in the terrorist group. With rehabilitation and by using the therapeutic approach, the beneficiary improved on the level of insight, specifically about himself and also about the experience. This case illustrates the importance of considering the effect of Narrative Therapy in terrorist rehabilitation programs.

Keywords: narrative therapy, rehabilitation, Saudi Arabia, terrorism

Procedia PDF Downloads 294
24016 The Nexus of Federalism and Economic Development: A Politico-Economic Analysis of Balochistan, Pakistan

Authors: Rameesha Javaid

Abstract:

Balochistan, the largest landmass named after and dominated by the 55% Baloch population, which has had a difficult anti-center history like their brothers the Kurds of Middle East, reluctantly acceded to Pakistan in 1947. The region, which attained the status of a province after two decades of accession, has lagged behind in social development and economic growth as compared to the other three federating units. The province has seen the least financial autonomy and administrative decentralization both in autocratic and democratic dispensations under geostrategic and security considerations. Significant corrections have been recently made in the policy framework through changing the formula for intra-provincial National Finance Award, curtailing the number of subjects under federal control, and reactivating the Council of Common Interests. Yet policymaking remains overwhelmingly bureaucratic under a weak parliamentary oversight. The provincial coalition governments are unwieldy and directionless. The government machinery has much less than the optimal capability, character, integrity, will, and opportunity to perform. Decentralization further loses its semblance in the absence of local governments for long intervals and with the hold of hereditary tribal chiefs. Increased allocations failed to make an impact in the highest per capita cost environment due to long distances and scattered settlements. Decentralization, the basic ingredient of federalism has remained mortgaged to geo-strategic factors, internal security perceptions, autocratic and individualistic styles of governments, bureaucratic policymaking structures, bad governance, non-existent local governments, and feudalistic tribal lords. This suboptimal federalism speaks for the present underdevelopment in Balochistan and will earmark the milestones in the future.

Keywords: Balochistan, economic development, federalism, political economy

Procedia PDF Downloads 309
24015 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 100
24014 Antecedent and Outcome of New Product Development in Leather Industry, Bangkok and Vicinity, Thailand

Authors: Bundit Pungnirund

Abstract:

The purposes of this research were to develop and to monitor the antecedent factors which directly affected the success rate of new product development. This was a case study of the leather industry in Bangkok, Thailand. A total of 350 leather factories were used as a sample group. The findings revealed that the new product development model was harmonized with the empirical data at the acceptable level, the statistic values are: x^2=6.45, df= 7, p-value = .48856; RMSEA = .000; RMR = .0029; AGFI = .98; GFI = 1.00. The independent variable that directly influenced the dependent variable at the highest level was marketing outcome which had a influence coefficient at 0.32 and the independent variables that indirectly influenced the dependent variables at the highest level was a clear organization policy which had a influence coefficient at 0.17, whereas, all independent variables can predict the model at 48 percent.

Keywords: antecedent, new product development, leather industry, Thailand

Procedia PDF Downloads 297
24013 Variation of Hedonic Capacity of People According to Age and Its Correlation with Chronotype

Authors: T. Hojageldiyev, Y. Bolmammedov

Abstract:

Increasing evidence suggests late chronotype individuals are at increased risk of developing psychopathological conditions. Our previously conducted study aimed to know the distribution of chronotypes according to age revealed that evening-types reaching a peak at age 14. While there is growing number of studies evaluating associations between chronotype and affective symptoms, to our best knowledge there are no studies addressing the issue of prevalence of anhedonia according to age groups of people. The sample included 545 healthy students between 13-21 years old from secondary schools and universities of Turkmenistan. Self-report 14 item Snaith-Hamilton Pleasure Scale (SHAPS) was used to assess hedonic tone of students. SHAPS score of 3 or higher indicates the criteria for the anhedonia. According to similarity of hedonic capacity participants divided into three age groups. Group I (age 13-14-15) includes 206 students (92 female), group II (age 16-17) includes 256 students (111 female) and group III (age 18-19-20-21) includes 83 (37 female). Statistical analysis was performed using Microsoft Excel 2013 and GraphPad Prism 7.0 programs. According to results average SHAPS scores of group I is 1.93 ± 1.94, group II 1.08 ± 1.43 and group III 1.29 ± 1.62. Students with anhedonia in group I consisted 30.5%, in group II 13,2% and in group III 12.04%. There are no gender differences. According to questionnaire results, higher prevalence of anhedonia is at the age between 13-15 than other age groups, and hedonic capacity increases as the age of students increases (p < 0.05). As a result, distribution of evening-types according to age correlates with hedonic capacity which is evening-types tends to have lower hedonic capacity.

Keywords: anhedonia, age, chronotype, hedonic capacity

Procedia PDF Downloads 161
24012 The Aftermath of Insurgency on Educational Attainment in Nigeria: A Peril on National Development

Authors: David Chapola Nggada

Abstract:

This is a survey designed to find out the impact of the ongoing insurgency in north eastern Nigeria on educational attainment. It is a mixture of both qualitative and quantitative research work on a sample size of 71 secondary school students currently displaced from Baga Biu and Monguno areas of Borno State, now residing as internally displaced persons(IDPs) in Gombe and Yola IDP camps. This was done through both semi structured interview and questionnaire administration. Statistical methods used include percentage and cross tables to gain specific insight into different dimensions of what this implies. Two major aspects of the impact covered were impact on individual student and impact on societal development. These two dimensions were measured against national development variables and analyzed against reviewed literature and findings across the globe. A combination of theories from different fields led to a deeper and better insight. The results confirm a significant relationship between educational attainment and the development of the north east region and Nigeria as a whole. Recommendations were made on ways of reintegrating this group back to the educational system.

Keywords: education, insurgency, national development, threat

Procedia PDF Downloads 242
24011 Security Practices of the European Union on Migration: An Analysis of the Frontex Within the Framework of Biopolitics

Authors: Gizem Ertürk, Nursena Dinç

Abstract:

The Aegean area has always been an important transit point for migration; however, the establishment of the European Union gave further impetus to the migration phenomenon and increased the significance of the area within this context. The migration waves have been more visible in the area in recent decades, and particularly after the “2015 Migration Crisis,” this issue has been subject to further securitization in the EU. In this conjuncture, the Frontex, which is an agency set up by the EU in 2005 for the purpose of managing and coordinating the border control efforts, has become more functional in the relevant area, but at the same time, have some questionable actions within the context of human rights. This paper problematizes the rationality behind the existence and practices of such a structure and attempts to make a political and legal analysis of the security practices of the European Union against migration within a framework based on the biopolitics approaches of Michel Foucault and Giorgio Agamben. The dataset of this paper, which focuses on the agency in question by taking it as a case, is formed by making use of the existing literature on the EU’s security policies, the relevant official texts of the Union and Frontex reports on migration practices in and around the Aegean Sea.

Keywords: migration, biopolitics, Frontex, security, European union, securitization

Procedia PDF Downloads 137
24010 Biochar and Food Security in Central Uganda

Authors: Nataliya Apanovich, Mark Wright

Abstract:

Uganda is among the poorest but fastest growing populations in the world. Its annual population growth of 3% puts additional stress through land fragmentation, agricultural intensification, and deforestation on already highly weathered tropical (Ferralsol) soils. All of these factors lead to decreased agricultural yields and consequently diminished food security. The central region of Uganda, Buganda Kingdom, is especially vulnerable in terms of food security as its high population density coupled with mismanagement of natural resources led to gradual loss of its soil and even changes in microclimate. These changes are negatively affecting livelihoods of smallholder farmers who comprise 80% of all population in Uganda. This research focuses on biochar for soil remediation in Masaka District, Uganda. If produced on a small scale from locally sourced materials, biochar can increase the quality of soil in a cost and time effective manner. To assess biochar potential, 151 smallholder farmers were interviewed on the types of crops grown, agricultural residues produced and their use, as well as on attitudes towards biochar use and its production on a small scale. The interviews were conducted in 7 sub-counties, 32 parishes, and 92 villages. The total farmland covered by the study was 606.2 kilometers. Additional information on the state of agricultural development and environmental degradation in the district was solicited from four local government officials via informal interviews. This project has been conducted in collaboration with the international agricultural research institution, Makerere University in Kampala, Uganda. The results of this research can have implications on the way farmers perceive the value of their agricultural residues and what they decide to do with them. The underlying objective is to help smallholders in degraded soils increase their agricultural yields through the use of biochar without diverting the already established uses of agricultural residues to a new soil management practice.

Keywords: agricultural residues, biochar, central Uganda, food security, soil erosion, soil remediation

Procedia PDF Downloads 282
24009 Role of Agriculture Equipment toward Food Security: Case Study of Agriculture Equipment Assistance during President Joko Widodo Era in Indonesia

Authors: Raihan Zahirah Mauludy Ridwan, Frisca Devi Choirina

Abstract:

Indonesia is an agrarian country endowed by fertile soil, supportive weather, and natural resources which can support agricultural activities. There are commodities which produced by local farmers. Even though Indonesia had commodities, it still imports stocks of staple food. To reduce the dependency on imported staple food, President Joko Widodo wants to generate more locally-produced staple food by giving 69.000 tractors, free seeds, and fertilizers to the local farmers. In Indonesia, the problem revolves around the amount of food production especially rice derived from farmers who cannot afford technologies which can support the agricultural activities. Moreover, they cannot afford seeds and fertilizers which can make the production of commodities more effective and have high quality. Therefore, the paper would like to answer how agriculture equipment assistance during President Joko Widodo era can give significant impact towards food security. The purpose of this paper is to explore the role of agriculture equipment assistance and its impact towards Indonesia’s food security. This paper uses Boserup and Ruthenberg theory of agricultural intensification to link agriculture equipment and intensification of production which in the end will have impact towards food security through case study method. The paper affirms that the role of agricultural equipment assistance toward food security in Indonesia is significant toward Indonesia’s food production and security.

Keywords: agricultural equipment, agricultural intensification, Boserup, Indonesia, Joko Widodo, Ruthenberg

Procedia PDF Downloads 184
24008 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 433
24007 Circadian Disruption in Polycystic Ovary Syndrome Model Rats

Authors: Fangfang Wang, Fan Qu

Abstract:

Polycystic ovary syndrome (PCOS), the most common endocrinopathy among women of reproductive age, is characterized by ovarian dysfunction, hyperandrogenism and reduced fecundity. The aim of this study is to investigate whether the circadian disruption is involved in pathogenesis of PCOS in androgen-induced animal model. We established a rat model of PCOS using single subcutaneous injection with testosterone propionate on the ninth day after birth, and confirmed their PCOS-like phenotypes with vaginal smears, ovarian hematoxylin and eosin (HE) staining and serum androgen measurement. The control group rats received the vehicle only. Gene expression was detected by real-time quantitative PCR. (1) Compared with control group, PCOS model rats of 10-week group showed persistently keratinized vaginal cells, while all the control rats showed at least two consecutive estrous cycles. (2) Ovarian HE staining and histological examination showed that PCOS model rats of 10-week group presented many cystic follicles with decreased numbers of granulosa cells and corpora lutea in their ovaries, while the control rats had follicles with normal layers of granulosa cells at various stages of development and several generations of corpora lutea. (3) In the 10-week group, serum free androgen index was notably higher in PCOS model rats than controls. (4) Disturbed mRNA expression patterns of core clock genes were found in ovaries of PCOS model rats of 10-week group. Abnormal expression of key genes associated with circadian rhythm in ovary may be one of the mechanisms for ovarian dysfunction in PCOS model rats induced by androgen.

Keywords: polycystic ovary syndrome, androgen, animal model, circadian disruption

Procedia PDF Downloads 229
24006 The Impact of Adopting Cross Breed Dairy Cows on Households’ Income and Food Security in the Case of Dejen Woreda, Amhara Region, Ethiopia

Authors: Misganaw Chere Siferih

Abstract:

This study assessed the impact of crossbreed dairy cows on household income and food security. The study area is found in Dejen Woreda, East Gojam Zone, and Amhara region of Ethiopia. Random sampling technique was used to obtain a sample of 80 crossbreed dairy cow owners and 176 indigenous dairy cow owners. The study employed food consumption score analytical framework to measure food security status of the household. No Statistical significant mean difference is found between crossbreed owners and indigenous owners. Logistic regression was employed to investigate crossbreed dairy cow adoption determinants , the result indicates that gender, education, labor number, land size cultivated, dairy cooperatives membership, net income and food security status of the household are statistically significant independent variables, which explained the binary dependent variable, crossbreed dairy cow adoption. Propensity score matching (PSM) was employed to analyze the impact of crossbreed dairy cow owners on farmers’ income and food security. The average net income of crossbreed dairy cow owners was found to be significantly higher than indigenous dairy cow owners. Estimates of average treatment effect of the treated (ATT) indicated that crossbreed dairy cow is able to impact households’ net income by 42%, 38.5%, 30.8% and 44.5% higher in kernel, radius, nearest neighborhood and stratification matching algorithms respectively as compared to indigenous dairy cow owners. However, estimates of average treatment of the treated (ATT) suggest that being an owner of crossbreed dairy cow is not able to affect food security significantly. Thus, crossbreed dairy cow enables farmers to increase income but not their food security in the study area. Finally, the study recommended establishing dairy cooperatives and advice farmers to become a member of them, attention to promoting the impact of crossbreed dairy cows and promotion of nutrition focus projects.

Keywords: crossbreed dairy cow, net income, food security, propensity score matching

Procedia PDF Downloads 64
24005 Water Quality of Cengkareng Drain in Maritime Security Perspective

Authors: Febri Ramadhan, Sigid Hariyadi, Niken Tunjung Murti Pratiwi, Budiman Djoko Said

Abstract:

The scope about maritime security copes all of the problems emanating from maritime domain. Those problems can give such threats to national security of the state. One of threats taking place nowadays in maritime domain is about pollution. Pollution coming from many sources may increase water-borne disease risk that can cause the instability of national security. Pollution coming from many sources may increase water-borne disease risk. Hence the pollution makes an improper condition of environments for humans and others biota dwelling in the waters. One of the tools that can determine about pollution is by measuring about the water quality of its waters. In this case, what brings the waste and pollutants is there an activity of tidal waves introducing substances or energy into the natural environment. Cengkareng Drain is one of the water channels which is affected by tidal waves. Cengkareng Drain was become an observation area to examine the relation between water quality and tide waves. This research was conducted monthly from July to November 2015. Sampling of water was conducted every ebb and tide in every observation. Pollution index showed that the level of pollution on Cengkareng drain was moderately polluted, with the score about 7.7-8.6. Based on the results of t-test and analysis of similarity, the characteristic of water quality on rising tide does not significantly differ from the characteristic of water quality on ebbing tide. Therefore, we need a proper management as a means to control the pollutants in order to make good maritime security strategy.

Keywords: maritime security, Cengkareng drain, water quality, tidal waves

Procedia PDF Downloads 214
24004 Digital Skepticism In A Legal Philosophical Approach

Authors: dr. Bendes Ákos

Abstract:

Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.

Keywords: legal philosophy, privacy, security, ethics, digital skepticism

Procedia PDF Downloads 43
24003 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 219
24002 Is There a Group of "Digital Natives" at Secondary Schools?

Authors: L. Janská, J. Kubrický

Abstract:

The article describes a research focused on the influence of the information and communication technology (ICT) on the pupils' learning. The investigation deals with the influences that distinguish between the group of pupils influenced by ICT and the group of pupils not influenced by ICT. The group influenced by ICT should evince a different approach in number of areas (in managing of two and more activities at once, in a quick orientation and searching for information on the Internet, in an ability to quickly and effectively assess the data sources, in the assessment of attitudes and opinions of the other users of the network, in critical thinking, in the preference to work in teams, in the sharing of information and personal data via the virtual social networking, in insisting on the immediate reaction on their every action etc.).

Keywords: ICT influence, digital natives, pupil´s learning

Procedia PDF Downloads 291
24001 Experimental Investigations on Group Interaction Effects of Laterally Loaded Piles in Submerged Sand

Authors: Jasaswini Mishra, Ashim K. Dey

Abstract:

This paper aims to investigate the group interaction effects of laterally loaded pile groups driven into a medium dense sand layer in submerged state. Static lateral load tests were carried out on pile groups consisting of varying number of piles and at different spacings. The test setup consists of a load cell (500 kg capacity) and an LVDT (50 mm) to measure the load and pile head deflection respectively. The piles were extensively instrumented with strain gauges so as to study the variation of soil resistance within the group. The bending moments at various depths were calculated from strain gauge data and these curves were fitted using a higher order polynomial in order to get 'p-y' curves. A comparative study between a single pile and a pile under a group has also been done for a better understanding of the group effect. It is observed that average load per pile is significantly reduced relative to single pile and it decreases with increase in the number of piles in a pile group. The loss of efficiency of the piles in the group, commonly referred to as "shadowing" effect, has been expressed by the use of a 'p-multiplier'. Leading rows carries greater amount of load when compared with the trailing rows. The variations of bending moment with depth for different rows of pile within a group and different spacing have been analyzed and compared with that of a single pile. p multipliers within different rows in a pile group were evaluated from the experimental study.

Keywords: group action, laterally loaded piles, p-multiplier, strain gauge

Procedia PDF Downloads 241
24000 Effect of Rituximab Therapy Depending on the Age of Disease Onset in Systemic Sclerosis

Authors: Liudmila Garzanova, Lidia Ananyeva, Olga Koneva, Olga Ovsyannikova, Oxana Desinova, Mayya Starovoytova, Rushana Shayahmetova, Anna Khelkovskaya-Sergeeva

Abstract:

Objectives. The age of the disease onset could have an impact on the effect of therapy in systemic sclerosis(SSc). Late-age onset in SSc could have a more severe course of the disease and worse clinical effects on therapy. The aim of our study was to evaluate changes in skin fibrosis on rituximab(RTX) therapy in patients with SSc and different ages of the disease onset. Methods. 151 patients with SSc were included in this study. Patients were divided into groups depending on the age of the disease onset: group 1 - younger than 30 years (40 patients(26%), group 2 - 31-59 years (90 patients(60%) and group 3 – more than 60 years (21 patients(14%). The mean follow-up period was 13±2.3month. The mean age was 48±13years, female-83% of patients, and the diffuse cutaneous subset of the disease had 52% of patients. The mean disease duration was 6.4±5years. The cumulative mean dose of RTX was 1.5±0.6grams. Patients received RTX as a therapy for interstitial lung disease. All patients received prednisone at a dose of 11.6±4.8mg/day, immunosuppressants received 48% of them. The results at baseline and at the end of the follow-up are presented in the form of mean values. Results. There was a significant decrease of modified Rodnan skin score(mRss) in all groups: in group 1 - from 10.2±8 to 7.7±6.5(p=0.01); in group 2 - from 9±7.2 to 6.2±4.7(p=0.0001); in group 3 - from 20.5±14.1 to 10.8±9.4(p=0.001). There was a significant decrease of the activity index (EScSG-AI): in group 1 from 2.5±1.8 to 1.3±1.1; in group 2 – from 3.2±1.6 to 1.5±1.2; in group 3 – from 4.2±2.1 to 1.3±1. Conclusion. There was a significant improvement in skin fibrosis in a year after initiation of RTX therapy regardless of the age of the disease onset. The improvement was more pronounced in the group with late-age onset of the disease, but these data require further investigations.

Keywords: skin fibrosis, systemic sclerosis, rituximab, disease onset

Procedia PDF Downloads 29