Search results for: Development of a security group
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24209

Search results for: Development of a security group

23459 The Effectiveness of Executive Order in the Implementation of Human Security Policies: The Violent Case of the Special Anti-Robbery Squad and Youths in Nigeria

Authors: Cita Ayeni

Abstract:

Amidst numerous arguments on reasons for low Human Development (low HDI) in Nigeria ranging from corruption, incompetence of the government and its agencies, mismanagement of funds, terrorism, violence, and crime in the country, just to mention a few. There have been several actions by agencies of the government that for years has threatened the security and development of the citizens, and the country in a broader sense. This paper analyses the activities of SARS (Special Anti-Robbery Squad) as a government agency with a mandate to tackling the high rate of crime in the country but instead have been marred with allegations of violence, killings, extortion, harsh treatment, and terror of the Nigerian citizenry, predominantly the youths. This paper establishes the effect of these actions of the agency on human development in Nigeria, hindering the capacity of the Nigerian youths to earn a decent living due to constant terrorism, extortion, and extrajudicial activities, which in numerous cases resulted in maiming and death, thus instigating fear in the vast majority. This research further analyses the executive order by the then Acting President of Nigeria (Vice-President) that overhauled the agency following many years of continuous public outcry, complaint, grievance, and protest. This work establishes that this order carried out in the absence of the President was to a large extent enough to stop these violations, thereby resulting in little or no recorded complaint or grievance by the public, as many of the officials involved in the gruesome activities were said to have been put away. This would pave way and give freedom to the youths to realize their potentials free from intimidation, violence, and fear from the agencies created to protect them, and on the other hand refocus the new agency FSARS (Federal Special Anti-Robbery Squad) on its real mandate in collaboration with independent organizations acting as a check to its actions. This work thus depicts how direct executive orders on policies pertaining to individual insecurities, on youths in this case, in a country can be a potential drive to increased human development.

Keywords: special anti-robbery squad, Nigerian youths, overhaul, insecurities, human development

Procedia PDF Downloads 157
23458 Effectiveness of Internet Psychological Counseling in Reducing Social Shyness Symptoms among Students of University of Tabuk

Authors: Khawla Saad Albalawi

Abstract:

The aim of this research was to explore the effectiveness of the internet counseling in reducing social shyness among the university's students. The sample consisted of 40 students and was divided into two groups: an experimental group and a control group. The social shyness scale (SSS) was administered to both groups before applying the counseling to the experimental group (as a pre-test). After that, the internet counseling was applied to the experimental group. Next, the SSS was administered to both groups (as a post-test). Finally, the SSS was administered to the experimental group (as an iterative application). Results suggest that: 1. There is a significant difference between the two groups in the post-test in all dimensions and the total score of the (SSS) in favor of the experimental group in all cases. 2. There is a significant difference between the pre- and the post-test of the experimental group in all dimensions and the total score of the (SSS) in favor of the post-test in all cases. 3. There is no significant difference between the post-test and the iterative application of the experimental group in all dimensions and the total score of the (SSS). The above results were discussed in light of previous research. Recommendations and future researches were suggested.

Keywords: internet psychological clinics, social interaction disorders, shyness, Twitter, Facebook

Procedia PDF Downloads 484
23457 Role of Agriculture Equipment toward Food Security: Case Study of Agriculture Equipment Assistance during President Joko Widodo Era in Indonesia

Authors: Raihan Zahirah Mauludy Ridwan, Frisca Devi Choirina

Abstract:

Indonesia is an agrarian country endowed by fertile soil, supportive weather, and natural resources which can support agricultural activities. There are commodities which produced by local farmers. Even though Indonesia had commodities, it still imports stocks of staple food. To reduce the dependency on imported staple food, President Joko Widodo wants to generate more locally-produced staple food by giving 69.000 tractors, free seeds, and fertilizers to the local farmers. In Indonesia, the problem revolves around the amount of food production especially rice derived from farmers who cannot afford technologies which can support the agricultural activities. Moreover, they cannot afford seeds and fertilizers which can make the production of commodities more effective and have high quality. Therefore, the paper would like to answer how agriculture equipment assistance during President Joko Widodo era can give significant impact towards food security. The purpose of this paper is to explore the role of agriculture equipment assistance and its impact towards Indonesia’s food security. This paper uses Boserup and Ruthenberg theory of agricultural intensification to link agriculture equipment and intensification of production which in the end will have impact towards food security through case study method. The paper affirms that the role of agricultural equipment assistance toward food security in Indonesia is significant toward Indonesia’s food production and security.

Keywords: agricultural equipment, agricultural intensification, Boserup, Indonesia, Joko Widodo, Ruthenberg

Procedia PDF Downloads 172
23456 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 421
23455 The Impact of Adopting Cross Breed Dairy Cows on Households’ Income and Food Security in the Case of Dejen Woreda, Amhara Region, Ethiopia

Authors: Misganaw Chere Siferih

Abstract:

This study assessed the impact of crossbreed dairy cows on household income and food security. The study area is found in Dejen Woreda, East Gojam Zone, and Amhara region of Ethiopia. Random sampling technique was used to obtain a sample of 80 crossbreed dairy cow owners and 176 indigenous dairy cow owners. The study employed food consumption score analytical framework to measure food security status of the household. No Statistical significant mean difference is found between crossbreed owners and indigenous owners. Logistic regression was employed to investigate crossbreed dairy cow adoption determinants , the result indicates that gender, education, labor number, land size cultivated, dairy cooperatives membership, net income and food security status of the household are statistically significant independent variables, which explained the binary dependent variable, crossbreed dairy cow adoption. Propensity score matching (PSM) was employed to analyze the impact of crossbreed dairy cow owners on farmers’ income and food security. The average net income of crossbreed dairy cow owners was found to be significantly higher than indigenous dairy cow owners. Estimates of average treatment effect of the treated (ATT) indicated that crossbreed dairy cow is able to impact households’ net income by 42%, 38.5%, 30.8% and 44.5% higher in kernel, radius, nearest neighborhood and stratification matching algorithms respectively as compared to indigenous dairy cow owners. However, estimates of average treatment of the treated (ATT) suggest that being an owner of crossbreed dairy cow is not able to affect food security significantly. Thus, crossbreed dairy cow enables farmers to increase income but not their food security in the study area. Finally, the study recommended establishing dairy cooperatives and advice farmers to become a member of them, attention to promoting the impact of crossbreed dairy cows and promotion of nutrition focus projects.

Keywords: crossbreed dairy cow, net income, food security, propensity score matching

Procedia PDF Downloads 40
23454 Water Quality of Cengkareng Drain in Maritime Security Perspective

Authors: Febri Ramadhan, Sigid Hariyadi, Niken Tunjung Murti Pratiwi, Budiman Djoko Said

Abstract:

The scope about maritime security copes all of the problems emanating from maritime domain. Those problems can give such threats to national security of the state. One of threats taking place nowadays in maritime domain is about pollution. Pollution coming from many sources may increase water-borne disease risk that can cause the instability of national security. Pollution coming from many sources may increase water-borne disease risk. Hence the pollution makes an improper condition of environments for humans and others biota dwelling in the waters. One of the tools that can determine about pollution is by measuring about the water quality of its waters. In this case, what brings the waste and pollutants is there an activity of tidal waves introducing substances or energy into the natural environment. Cengkareng Drain is one of the water channels which is affected by tidal waves. Cengkareng Drain was become an observation area to examine the relation between water quality and tide waves. This research was conducted monthly from July to November 2015. Sampling of water was conducted every ebb and tide in every observation. Pollution index showed that the level of pollution on Cengkareng drain was moderately polluted, with the score about 7.7-8.6. Based on the results of t-test and analysis of similarity, the characteristic of water quality on rising tide does not significantly differ from the characteristic of water quality on ebbing tide. Therefore, we need a proper management as a means to control the pollutants in order to make good maritime security strategy.

Keywords: maritime security, Cengkareng drain, water quality, tidal waves

Procedia PDF Downloads 201
23453 Growth Performance and Critical Supersaturation of Heterogeneous Condensation for High Concentration of Insoluble Sub-Micron Particles

Authors: Jie Yin, Jun Zhang

Abstract:

Measuring the growth performance and critical supersaturation of particle group have a high reference value for constructing a supersaturated water vapor environment that can improve the removal efficiency of the high-concentration particle group. The critical supersaturation and the variation of the growth performance with supersaturation for high-concentration particles were measured by a flow cloud chamber. Findings suggest that the influence of particle concentration on the growth performance will reduce with the increase of supersaturation. Reducing residence time and increasing particle concentration have similar effects on the growth performance of the high-concentration particle group. Increasing particle concentration and shortening residence time will increase the critical supersaturation of the particle group. The critical supersaturation required to activate a high-concentration particle group is lower than that of the single-particle when the minimum particle size in the particle group is the same as that of a single particle.

Keywords: sub-micron particles, heterogeneous condensation, critical supersaturation, nucleation

Procedia PDF Downloads 141
23452 Importance of Community Involvement in Tourism Development Activities

Authors: Lombuso P. Shabalala

Abstract:

This research paper investigates the importance of community involvement in tourism development activities from the initial stage. Community is defined as a group of people living in the same area and practicing common ownership and practices or with a commonality such as norms, religion, values, customs, or identity. Globalisation has restructured economic, political, and social relationships at the local level, which impacts community involvement in activities taking place in their own space. Although social relationships and interests are no longer limited to local communities, the power of place remains. Whereas, tourism is considered as an activity essential to the life of nations because of its direct effects on the social, cultural, educational, and economic sectors of national societies and their international relations. The existing literature has indicated that the four types of motivation in community involvement are best differentiated by identifying the unique ultimate goal for each motivation. In a nutshell, the ultimate goal for egoism is to increase one's own welfare; altruism is to increase the welfare of another individual or individuals; collectivism is aimed at increasing the welfare of a group, and the principlism is to uphold one or more moral principles. As a base of community involvement, each of these four forms of motivation exhibits its own strengths and weaknesses to be acknowledged. Purposive sampling was suitable to select the fourteen descendant group representatives. The representatives included chief/s, headman, senior descendants’ member, and members of the traditional council who descends from MWCHS. The qualitative research design was adopted for the study in the form of semi-structured interviews. Community development is a social process involving residents in activities designed to improve their quality of life. The key finding of the research is the importance of involving communities, in particular, the immediate community members from the initial stage of any proposed tourism development activity. Without a doubt, the immediate communities are well informed about the dynamics of the area (economically, politically, and socially). Therefore, the finding suggests that communities are in a better position to advise project managers on possible potential tourism developments activities that can address the real needs and benefit the community, instead of investing resources in a development that will not benefit or add any value in the lives of the targeted communities. It must be noted that the power of the place where the development will be implemented remains with the community. Furthermore, community support and buy-in are crucial to the success of prospective tourism development. In conclusion, it cannot be denied that community involvement comes with its own challenges, contrary to greater sustainable benefits that can be realized prior to articulation. The study suggests for project managers to ensure a fair and transparent community involvement process. Fair distribution of meaningful roles could secure trust and result in these communities to view the proposed development as their own.

Keywords: communities, development, involvement, tourism

Procedia PDF Downloads 177
23451 Effectiveness of Metacognitive Therapy in Metacognitive Beliefs, Anxiety and Social Phobia of Male High School Students

Authors: Saba Hasanvandi, Molok Khademi Ashkezari, Niloofar Esmaieli

Abstract:

The research purpose was to assess the effectiveness of metacognitive therapy in metacognitive beliefs, anxiety and social phobia of male students studying in the high schools of Dargaz City. The sample comprised 30 students who were randomly selected and assigned to the experimental and control groups. The kind of this study was experimental study with pre-ops and follow-up stages. Subjects filled out metacognitive beliefs, anxiety and social phobia questionnaires. The experimental group underwent 10 sessions of therapeutic metacognitive sessions. The group therapy was conducted for ten, weekly, 90-minute sessions. Mankova analysis was utilized to analyze the data. Results revealed that metacognitive group therapy decreased metacognitive beliefs (P=0.007), anxiety (P<0.001) and social phobia (P=<0.017) in the experimental group as compared to the control group. Furthermore, the effectiveness of group metacognitive therapy was stable and consistent after one month of time interval. The results of present study can be effective for mental health professional in reaching a better understanding of anxiety and social phobia.

Keywords: group metacognitive therapy, metacognitive beliefs, anxiety, social phobia, high school students

Procedia PDF Downloads 575
23450 Evaluation of Three Commercially Available Materials in Reducing the White Spot Lesions During Fixed Orthodontic Treatment: A Prospective Randomized Controlled Trial

Authors: Sayeeda Laeque Bangi

Abstract:

Objectives: Treating white spot lesions (WSL) to create a sound and esthetically pleasing enamel surface is a question yet to be fully answered. The objective of this randomized controlled trial was to measure and compare the degree of regression of WSL during orthodontic treatment achieved by using three commercially available materials. Methods: A single-blinded randomized prospective clinical trial, comprising 80 patients categorized into four groups (one control group and three experimental groups, with 20 subjects per group) using block randomization, was conducted. Group A (control group): Colgate strong toothpaste; and experiments groups were Group B: GC tooth mousse, Group C: Phos-Flur mouthwash and Group D: SHY-NM. Subjects were instructed to use the designated dentifrice/mouthwash and photographs were taken at baseline, third and sixth months, and white spot lesions were reassessed in the maxillomandibular anterior teeth. Results: All the three groups had shown an improvement in WSL. But Group B has shown the greatest difference in mean values of decalcification index (DI) scores. Conclusion: All three commercially available products showed a regression of WSL over a 6-month duration. GC tooth mousse proved to be the most effective means of treating WSL over other regimens.

Keywords: white spot lesions, dentifrices, orthodontic therapy, remineralization

Procedia PDF Downloads 180
23449 Optimizing Skill Development in Golf Putting: An Investigation of Blocked, Random, and Increasing Practice Schedules

Authors: John White

Abstract:

This study investigated the effects of practice schedules on learning and performance in golf putting, specifically focusing on the impact of increasing contextual interference (CI). University students (n=7) were randomly assigned to blocked, random, or increasing practice schedules. During acquisition, participants performed 135 putting trials using different weighted golf balls. The blocked group followed a specific sequence of ball weights, while the random group practiced with the balls in a random order. The increasing group started with a blocked schedule, transitioned to a serial schedule, and concluded with a random schedule. Retention and transfer tests were conducted 24 hours later. The results indicated that high levels of CI (random practice) were more beneficial for learning than low levels of CI (blocked practice). The increasing practice schedule, incorporating blocked, serial, and random practice, demonstrated advantages over traditional blocked and random schedules. Additionally, EEG was used to explore the neurophysiological effects of the increasing practice schedule.

Keywords: skill acquisition, motor control, learning, contextual interference

Procedia PDF Downloads 84
23448 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Adel Atta Youssef Rezkalla

Abstract:

Russia's invasion of Ukraine tested the international community and prompted not only states but also non-state actors to take deterrent measures in response. In fact, international sports federations, notably FIFA and UEFA, have managed to shift the power dynamic quite effectively by imposing a blanket ban on Russian national teams and clubs. The purpose of this article is to examine the human rights consequences of such actions by international sports organizations. First, the article moves away from assessing the legal status of FIFA and UEFA under international law and examines the question of how a legal connection can be established with their human rights obligations. Secondly, the human rights aspects of the controversial FIFA and UEFA measures against Russian athletes are examined and these are analyzed in more detail using the proportionality test than the principle of non-discrimination under international human rights law. Finally, the main avenues for redress for possible human rights violations related to the actions taken by these organizations are identified and the challenges of arbitration and litigation in Switzerland are highlighted.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 54
23447 Polycystic Ovary Syndrome - Clinical Profile of Women Attending NPFDB Subfertility Clinic

Authors: Komathy Thiagarajan, Mohd. Azizuddin Mohd. Yussof, Hasnoorina Husin, Noor Azreena Abd Aziz, Faezah Shekh Abdullah, Abdul Wahaf Abdul Wahid

Abstract:

Polycystic Ovary Syndrome (PCOS) presents with a plethora of clinical features owing to the multifaceted underlying pathophysiology. This study was conducted to determine the clinical features unique to the sub fertile women attending the Sub fertility Clinic of the National Population and Family Development Board (NPFDB) so that a more holistic approach can be adopted to further enhance the pregnancy outcome in those women. This was a case-control study conducted over a span of three years (from January 2014 until December 2016), whereby women who fulfilled the Rotterdam Criteria 2004 were classified as PCOS (n=79) and women who did not fulfill the Rotterdam Criteria were classified as controls (n=88). The mean age of the women was 30.1 years and the mean duration of marriage was 3.93 years. The majority of women suffered from primary sub fertility (82.6%). The median age was lower among PCOS women (29.0 years) compared to the controls (30.0 years), p<0.05. The majority of PCOS women (43.0%) were obese (BMI > 30 kg/m2) compared to only 19.3% who were obese in the control group, p<0.05. Hypertension was present in 59.5% of PCOS women and only in 36.4% of the control group, p<0.05. There were significantly more women who presented with hirsutism in PCOS group (27.8%) as compared to the control group (5.7%), p<0.05. The findings of this study elucidate that the clinical features of significance among sub fertile women suffering from PCOS, if detected early, are amenable to lifestyle modifications and timely interventions can potentially improve the fertility outcomes in this group of women.

Keywords: clinical features, fertility, lifestyle modification, PCOS

Procedia PDF Downloads 131
23446 The Design Method of Artificial Intelligence Learning Picture: A Case Study of DCAI's New Teaching

Authors: Weichen Chang

Abstract:

To create a guided teaching method for AI generative drawing design, this paper develops a set of teaching models for AI generative drawing (DCAI), which combines learning modes such as problem-solving, thematic inquiry, phenomenon-based, task-oriented, and DFC . Through the information security AI picture book learning guided programs and content, the application of participatory action research (PAR) and interview methods to explore the dual knowledge of Context and ChatGPT (DCAI) for AI to guide the development of students' AI learning skills. In the interviews, the students highlighted five main learning outcomes (self-study, critical thinking, knowledge generation, cognitive development, and presentation of work) as well as the challenges of implementing the model. Through the use of DCAI, students will enhance their consensus awareness of generative mapping analysis and group cooperation, and they will have knowledge that can enhance AI capabilities in DCAI inquiry and future life. From this paper, it is found that the conclusions are (1) The good use of DCAI can assist students in exploring the value of their knowledge through the power of stories and finding the meaning of knowledge communication; (2) Analyze the transformation power of the integrity and coherence of the story through the context so as to achieve the tension of ‘starting and ending’; (3) Use ChatGPT to extract inspiration, arrange story compositions, and make prompts that can communicate with people and convey emotions. Therefore, new knowledge construction methods will be one of the effective methods for AI learning in the face of artificial intelligence, providing new thinking and new expressions for interdisciplinary design and design education practice.

Keywords: artificial intelligence, task-oriented, contextualization, design education

Procedia PDF Downloads 13
23445 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 287
23444 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria

Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu

Abstract:

Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.

Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression

Procedia PDF Downloads 160
23443 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 382
23442 The Effects of High Velocity Low Amplitude Thrust Manipulation versus Low Velocity Low Amplitude Mobilization in Treatment of Chronic Mechanical Low Back Pain

Authors: Ahmed R. Z. Baghdadi, Ibrahim M. I. Hamoda,  Mona H. Gamal Eldein, Ibrahim Magdy Elnaggar

Abstract:

Background: High-velocity low amplitude thrust (HVLAT) manipulation and low-velocity low amplitude (LVLA) mobilization are an effective treatment for low back pain (LBP). Purpose: This study compared the effects of HVLAT versus LVLA on pain, functional deficits and segmental mobility in treatment of chronic mechanical LBP. Methods: Ninety patients suffering from chronic mechanical LBP are classified to three groups; Thirty patients treated by HVLAT (group I), thirty patients treated by LVLA (group II) and thirty patients as control group (group III) participated in the study. The mean age was 28.00±2.92, 27.83±2.28 and 28.07±3.05 years and BMI 27.98±2.60, 28.80±2.40 and 28.70±2.53 kg/m2 for group I, II and III respectively. The Visual Analogue Scale (VAS), the Oswestry low back pain disability questionnaire and modified schoper test were used for assessment. Assessments were conducted two weeks before and after treatment with the control group being assessed at the same time intervals. The treatment program group one was two weeks single session per week, and for group II two sessions per week for two weeks. Results: The One-way ANOVA revealed that group I had significantly lower pain scores and Oswestry score compared with group II two weeks after treatment. Moreover, the mobility in modified schoper increased significantly and the pain scores and Oswestry scores decreased significantly after treatment in group I and II compared with control group. Interpretation/Conclusion: HVLAT is preferable to LVLA mobilization, possibly due to a beneficial neurophysiological effect by Stimulating mechanically sensitive neurons in the lumbar facet joint capsule.

Keywords: low back pain, manipulation, mobilization, low velocity

Procedia PDF Downloads 587
23441 The Applications of Group Counseling on Self-Concept, Depression, and Resilience of Teenage Pregnancy

Authors: Fauziah Mohd Sa’ad, Mohammad Aziz Shah, B. Mohammad Arip, Norazani Ahmad, Mohd Noor Idris, Hapsah M. Yusof

Abstract:

This study was carried out to assess the application of person-centred therapy and Cognitive Psychology Ad-Din group counseling on self-concept, depression, and resilience of teenage pregnancy. This study involved 55 teenage pregnancy at three women’s refuge centers which are from KEWAJA, Rhaidatus Sakinah, and Taman Seri Puteri Cheras (JKM). Subjects were classed into two treatment groups and one control group. The Multidimensional Self-Concept Scale (MSCS), Beck Depression inventory (BDI) and Adolescent Resiliency Attitude Scale (ARAS) was administered to assess self-concept, depression, and resilience of teenage pregnancy. The control pre and post test design was used for this study. The research data were analyzed using descriptive analysis, ANOVA, MANCOVA and Tuckey Post Hoc with the significant level of .01 and .05. All treatment group received group counseling sessions for 7 consecutive week, once in each week. The Person-centred group and Cognitive Psychology Ad-Din group counseling showed a significant reduction (pre-test to post-test) on depression, enhancing self-concept and resilience of teenage pregnancy.

Keywords: group counseling, person-centred therapy, cognitive psychology Ad-Din, teenage pregnancy

Procedia PDF Downloads 556
23440 Effect of Application of Turmeric Extract Powder Solution on the Color Changes of Non-Vital Teeth (An In-vitro study).

Authors: Haidy N. Salem, Nada O. Kamel, Shahinaz N. Hassan, Sherif M. Elhefnawy

Abstract:

Aim: to assess the effect of using turmeric powder extract on changes of tooth color with extra-coronal and intra-coronal bleaching methods. Methods: Turmeric powder extract was weighted and mixed with two different hydrogen peroxide concentrations (3% and 6%) to be used as a bleaching agent. Thirty teeth were allocated into three groups (n=10): Group A: Bleaching agent (6%) was applied on the labial surface, Group B: Bleaching agent (3%) was applied inside the pulp chamber and Group C: Extra and intra-coronal bleaching techniques were used (6% and 3% respectively). A standardized access cavity was opened in the palatal surface of each tooth in both Groups B and C. Color parameters were measured using a spectrophotometer. Results: A statistically significant difference in color difference values (∆E*) and enamel brightness (∆L*) was found between Group C and each of Groups A and B. There was no statistically significant difference in (∆E*) and (∆L*) between Group A and Group B. The highest mean value of (∆E*) and (∆L*) was found in Group C, while the least mean value was found in Group B. Conclusion: Bleaching the external and internal tooth structure with low concentrations of hydrogen peroxide solution mixed with turmeric extract has a promising effect in color enhancement.

Keywords: bleaching, hydrogen peroxide, spectrophotometer, turmeric

Procedia PDF Downloads 104
23439 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 117
23438 The Significance of Muslim Families Awareness on Islamic Business Ethics in Promoting Business for Economic Development in Sokoto State, Nigeria

Authors: Hassan Malami Alkanchi

Abstract:

Acquiring the knowledge of Islamic business ethics nowadays for the conduct of business activities and other business transactions has become one of the best strategies for promoting lawful business as well as a successful business for economic development. The idea of infusing the significance of Islamic business ethics into the minds of Muslim individuals has spurred much enthusiasm in the last few decades. Putting this idea into practice posed significant impacts on the life of Muslim individuals for the development of business. The main objective of this paper is to explore the significant role of Muslim families' awareness in promoting Islamic business ethics for successful business economic development. The methodology adopted for the conduct of this study is qualitative research. The study employed a purposive sampling technique and considered it the most suitable method for data collection. The data collection techniques employed for this study were interviews and focus group discussions. The study used semi-structured interviews and focus group discussions for the data collection. The standard used for selecting the participants was strictly based on professionalism, relevance, expertise and the willingness of the participants to participate in the study. The participants interviewed include Muslim family experts, Islamic scholars, and media workers, comprising five (5) participants for each research subject. Twelve (15) participants were sampled for the study. The method of data analysis used is thematic and theoretical explanations. This paper analytically discusses the new and emerging ethical issues in relation to business activities as well as new strategies for the development of successful businesses for economic prosperity, growth, and development. The study findings revealed that the awareness of Muslim families in promoting Islamic business ethics has significantly contributed to changing the negative attitudes of some Muslim individuals' in relation to their business. Furthermore, findings of unveiled Muslim individuals immensely benefited towards understanding and having knowledge in relation to ethical business guidelines enshrined by the sharia in the conduct of pure business as well as strengthening Islamic business ethics through the teachings of the noble Quran and Sunnah.

Keywords: Muslim family, awareness, business ethics, economic development

Procedia PDF Downloads 66
23437 An Assessment of Involuntary Migration in India: Understanding Issues and Challenges

Authors: Rajni Singh, Rakesh Mishra, Mukunda Upadhyay

Abstract:

India is among the nations born out of partition that led to one of the greatest forced migrations that marked the past century. The Indian subcontinent got partitioned into two nation-states, namely India and Pakistan. This led to an unexampled mass displacement of people accounting for about 20 million in the subcontinent as a whole. This exemplifies the socio-political version of displacement, but there are other identified reasons leading to human displacement viz., natural calamities, development projects and people-trafficking and smuggling. Although forced migrations are rare in incidence, they are mostly region-specific and a very less percentage of population appears to be affected by it. However, when this percentage is transcripted in terms of volume, the real impact created by such migration can be realized. Forced migration is thus an issue related to the lives of many people and requires to be addressed with proper intervention. Forced or involuntary migration decimates peoples' assets while taking from them their most basic resources and makes them migrate without planning and intention. This in most cases proves to be a burden on the destination resources. Thus, the question related to their security concerns arise profoundly with regard to the protection and safeguards to these migrants who need help at the place of destination. This brings the human security dimension of forced migration into picture. The present study is an analysis of a sample of 1501 persons by NSSO in India (National Sample Survey Organisation), which identifies three reasons for forced migration- natural disaster, social/political problem and displacement by development projects. It was observed that, of the total forced migrants, about 4/5th comprised of the internally displaced persons. However, there was a huge inflow of such migrants to the country from across the borders also, the major contributing countries being Bangladesh, Pakistan, Sri Lanka, Gulf countries and Nepal. Among the three reasons for involuntary migration, social and political problem is the most prominent in displacing huge masses of population; it is also the reason where the share of international migrants to that of internally displaced is higher compared to the other two factors /reasons. Second to political and social problems, natural calamities displaced a high portion of the involuntary migrants. The present paper examines the factors which increase people's vulnerability to forced migration. On perusing the background characteristics of the migrants it was seen that those who were economically weak and socially fragile are more susceptible to migration. Therefore, getting an insight about this fragile group of society is required so that government policies can benefit these in the most efficient and targeted manner.

Keywords: involuntary migration, displacement, natural disaster, social and political problem

Procedia PDF Downloads 340
23436 Research on Autonomous Controllability of BeiDou Navigation Satellite System Based on Knowledge Transformation

Authors: Hang Ju, Changmin Zhu

Abstract:

The development level of the BeiDou Navigation Satellite System (BDS) can strongly reflect national defense strength as an important spatial information infrastructure. BDS can be not only used for military purposes, such as intelligence gathering, nuclear explosion monitoring, emergency communications, but also for location services, transportation, mapping, precision agriculture. In order to ensure the national defense security and the wide application of BDS in civil and military areas, BDS must be autonomous and controllable. As a complex system of knowledge-intensive, knowledge transformation runs through the whole process of research and development, production, operation, and maintenance of BDS. Based on the perspective of knowledge transformation, this paper expounds on the meaning of socialization, externalization, combination, and internalization of knowledge transformation, and the coupling relationship of autonomy and control on the basis of analyzing the status quo and problems of the autonomy and control of BDS. The autonomous and controllable framework of BDS based on knowledge transformation is constructed from six dimensions of management capability, R&D capability, technical capability, manufacturing capability, service support capability, and application capability. It can provide support for the smooth implementation of information security policy, provide a reference for the autonomy and control of the upstream and downstream industrial chains in Beidou, and provide a reference for the autonomous and controllable research of aerospace components, military measurement test equipment, and other related industries.

Keywords: knowledge transformation, BeiDou Navigation Satellite System, autonomy and control, framework

Procedia PDF Downloads 167
23435 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture

Authors: Mirad Böhm, Diede De Kok

Abstract:

It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.

Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder

Procedia PDF Downloads 314
23434 Comparative Effect of Microbial Phytase Supplementation on Layer Chickens Fed Diets with Required or Low Phosphorous Level

Authors: Hamada Ahmed, Mervat A. Abdel-Latif, Alaa. A. Ghoraba, Samah A. Ganna

Abstract:

An experiment was conducted to determine the effect of microbial phytase (Quantum Blue®) supplementation on layer chickens fed diets with required or low phosphorous level in corn-soybean based diets. One hundred and sixteen 23-week-old Lohman brown laying hens were used in 8-week feeding trial. Hens were randomly allotted into four treatments where the group (1) (control group) was fed basal diet without phytase, group (2) fed basal diet supplemented with phytase, group (3) fed diet supplemented with phytase as a replacement of 25% of monocalcium phosphate and group (4) fed diet supplemented with phytase as a replacement of 50% of monocalcium phosphate. Records on daily egg production, egg mass, egg weight and body weight of hens at the end of experimental period were recorded. Results revealed no significant (p ≥ 0.05) differences were observed among the other dietary treatments in BW, egg production, egg mass, feed intake or feed conversion when these parameters were evaluated over the duration of the experiment while egg weight showed significant (p < 0.05) increase in all phytase supplemented groups. There was no significant (p ≥ 0.05) differences in egg quality including egg length, egg width, egg shape index, yolk height, yolk width, yolk index, yolk weight and yolk albumin ratio while egg albumin was significantly increased (p < 0.05) in group (2) and group (3). Egg shell weight increased significantly (p < 0.05) in all phytase supplemented groups when compared with the control group also shell thickness increased significantly (p < 0.05) in both group (2 &3). No significant (P ≥ 0.05) difference was observed in serum Ca, P level while alkaline phosphatase was significantly (P ˂ 0.05) increased in group (3). Egg shell analysis showed increase in egg shell ash% in all phytase supplemented groups when compared with the control group, egg shell calcium % was higher in group (3) and group (4) than the control group while group (2) showed lower egg shell calcium% than the other experimental groups, egg shell phosphorous% was higher in all phytase supplemented groups than the control group. Phosphorous digestability was significantly (P ˂ 0.05) increased in all phytase supplemented groups than the control group and the highest p digestability was in group (4). Calcium digestability showed significant (P ˂ 0.05) increase in all phytase supplemented groups when compared with the control group and the highest digetability was in group (4).

Keywords: layers, microbial phytase, Ca and P availability, egg production, egg characteristics

Procedia PDF Downloads 177
23433 Sustainability and Clustering: A Bibliometric Assessment

Authors: Fernanda M. Assef, Maria Teresinha A. Steiner, David Gabriel F. Barros

Abstract:

Review researches are useful in terms of analysis of research problems. Between the types of review documents, we commonly find bibliometric studies. This type of application often helps the global visualization of a research problem and helps academics worldwide to understand the context of a research area better. In this document, a bibliometric view surrounding clustering techniques and sustainability problems is presented. The authors aimed at which issues mostly use clustering techniques, and, even which sustainability issue would be more impactful on today’s moment of research. During the bibliometric analysis, we found ten different groups of research in clustering applications for sustainability issues: Energy; Environmental; Non-urban planning; Sustainable Development; Sustainable Supply Chain; Transport; Urban Planning; Water; Waste Disposal; and, Others. And, by analyzing the citations of each group, we discovered that the Environmental group could be classified as the most impactful research cluster in the area mentioned. Now, after the content analysis of each paper classified in the environmental group, we found that the k-means technique is preferred for solving sustainability problems with clustering methods since it appeared the most amongst the documents. The authors finally conclude that a bibliometric assessment could help indicate a gap of researches on waste disposal – which was the group with the least amount of publications – and the most impactful research on environmental problems.

Keywords: bibliometric assessment, clustering, sustainability, territorial partitioning

Procedia PDF Downloads 92
23432 Implications of Learning Resource Centre in a Web Environment

Authors: Darshana Lal, Sonu Rana

Abstract:

Learning Resource Centers (LRC) are acquiring different kinds of documents like books, journals, thesis, dissertations, standard, databases etc. in print and e-form. This article deals with the different types of sources available in LRC. It also discusses the concept of the web, as a tool, as a multimedia system and the different interfaces available on the web. The reasons for establishing LRC are highlighted along with the assignments of LRC. Different features of LRC‘S like self-learning and group learning are described. It also implements a group of activities like reading, learning, educational etc. The use of LRC by students and faculties are given and concluded with the benefits.

Keywords: internet, search engine, resource centre, opac, self-learning, group learning

Procedia PDF Downloads 367
23431 A Comparison between the McGrath Video Laryngoscope and the Macintosh Laryngoscopy in Children with Expected Normal Airway

Authors: Jong Yeop Kim, Ji Eun Kim, Hyun Jeong Kwak, Sook Young Lee

Abstract:

Background: This prospective, randomized, controlled study was performed to evaluate the usefulness of the McGrath VL compared to Macintosh laryngoscopy in children with expected normal airway during endotracheal intubation, by comparing the time to intubation and ease of intubation. Methods: Eighty-four patients, aged 1-10 years undergoing endotracheal intubation for elective surgery were randomly assigned to McGrath group (n = 42) or Macintosh group (n = 42). Anesthesia was induced with propofol 2.5-3.0 mg/kg and sevoflurane 5-8 vol%. Orotracheal intubation was performed 2 minutes after injection of rocuronium 0.6 mg/kg with McGrath VL or Macintosh laryngoscope. The primary outcome was time to intubation. The Cormack and Lehane glottic grade, intubation difficulty score (IDS), and success rate of intubation were assessed. Hemodynamic changes also were recorded. Results: Median time to intubation [interquartile range] was not different between the McGrath group and the Macintosh group (25.0 [22.8-28.3] s vs. 26.0 [24.0-29.0] s, p = 0.301). The incidence of grade I glottic view was significantly higher in theMcGrath group than in the Macintosh group (95% vs. 74%, p = 0.013). Median IDS was lower in the McGrath group than in the Macintosh group (0 [0-0] vs. 0 [0-1], p = 0.018). There were no significant differences in success rate on intubation or hemodynamics between the two groups. Conclusions: McGrath VL provides better laryngeal views and lower IDS, but similar intubation times and success rates compared to the Macintosh laryngoscope in children with the normal airway.

Keywords: intubation, Macintosh laryngoscopy, Mcgrath videolaryngoscopy, pediatrics

Procedia PDF Downloads 217
23430 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean

Authors: Jessica Kate Simonds

Abstract:

The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.

Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies

Procedia PDF Downloads 172