Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5583

Search results for: general attacks

4773 Intervening between Family Functioning and Depressive Symptoms: Effect of Deprivation of Liberty, Self-Efficacy and Differentiation of Self

Authors: Jasna Hrncic

Abstract:

Poor family relations predict depression, but also to other mental health issues. Mediating effect of self-efficacy and differentiation of self and moderating effect of decreased accessibility and/or success of other adaptive and defensive mechanisms for overcoming social disadvantages could explain depression as a specific outcome of dysfunctional family relations. The present study analyzes the mediation effect of self-efficacy and differentiation of self from poor family functioning to depressive symptoms and the moderation effect of deprivation of liberty on the listed mediation effect. Deprivation of liberty has, as a general consequence, a decreased accessibility and/or success of many adaptive and defensive mechanisms. It is hypothesized that: 1) self-efficacy and differentiation of self will mediate between family functioning and depressiveness in the total sample, and 2) deprivation of liberty will moderate the stated relations. Cross-sectional study was conducted among 323 male juveniles in Serbia divided in three groups: 98 adolescents deprived of their liberty due to antisocial behavior (incarcerated antisocial group - IAG), 121 adolescents with antisocial behavior in their natural setting (antisocial control group - CAG) and 105 adolescents in general population (general control group - CGG). The CAG was included along with GCG to control the possible influence that comorbidity of antisocial behavior and depressiveness could have on results. Instruments for family relations assessment were: for a whole family of origin the emotional exchange scale and individuation scale from GRADIR by Knezevic, and for a relationship with mother PCS-YSR and CRPBI by barber, and intimacy, rejection, sacrifice, punishment, demands, control and internal control by Opacic and Kos. Differentiation of self (DOS) is measured by emotional self scale (Opacic), self-efficacy (SE) by general incompetence scale by Bezinovic, and depression by BDI (Back), CES-D (Radloff) and D6R (Momirovic). Two-path structural equation modeling based on most commonly reported fit indices, showed that the mediation model had unfavorable fit to our data for total sample [(χ2 (1, N = 324) = 13.73); RMSEA= .20 (90% CI= [.12, .30]); CFI= .98; NFI= .97; AIC=31.73]. Path model provided an adequate fit to the data only for AIG - and not to the data from ACG and GCG. SE and DOS mediated the relationship between PFF and depressiveness. Test of the indirect effects revealed that 23.85% of PFF influences on depressiveness is mediated by these two mediators (the quotient of mediated effect = .24). Test of specific indirect effects showed that SE mediates 22.17%, while DOS mediates 1.67% of PFF influence on depressiveness. Lack of expected mediation effect could be explained by missing other potential mediators (i.e., relationship with that father, social skills, self-esteem) and lower variability of both predictor and criterion variable due to their low levels on the whole sample and on control subsamples. Results suggested that inaccessibility and/or successfulness of other adaptive and defensive mechanisms for overcoming social disadvantages has a strong impact on the mediation effect of self/efficacy and differentiation of self from poor family functioning to depressive symptoms. Further researches could include other potential mediators and a sample of clinically depressed people.

Keywords: antisocial behavior, mediating effect, moderating effect, natural setting, incarceration

Procedia PDF Downloads 114
4772 Research Trends in Fine Arts Education Dissertations in Turkey

Authors: Suzan Duygu Bedir Erişti

Abstract:

The present study tried to make a general evaluation of the dissertations conducted in the last decade in the field of art education in the Department of Fine Arts Education in the Institutes of Education Sciences in Turkey. In the study, most of the universities which involved an Institute of Education Sciences within their bodies in Turkey were reached. As a result, a total of a hundred dissertations conducted in the departments of Fine Arts Education at several universities (Anadolu, Gazi, Ankara, Marmara, Dokuz Eylul, Ondokuz Mayıs, Selcuk and Necmettin Erbakan) were determined via the open access systems of universities as well as via the Thesis Search System of Higher Education Council. Most of the dissertations were reached via the latter system, and in cases of failure, the dissertations were reached via the former system. Consequently, most of the dissertations which did not have any access restriction and which had appropriate content were reached. The dissertations reached were examined based on document analysis in terms of their research topics, research paradigms, contents, purposes, methodologies, data collection tools, and analysis techniques. The dissertations conducted in institutes of Education Sciences could be said to have demonstrated a development, especially in recent years with respect to their qualities. It was also found that a great majority of the dissertations were carried out at Gazi University and Marmara University and that a similar number of dissertations were conducted in other universities. When all the dissertations were taken into account, in general, they were found to differ a lot in their subject areas. In most of the dissertations, the quantitative paradigm was adopted, while especially in recent years, more importance has been given to methods based on the qualitative paradigm. In addition, most of the dissertations conducted with quantitative paradigm were structured based on the general survey model and experimental research model. In terms of statistical techniques, university-focused approaches were used. In some universities, advanced statistical techniques were applied, while in some other universities, there was a moderate use of statistical techniques. Most of the studies produced results generalizable to the levels of postgraduate education and elementary school education. The studies were generally structured in face-to-face teaching processes, while some of them were designed in environments which did not include results generalizable to the face-to-face education system. In the present study, it was seen that the dissertations conducted in the departments of Fine Arts Education at the Institutes of Education Sciences in Turkey did not involve application-based approaches which included art-based or visual research in terms of either research topic or methodology.

Keywords: fine arts education, dissertations, evaluation of dissertations, research trends in fine arts education

Procedia PDF Downloads 193
4771 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 339
4770 Intonation Salience as an Underframe to Text Intonation Models

Authors: Tatiana Stanchuliak

Abstract:

It is common knowledge that intonation is not laid over a ready text. On the contrary, intonation forms and accompanies the text on the level of its birth in the speaker’s mind. As a result, intonation plays one of the fundamental roles in the process of transferring a thought into external speech. Intonation structure can highlight the semantic significance of textual elements and become a ranging mark in understanding the information structure of the text. Intonation functions by means of prosodic characteristics, one of which is intonation salience, whose function in texts results in making some textual elements more prominent than others. This function of intonation, therefore, performs as organizing. It helps to form the frame of key elements of the text. The study under consideration made an attempt to look into the inner nature of salience and create a sort of a text intonation model. This general goal brought to some more specific intermediate results. First, there were established degrees of salience on the level of the smallest semantic element - intonation group, as well as prosodic means of creating salience, were examined. Second, the most frequent combinations of prosodic means made it possible to distinguish patterns of salience, which then became constituent elements of a text intonation model. Third, the analysis of the predicate structure allowed to divide the whole text into smaller parts, or units, which performed a specific function in the developing of the general communicative intention. It appeared that such units can be found in any text and they have common characteristics of their intonation arrangement. These findings are certainly very important both for the theory of intonation and their practical application.

Keywords: accentuation , inner speech, intention, intonation, intonation functions, models, patterns, predicate, salience, semantics, sentence stress, text

Procedia PDF Downloads 263
4769 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria

Authors: Akachi Odoemene

Abstract:

There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.

Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria

Procedia PDF Downloads 249
4768 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 353
4767 Environmental and Health Risks Associated with Dental Waste Management: A Review

Authors: Y. Y. Babanyara, B. A. Gana, T. Garba, M. A. Batari

Abstract:

Proper management of dental waste is a crucial issue for maintaining human health and the environment. The waste generated in the dental clinics has the potential for spreading infections and causing diseases, so improper disposal of these dental wastes can cause harm to the dentist, the people in immediate vicinity of the dentist, waste handlers, general public and the environment through production of toxins or as by-products of the destruction process. Staff that provide dental healthcare ought to be aware of the proper handling and the system of management of dental waste used by different dental hospitals. The method of investigation adopted in the paper involved a desk study in which documents and records relating to dental waste handling were studied to obtain background information on existing dental waste management in Nigeria other countries of the world are also mentioned as examples. Additionally, information on generation, handling, segregation, risk associated during handling and treatment of dental medical waste were sought in order to determine the best method for safe disposal. This article provides dentists with the information they need to properly dispose of mercury and amalgam waste, and provides suggestions for managing the other wastes that result from the day-to-day activities of a dental office such as: used X-ray fixers and developers; cleaners for X-ray developer systems; lead foils, shields and aprons; chemiclave/chemical sterilant solutions; disinfectants, cleaners, and other chemicals; and, general office waste. Additionally, this study may be beneficial for authorities and researchers of developing countries to work towards improving their present dental waste management system.

Keywords: clinic, dental, disposal, environment, waste management

Procedia PDF Downloads 316
4766 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA

Authors: S. Saju, G. Thirugnanam

Abstract:

In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.

Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet

Procedia PDF Downloads 522
4765 A Collective Intelligence Approach to Safe Artificial General Intelligence

Authors: Craig A. Kaplan

Abstract:

If AGI proves to be a “winner-take-all” scenario where the first company or country to develop AGI dominates, then the first AGI must also be the safest. The safest, and fastest, path to Artificial General Intelligence (AGI) may be to harness the collective intelligence of multiple AI and human agents in an AGI network. This approach has roots in seminal ideas from four of the scientists who founded the field of Artificial Intelligence: Allen Newell, Marvin Minsky, Claude Shannon, and Herbert Simon. Extrapolating key insights from these founders of AI, and combining them with the work of modern researchers, results in a fast and safe path to AGI. The seminal ideas discussed are: 1) Society of Mind (Minsky), 2) Information Theory (Shannon), 3) Problem Solving Theory (Newell & Simon), and 4) Bounded Rationality (Simon). Society of Mind describes a collective intelligence approach that can be used with AI and human agents to create an AGI network. Information theory helps address the critical issue of how an AGI system will increase its intelligence over time. Problem Solving Theory provides a universal framework that AI and human agents can use to communicate efficiently, effectively, and safely. Bounded Rationality helps us better understand not only the capabilities of SuperIntelligent AGI but also how humans can remain relevant in a world where the intelligence of AGI vastly exceeds that of its human creators. Each key idea can be combined with recent work in the fields of Artificial Intelligence, Machine Learning, and Large Language Models to accelerate the development of a working, safe, AGI system.

Keywords: AI Agents, Collective Intelligence, Minsky, Newell, Shannon, Simon, AGI, AGI Safety

Procedia PDF Downloads 83
4764 Investigation of the Effects of Dry Needling With Stretching Upper Trapezius Muscle on Clinical Outcomes in Participants With Active Myofascial Trigger Point.

Authors: Marzieh Yassin, Fereshteh Navaee, Javad Sarrafzadeh, Reza Salehi

Abstract:

Introduction: Myofascial trigger point (MTrP) is one of the most common sources of musculoskeletal pain. Approximately 30-85% of the patients with musculoskeletal pains would experience MTrP in their life. The prevalence of MTrP has reported in the patients seen in a general orthopedic clinic, general medical clinic and specialty pain management centers, 21%, 30% and 93% respectively. Nowadays, dry needling is suggested as a standard treatment for MTrPs. The purpose of the present study was to examine the effectiveness of dry needling with stretching upper trapezius muscle on pain and pain pressure threshold in participants with active myofascial trigger point. Methods: Thirty participants with an active myofascial trigger point of the upper trapezius muscle were randomly divided into two groups: dry needling with passive stretch (n=15) and passive stretch alone (n=15). They received 5 sessions of the treatments for three weeks. The outcomes were pain intensity and pain pressure threshold that were assessed with visual analogue scale and algometer respectively. Results: Significant improvement in pain and pain pressure threshold was observed in both groups (P=0.0001) after the treatment. Also, the results showed a significant difference in measurements between two groups (P<0.05). Conclusion: Dry needling with passive stretch can be more effective on pain and pain pressure threshold than passive stretching alone in short term in participants with active myofascial trigger points.

Keywords: dry needling, myofascial pain syndrome, myofascial trigger point, stretching

Procedia PDF Downloads 62
4763 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances

Authors: Tydra Preyear, Victor Clincy

Abstract:

Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.

Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy

Procedia PDF Downloads 16
4762 Bystanders' Behavior during Emergencies

Authors: Alan (Avi) Kirschenbaum, Carmit Rapaport

Abstract:

The behavior of bystanders in emergencies and disasters have been examined for over 50 years. Such acts have been cited as contributing to saving lives in terms of providing first responder help until official emergency units can arrive. Several reasons have been suggested for this type of behavior but most focused on a broad segment of individual psychological decision-making processes. Recent theoretical evidence suggests that the external factors for such bystander decisions, mainly disaster community based social contexts factors, are also important. We aim to test these competing arguments. Specifically, we examine alternative explanatory perspectives by focusing on self-efficacy as a proxy for the accepted individual psychological case and contrast it with potential bystander characteristics of the individual as well factors as embedded in the social context of the disaster community. To do so, we will utilize a random sampling of the population from a field study of an urban community in Israel that experienced five years of continuous terror attacks. The results strongly suggest that self-efficacy, as well as external factors: preparedness and having skills for intervention during emergencies along with gender best, predict potential helping behaviors. These results broaden our view of bystander behavior and open a window for enhancing this phenomenon as another element in disaster and crisis management.

Keywords: bystander behavior, disasters emergencies, psychological motivation to help, social context for helping

Procedia PDF Downloads 120
4761 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 67
4760 Knowledge, Attitude and Practice Towards the Attendance of Antenatal Care Services at Mukono General Hospital

Authors: Nabaweesi Josephine, Namwanje Regina Germina

Abstract:

Antenatal care is referred to as the totality of care given to pregnant women from conception to delivery from a certified health care setting. A number of 8 contacts is recommended throughout pregnancy, according to WHO, 2016. Antenatal services are free in Uganda courtesy of the government of Uganda, though attendance is still very low, which has continued to cause maternal and infant mortality and morbidity from preventable causes. Early booking has an advantage for proper pregnancy information sharing and pregnancy monitoring. The purpose of this study was to determine pregnant women's knowledge, attitudes, and practices towards attendance of antenatal care at Mukono General Hospital. A sample of 60 pregnant women was used, and a descriptive quantitative design was employed. Data was collected using a structured questionnaire consisting of questions about socio-demographic factors, knowledge, attitude, and practice, and this was affected using the structured interview method. Pregnant women had good practice at 90.2%, a positive attitude of 94.6%, and slightly less knowledge of 66.7%. Only 12% were knowledgeable about the number of antenatal care visits recommended, 45% had knowledge about when to initiate first antenatal care visit, and 79% had a positive attitude towards the early booking. We recommend that pregnant women are given all the necessary information regarding antenatal care with special emphasis on the recommended number of visits and when to initiate their first visit and encourage early booking in order to achieve the 8 contacts WHO policy for antenatal care since when we increase knowledge, we increase antenatal care utilization according to Anderson's behavioral model.

Keywords: ANC- antenatal care, contacts, mortality, morbidity

Procedia PDF Downloads 103
4759 Becoming Multilingual’: Empowering College Students to Learn and Maintain Languages for Life

Authors: Peter Ecke

Abstract:

This research presents insights from a questionnaire study and autobiographic narrative analyses about the language and cultural backgrounds, challenges, interests, and needs, as well as perceptions about bilingualism and language learning of undergraduate students at a Public University in the southwestern United States. Participants were 650 students, enrolled in college-level general education courses, entitled “Becoming multilingual: Learning and maintaining two or more languages” between 2020 and 2024. Data were collected via pre- and post-course questionnaires administered online through the Qualtrix XM platform and complemented with analyses of excerpts from autobiographical narratives that students produced as part of the course assignments. Findings, for example, show that course participants have diverse linguistic backgrounds. The five most frequently reported L1s were English (about 50% of course participants), Spanish, Arabic, Mandarin, and Korean (in that order). The five most frequently reported L2s were English, Spanish, French, ASL, Japanese, German, and Mandarin (in that order). Participants also reported on their L2, L3, L4, and L5 if applicable. Most participants (over 60%) rated themselves bilingual or multilingual whereas 40% considered themselves to be monolingual or foreign language learners. Only about half of the participants reported feeling very or somewhat comfortable with their language skills, but these reports changed somewhat from the pre- to the post-course survey. About half of participants were mostly interested in learning how to effectively learn a foreign language. The other half of participants reported being most curious about learning about themselves as bi/multilinguals, (re)learning a language used in childhood, learning how to bring up a child as a bi/multilingual or learning about people who speak multiple languages (distributed about evenly). Participants’ comments about advantages and disadvantages of being bilingual remained relatively stable but their agreement with common myths about bilingualism and language learning changed from the pre- to the post-course survey. Students’ reflections in the autobiographical narratives and comments in (institutionally administered) anonymous course evaluations provided additional data on students’ concerns about their current language skills and uses as well as their perceptions about learning outcomes and the usefulness of the general education course for their current and future lives. It is hoped that the presented findings and discussion will spark interest among colleagues in offering similar courses as a resource for college students (and possibly other audiences), including those from migrant, indigenous, multilingual, and multicultural communities to contribute to a more harmonious bilingualism and well-being of college students who are or inspire to become bi-or multilingual.

Keywords: autobiographic narratives, general education university course, harmonious bilingualism and well-being, multilingualism, questionnaire study

Procedia PDF Downloads 42
4758 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 115
4757 Ozonation as an Effective Method to Remove Pharmaceuticals from Biologically Treated Wastewater of Different Origin

Authors: Agne Jucyte Cicine, Vytautas Abromaitis, Zita Rasuole Gasiunaite, Mindaugas Zilius

Abstract:

Pharmaceutical pollution in aquatic environments has become a growing concern. Various active pharmaceutical ingredient (API) residues: hormones, antibiotics, or/and psychiatric drugs, have already been discovered in different environmental compartments. Due to ineffective wastewater treatment technologies, an underestimated amount of APIs can enter the ecosystem by discharged treated wastewater. Especially, psychiatric compounds, such as carbamazepine (CBZ) and venlafaxine (VNX), persist in effluent even post-treatment. Therefore, these pharmaceuticals usually exceed safe environmental levels and pose risks to the aquatic environment, particularly, to sensitive ecosystems such as the Baltic Sea. CBZ, known for its chemical stability and long biodegradation time, accumulates in the environment, threatening aquatic life and human health through the food chain. As the use of medication rises, there is an urgent need for advanced wastewater treatment to reduce pharmaceutical contamination and meet future regulatory requirements. In this study, we tested advanced oxidation technology using ozone to remove two commonly used psychiatric drugs, carbamazepine, and venlafaxine, from biologically treated wastewater effluent. Additionally, general water quality parameters (SPM, DOC, COD) and bacterial contamination were analyzed. Three wastewater treatment plants (WWTPs) were selected to represent varying dominant anthropogenic activities: 1) resort, 2) resort and residential, and 3) residential, industrial, and resort. Wastewater samples for the experiment were collected during the summer season after mechanical and biological treatment and ozonated for 5, 10, and 15 minutes. Pharmaceutical levels in this study exceeded the predicted no-effect concentration (PNEC) of 500 and 90 ng L−1, for CBZ and VNX, respectively in all WWTPs, except CBZ in WWTP 1. Initial CBZ contamination was found to be lower in WWTP 1 (427.4 ng L-1), compared with WWTP 2 (1266.5 ng L-1) and 3 (119.2 ng L-1). VNX followed a similar trend with concentrations of 341.2 ng L-1, 361.4 ng L-1, and 390.0 ng L-1, respectively, for WWTPs 1, 2, and 3. It was determined that CBZ was not detected in the effluent after 5 minutes of ozonation in any of the WWTPs. Contrarily, VNX, was still detected after 5, 10, and 15 minutes of treatment with ozone, however under the limits of quantification (LOD) (<5ng L-1). Additionally, general pollution of SPM, DOC, COD, and bacterial contamination was reduced notably after 5 minutes of treatment with ozone. Although initial pharmaceutical levels exceeded PNECs, indicating ongoing environmental risks, ozonation demonstrated high efficiency in reducing pharmaceutical and general contamination in wastewater with different pollution matrices.

Keywords: Baltic Sea, ozonation, pharmaceuticals, wastewater treatment plants.

Procedia PDF Downloads 17
4756 Action Research through Drama in Education on Adolescents’ Career Self-Efficacy and Decision-Making Skills Development

Authors: Christina Zourna, Ioanna Papavassiliou-Alexiou

Abstract:

The purpose of this multi-phased action research PhD study in Greece was to investigate if and how Drama in Education (DiE) – used as an innovative group counselling method – may have positive effects on secondary education students’career self-efficacy and career decision-making skills development. Using both quantitative and qualitative research tools, high quality data were gathered at various stages of the research and were analysed through multivariate methods and open-source computer aided data analysis software such as R Studio, QualCoder, and SPSS packages. After a five-month-long educational intervention based on DiE method, it was found that 9th, 10th, and 11th gradersameliorated their self-efficacy and learned the process of making an informed career decision – through targeted information gathering about themselves and possible study paths – thus, developing career problem-solving and career management skills. Gender differences were non statistically important, while differences in grades showed a minor influence on some of the measured factorssuch as general career indecisiveness and self-evaluation. Students in the 11th grade scored significantly higher than younger students in the career self-efficacy scale and have stronger faith in their abilities e.g., choosing general over vocational school and major study orientation. The study has shown that DiE can be effective in group career guidance, especially concerning the pillars of self-awareness, self-efficacy, and career decision-making processes.

Keywords: career decision-making skills, career self-efficacy, CDDQ scale, CDMSE-SF scale, drama in education method

Procedia PDF Downloads 117
4755 The Concept of the Family and Its Principles from the Perspective of International Human Rights Instruments

Authors: Mahya Saffarinia

Abstract:

The family has existed as a natural unit of human relations from the beginning of creation and life of human society until now and has been the core of the relationship between women, men, and children. However, in the field of human relations, the definition of family, related rights and duties, principles governing the family, the impact of the family on other individual or social phenomena and various other areas have changed over time, especially in recent decades, and the subject has now become one of the important categories of studies including interdisciplinary studies. It is difficult to provide an accurate and comprehensive definition of the family, and in the context of different cultures, customs, and legal systems, different definitions of family are presented. The meaning of legal principles governing the family is the general rules of law that determine the organization of different dimensions of the family, and dozens of partial rules are inferred from it or defined in the light of these general rules. How each of these principles was formed has left its own detailed history. In international human rights standards, which have been gradually developed over the past 72 years, numerous data can be found that in some way represent a rule in the field of family law or provide an interpretation of existing international rules which also address obligations of governments in the field of family. Based on a descriptive-analytical method and by examining human rights instruments, the present study seeks to explain the effective elements in defining and the principles governing the family. This article makes it clear that international instruments do not provide a clear definition of the family and that governments are empowered to define the family in terms of the cultural context of their community. But at the same time, it has been stipulated that governments do not have the exclusive authority to provide this definition, and certain principles should be considered as essential elements. Also, 7 principles have been identified as general legal rules governing all international human rights instruments related to the family, such as the principle of voluntary family formation and the prohibition of forced marriage, and the principle of respecting human dignity for all family members. Each of these 7 principles has led to different debates, and the acceptance or non-acceptance of each of them has different consequences in the rights and duties related to the family and the relations between its members and even the family's interactions with others and society. One of the consequences of the validity of these principles in family-related human rights standards is that many of the existing legal systems of countries in some cases need to be amended and their regulations revised, and some established cultural traditions in societies that are considered inhumane in terms of these principles need to be modified and changed. Of course, this process of governing the principles derived from human rights standards over the family also has vulnerabilities and misinterpretations that should not be neglected.

Keywords: family, human rights, international instruments, principles

Procedia PDF Downloads 174
4754 Single Mothers by Choice at Corona Time - The Perception of Social Support, Happiness and Work-Family Conflict and their Effect on State Anxiety

Authors: Orit Shamir Balderman, Shamir Michal

Abstract:

Israel often deals with crisis situations, but most have been characterized as security crises (e.g., war). This is the first time that the Israel has dealt with a health and social emergency as part of a global crisis. The crisis began in January 2020 with the emergence of the novel coronavirus (Covid-19), which was defined as a pandemic (World Health Organization, 2020) and arrived in Israel in early March 2020. This study examined how single mothers by choice (SMBC) experience state anxiety (SA), social support, work–family conflict (WFC), and happiness. This group has not been studied in the context of crises in general or a global crisis. Using a snowball sample, 386 SMBCanswered an online questionnaire. The findings show a negative relationship between income and level of state anxiety. State anxiety was also negatively associated with social support, level of happiness, and WFC. Finally, a stepwise regression analysis indicated that happiness explained 34% of the variance in SA. We also found that most of the women did not turn to formal support agencies such as social workers, other Government Ministries, or municipal welfare. A positive and strong correlations was also found between SA and WFC. The findings of the study reinforce the understanding that although these women made a conscious and informed decision regarding the choice of their family cell, their situation is more complex in the absence of a spouse support. Therefore, this study, as other future studies in the field of SMBC, may contribute to the improvement of their social status and the understanding that they are a unique group. Although SMBC are a growing sector of society in the past few years, there are still special needs and special attention that is needed from the formal and informal supports systems. A comparative study of these two groups and in different countries would shed light on SA among mothers in general, regardless of their relationship status and location.Researchers should expand this study by comparing mothers in relationships and exploring how SMBC coped in other countries. In summary, the findings of the study contribute knowledge on three levels: (a) knowledge about SMBC in general and during crisis situations; (b) examination of social support using tools assessing receipt of assistance and support, some of which were developed for the present study; and (c) insights regarding counseling, accompaniment, and guidance of welfare mechanisms.

Keywords: single mothers by choice, state anxiety, social support, happiness, work–family conflict

Procedia PDF Downloads 84
4753 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions

Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li

Abstract:

The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.

Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA

Procedia PDF Downloads 56
4752 Comparative Study between Two Methods for Extracting Pomegranate Juice and Their Effect on Product Quality

Authors: Amani Aljahani

Abstract:

The purpose of the study was to identify the physical and chemical properties of pomegranate juices and to evaluate their sensory quality. The samples were collected from the local markets and included four types of pomegranate produced in the western and southern region of the kingdom. The juices were extracted by manual squeezing and by centrifugal force. The juices were analyzed periodically for their content of organic acids, total acidity, glucose and fructose, total sugars, and the anthosianine. A panel of 30 judges evaluated the juices for their color, smell, taste, consistency and general acceptance using a prepared scale for that purpose. Result showed that pomegranate juices were acidic in nature (PH between 3.56–4.27). The major organic acids were citric, tartaric, malic, and oxalic aids total organic acidity was between 596.32–763.49 ng/100 ml and increased over storage time, however; total acidity almost stable over time except for the southern produced. The major monosaccharide's in pomegranate juices were glucose and fructose. Their concentration in the juice varied by storage. On the average glucose concentration was between 6.68–7.71 g/100 ml while fructose concentration was between 6.72–7.98 g/100 ml. total sugars content was 16% on the average and dropped by storage. Anthosianine concertration increased after five hours of storage then dropped and stabilized over time regardless of method of treatment. In addition, sensory evaluation of the juices showed general acceptance of them as of color, flavor, and constercy but the preferred one was with that of the western kind extracted by squeezing.

Keywords: extracting, pomegranate, juice, quality

Procedia PDF Downloads 348
4751 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 368
4750 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 159
4749 Method to Find a ε-Optimal Control of Stochastic Differential Equation Driven by a Brownian Motion

Authors: Francys Souza, Alberto Ohashi, Dorival Leao

Abstract:

We present a general solution for finding the ε-optimal controls for non-Markovian stochastic systems as stochastic differential equations driven by Brownian motion, which is a problem recognized as a difficult solution. The contribution appears in the development of mathematical tools to deal with modeling and control of non-Markovian systems, whose applicability in different areas is well known. The methodology used consists to discretize the problem through a random discretization. In this way, we transform an infinite dimensional problem in a finite dimensional, thereafter we use measurable selection arguments, to find a control on an explicit form for the discretized problem. Then, we prove the control found for the discretized problem is a ε-optimal control for the original problem. Our theory provides a concrete description of a rather general class, among the principals, we can highlight financial problems such as portfolio control, hedging, super-hedging, pairs-trading and others. Therefore, our main contribution is the development of a tool to explicitly the ε-optimal control for non-Markovian stochastic systems. The pathwise analysis was made through a random discretization jointly with measurable selection arguments, has provided us with a structure to transform an infinite dimensional problem into a finite dimensional. The theory is applied to stochastic control problems based on path-dependent stochastic differential equations, where both drift and diffusion components are controlled. We are able to explicitly show optimal control with our method.

Keywords: dynamic programming equation, optimal control, stochastic control, stochastic differential equation

Procedia PDF Downloads 183
4748 Incidence of Idiopathic Inflammatory Myopathies and Their Risk of Cancer in Leeds, UK: An 11-year Epidemiological Study

Authors: Benoit Jauniaux, Azzam Ismail

Abstract:

Objectives: The aims were to identify all incident adult cases of idiopathic inflammatory myopathies (IIMs) in the City of Leeds, UK, and to estimate the risk of cancer in IIMs as compared with the general population. Methods: Cases of IIMs were ascertained by review of all muscle biopsy reports from the Neuropathology Laboratory. A review of medical records was undertaken for each case to review the clinical diagnosis and collect epidemiological data such as age, ethnicity, sex, and comorbidities, including cancer. Leeds denominator population numbers were publicly obtainable. Results: Two hundred and six biopsy reports were identified, and after review, 50 incident cases were included in the study between June 2010 and January 2021. Out of the 50 cases, 27 were male, and 23 were female. The mean incidence rate of IIMs in Leeds throughout the study period was 7.42/1 000 000 person years. The proportion of IIMs cases with a confirmed malignancy was 22%. Compared to the general population, the relative risk of cancer was significantly greater in the IIMs population(31.56, P < 0.01). Conclusions: The incidence rate of IIMs in Leeds was consistent with data from previous literature, however, disagreement exists between different methods of IIMs case inclusion due to varying clinical criteria and definitions. IIMs are associated with increased risk of cancer however, the pathogenesis of this relationship still requires investigating. This study supports the practice of malignancy screening and long-term surveillance in patients with IIMs.

Keywords: idiopathic inflammatory myopathies, myositis, polymyositis, dermatomyositis, malignancy, epidemiology, incidence rate, relative risk

Procedia PDF Downloads 169
4747 Other Cancers in Patients With Head and Neck Cancer

Authors: Kim Kennedy, Daren Gibson, Stephanie Flukes, Chandra Diwakarla, Lisa Spalding, Leanne Pilkington, Andrew Redfern

Abstract:

Introduction: Head and neck cancers (HNC) are often associated with the development of non-HNC primaries, as the risk factors that predispose patients to HNC are often risk factors for other cancers. Aim: We sought to evaluate whether there was an increased risk of smoking and alcohol-related cancers and also other cancers in HNC patients and to evaluate whether there is a difference between the rates of non-HNC primaries in Aboriginal compared with non-Aboriginal HNC patients. Methods: We performed a retrospective cohort analysis of 320 HNC patients from a single center in Western Australia, identifying 80 Aboriginal and 240 non-Aboriginal patients matched on a 1:3 ratio by sites, histology, rurality, and age. We collected data on the patient characteristics, tumour features, treatments, outcomes, and past and subsequent HNCs and non-HNC primaries. Results: In the overall study population, there were 86 patients (26.9%) with a metachronous or synchronous non-HNC primary. Non-HNC primaries were actually significantly more common in the non-Aboriginal population compared with the Aboriginal population (30% vs. 17.5%, p=0.02); however, half of these were patients with cutaneous squamous or basal cell carcinomas (cSCC/BCC) only. When cSCC/BCCs were excluded, non-Aboriginal patients had a similar rate as Aboriginal patients (16.7% vs. 15%, p=0.73). There were clearly more cSCC/BCCs in non-Aboriginal patients compared with Aboriginal patients (16.7% vs. 2.5%, p=0.001) and more patients with melanoma (2.5% vs. 0%, p value not significant (p=NS). Rates of most cancers were similar between non-Aboriginal and Aboriginal patients, including prostate (2.9% vs. 3.8%), colorectal (2.9% vs. 2.5%), kidney (1.2% vs. 1.2%), and these rates appeared comparable to Australian Age Standardised Incidence Rates (ASIR) in the general community. Oesophageal cancer occurred at double the rate in Aboriginal patients (3.8%) compared with non-Aboriginal patients (1.7%), which was far in excess of ASIRs which estimated a lifetime risk of 0.59% in the general population. Interestingly lung cancer rates did not appear to be significantly increased in our cohort, with 2.5% of Aboriginal patients and 3.3% of non-Aboriginal patients having lung cancer, which is in line with ASIRs which estimates a lifetime risk of 5% (by age 85yo). Interestingly the rate of Glioma in the non-Aboriginal population was higher than the ASIR, with 0.8% of non-Aboriginal patients developing Glioma, with Australian averages predicting a 0.6% lifetime risk in the general population. As these are small numbers, this finding may well be due to chance. Unsurprisingly, second HNCs occurred at an increased incidence in our cohort, in 12.5% of Aboriginal patients and 11.2% of non-Aboriginal patients, compared to an ASIR of 17 cases per 100,000 persons, estimating a lifetime risk of 1.70%. Conclusions: Overall, 26.9% of patients had a non-HNC primary. When cSCC/BCCs were excluded, Aboriginal and non-Aboriginal patients had similar rates of non-HNC primaries, although non-Aboriginal patients had a significantly higher rate of cSCC/BCCs. Aboriginal patients had double the rate of oesophageal primaries; however, this was not statistically significant, possibly due to small case numbers.

Keywords: head and neck cancer, synchronous and metachronous primaries, other primaries, Aboriginal

Procedia PDF Downloads 71
4746 The Prevalence of Symptoms of Common Mental Disorders Among Professional Golfers

Authors: Georgia Hopley, Andrew Murray, Alan Macpherson

Abstract:

Objectives: This study aims to (i) assess the prevalence of symptoms of mental health disorders among a cohort of professional golfers, (ii) compare prevalence values with data from the general population and other elite athlete cohorts, and (iii) assess how players cope with mental health problems and players’ opinions on the mental health support services available to them. Methods: Players competing on the 2020 Challenge Tour (n=261) were sent a questionnaire that assessed symptoms of depression, distress, anxiety, sleep disturbance, and obsessive-compulsive disorder. Questions were also included to assess coping behaviors and opinions on current support measures. Results: The two-week symptom prevalence was 10.3% for depression, 51.7% for distress, 8.6% for anxiety, 10.3% for sleep disturbance, 13.8% for obsessive thoughts, and 27.6% for compulsive behavior. The prevalence of symptoms is comparable with other elite athlete cohorts, and symptoms of anxiety and distress were reported more frequently than in the general population. 67% of players who had experienced a mental health issue did not seek professional help at the time, and 61% of players did not think sufficient support was available to them. Conclusion: Mental health problems are prevalent among elite golfers; however, this study demonstrates that the majority of players do not seek help from professionally accredited practitioners. Following the discussion of this study, the European Tour Group now provides a 24/7 mental health crisis hotline for players and has educated staff members on how to identify players with mental health issues and signpost them to the appropriate support.

Keywords: elite athletes, golf, mental health, sport science, sport psychiatry

Procedia PDF Downloads 57
4745 Pragmatic Competence in Pakistani English Language Learners

Authors: Ghazala Kausar

Abstract:

This study investigates Pakistani first year university students’ perception of the role of pragmatics in their general approach to learning English. The research is triggered by National Curriculum’s initiative to provide holistic opportunities to the students for language development and to equip them with competencies to use English language in academic and social contexts (New English National Curriculum for I-XII). The traditional grammar translation and examination oriented method is believed to reduce learners to silent listener (Zhang, 2008: Zhao 2009). This lead to the inability of the students to interpret discourse by relating utterances to their meaning, understanding the intentions of the users and how language is used in specific setting (Bachman & Palmer, 1996, 2010). Pragmatic competence is a neglected area as far as teaching and learning English in Pakistan is concerned. This study focuses on the different types of pragmatic knowledge, learners perception of such knowledge and learning strategies employed by different learners to process the learning in general and pragmatic in particular. This study employed three data collecting tools; a questionnaire, discourse completion task and interviews to elicit data from first year university students regarding their perception of pragmatic competence. Results showed that Pakistani first year university learners have limited pragmatic knowledge. Although they acknowledged the importance of linguistic knowledge for linguistic competence in the students but argued that insufficient English proficiency, limited knowledge of pragmatics, insufficient language material and tasks were major reasons of pragmatic failure.

Keywords: pragmatic competence, Pakistani college learners, linguistic competence

Procedia PDF Downloads 732
4744 Impact of Self-Concept on Performance and Mental Wellbeing of Preservice Teachers

Authors: José María Agugusto-landa, Inmaculada García-Martínez, Lara Checa Domene, Óscar Gavín Chocano

Abstract:

Self-concept is the perception that a person has of himself, of his abilities, skills, traits, and values. Self-concept is composed of different dimensions, such as academic self-concept, physical self-concept, social self-concept, emotional self-concept, and family self-concept. The relationship between the dimensions of self-concept and mental health and academic performance among future teachers is a topic of interest for educational psychology. Some studies have found that: (i) There is a positive relationship between general self-concept, academic self-concept and academic performance, that is, students who have a more positive image of themselves tend to get better grades and be more motivated to learn. (ii) There is a positive relationship between emotional intelligence, physical self-concept and healthy habits, that is, students who regulate and understand their emotions better have a higher satisfaction with their physical appearance and follow a more balanced diet and a higher physical activity. As for gender differences in the dimensions of self-concept among future teachers, some studies have found that: (i) Girls tend to have a higher self-concept in the social, family and verbal dimensions, that is, they perceive themselves as more capable of relating to others, communicating effectively and receiving support from their family. (ii) Boys tend to have a higher self-concept in the physical, emotional and mathematical dimensions, that is, they perceive themselves as more capable of performing physical activities, controlling their emotions and solving mathematical problems. (iii) There are no significant differences between general self-concept and academic self-concept according to gender, that is, both girls and boys have a similar perception of their global worth and academic competence.

Keywords: preservice teachers, self-concept, academic performance, mental wellbeing

Procedia PDF Downloads 75