Search results for: physical security
7719 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security
Authors: Irfan U. Din
Abstract:
The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)
Procedia PDF Downloads 2907718 Influence of Psychosocial Factors on Physical Activity Level among Individuals with Asthma
Authors: Awotidebe Taofeek, Oyinsuyi Oluwafunmbi
Abstract:
Psychosocial factors play a significant role in physical activity participation in diseased conditions and the general population. However, little is known about the role of exercise self-efficacy (ESE), exercise perceived barriers (EPB), and social support (SOS) in patients with asthma. This study investigated the influence of psychosocial factors on physical activity participation in patients with asthma in ile-ife. This cross-sectional study involved 130 patients with asthma. They were recruited from the Chest Clinic of the Obafemi Awolowo University Teaching Hospitals Complex, Ile-ife using purposive sampling technique. Ethical approval was obtained from the Ethics and Research Committee of the Obafemi Awolowo University Teaching Hospitals Complex, Ile-ife, Nigeria. Socio-demographic characteristics of respondents were recorded. Information on ESE, EPB, and SOS were obtained using Exercise Self-Efficacy, Exercise Benefit, and Barrier and Medical Outcome Social Support Scales respectively. Physical activity level was assessed in the last 7 days using international physical activity questionnaire. Descriptive and inferential statistics were used to analyze the data. Alpha level was set at p<0.5. The mean age of the respondents was 25.15 ± 9.38, and a majority, 110 (84.60%), engaged in low physical activity, 69(53%) had low exercise self-efficacy. However, less than two-third 80 (62.20%) reported high social support, with the majority of 95 (73.10%) reported high exercise perceived barriers. The means of ESE for male and femalerespondents were 29.01 ± 20.62 and 24.35 ± 17.36, respectively. The means of SOS formale and female respondents were 49.52 ± 22.22 and 61.87 ± 22.66, respectively. Themeans of EPB for male and female respondents were 53.37 ± 10.23 and 57.43 ± 9.65, respectively. The respondents were comparable in exercise self-efficacy and physicalactivity level (p>0.05). However, there were significant differences in social support (t=-2.791; p=0.006) and exercise perceived barriers (t=-2.108, p=0.037).Theresultsshowthattherewasasignificantrelationshipbetweenexerciseperceivedbarriersandlowphysicalactivitylevel(r=-0.216;p=0.023).TherewasasignificantassociationbetweenExerciseself-efficacyandmarried individuals(OR=0.967;95%CI=0.936-0.998;p= 0.037). Similarly, However,thereweresignificantassociationsbetweensocialsupport Andagegroup35-54years(OR=1.036;95%CI=1.007-1.067;p=0.014),females(OR= 1.024;95%CI=1.006;p=0.009)andmarriedindividuals(OR=1.049;95%CI=1.020-1.079. p=0.001).Therewasasignificantassociationbetweenexerciseperceivedbarriersand females(OR=1.043;95%CI=1.002-1.085;p=0.040).However, thereweresignificant associationsbetweenexerciseperceivedbarriersandoccupationgroup;civilservants (OR=1.092;95%CI=1.009-1.182;p=0.028),retiree(OR=1.092;95%CI=1.040-1.469;p= 0.016)andstudents(OR=1.110;95%CI=1.040;p=0.002). Inconclusion,agreaterpercentageofpatientswithasthmahadlowphysicalactivityleveland it was associatedwithhighexerciseperceivedbarriers,whileexerciseself-efficacyandsocialsupportwerenot.Keywords: asthma, psychosocial factors, physical activity, physical fitness
Procedia PDF Downloads 1257717 Domestic Violence, Well-Being and Women's Inclusion: Evidence from Northern Ireland
Authors: Jessica Leigh Doyle
Abstract:
In recent years there has been increasing academic and policy interest in domestic violence (DV) and in the implications of DV for the physical and psychological well-being of those who experience it. Yet, despite this interest, very few detailed empirical explorations of these issues have been conducted to date. Of the detailed empirical work that does exist, most studies have focused narrowly on physical violence and the impact of physical violence on rates of depression, post-traumatic stress disorder (PTSD) and substance use. This has often been to the exclusion of wider experiences of DV in relation to psychological, sexual and financial abuse, and of broader victim self-perceptions of psychological well-being that include self-esteem, social participation and quality of life as core components. This paper contributes towards filling this gap by examining these issues on the basis of comprehensive empirical evidence from the Northern Ireland context. Using qualitative methods, the paper presents the findings from 63 semi-structured interviews with women victims of DV from across Northern Ireland. The findings discuss the varied types of violence (physical, psychological, sexual, and financial) that women experience, how these experiences shape their broad physical and psychological well-being and capacity to live active and fulfilling lives and the processes of recovery from IPV. The implications of these findings for research and policy are then discussed.Keywords: domestic violence, gender equality, intimate partner violence, violence against women, well-being
Procedia PDF Downloads 2847716 Victimization in Schizophrenia: A Cross-Sectional Prospective Study
Authors: Mehmet Budak, Mehmet Fatih Ustundag
Abstract:
Objectives: In this research, we studied the extent of exposure to physical violence and committing violence in patients diagnosed with schizophrenia in comparison to a control group consisting of patients with psychiatric diseases other than psychotic and mood disorders. Method: Between August 2019 and October 2019, a total of 100 hospitalized patients diagnosed with schizophrenia (clinically in remission, Brief Psychiatric Rate Scale < 30) were sequentially studied while undergoing inpatient treatment at Erenkoy Mental Health Training and Research Hospital. From the outpatient clinic, 50 patients with psychiatric disorders other than psychotic disorders or mood disorders were consecutively included as a control group. All participants were evaluated by the sociodemographic data that also questions the history of violence, physical examination, bilateral comparative hand, and forearm anterior-posterior and lateral radiography. Results: While 59% of patients with schizophrenia and 28% of the control group stated that they were exposed to physical violence at least once in a lifetime (p < 0,001); a defensive wound or fracture was detected in 29% of patients with schizophrenia and 2% of the control group (p < 0.001). On the other hand, 61% of patients diagnosed with schizophrenia, and 32% of the control group expressed that they committed physical violence at least once in a lifetime (p: 0.001). A self-destructive wound or fracture was detected in 53% of the patients with schizophrenia and 24% of the control group (p: 0,001). In the schizophrenia group, the rate of committing physical violence is higher in those with substance use compared to those without substance use (p:0.049). Also, wounds and bone fractures (boxer’s fracture) resulting from self-injury are more common in schizophrenia patients with substance use (p:0,002). In the schizophrenia group, defensive wounds and parry fractures (which are located in the hand, forearm, and arm usually occur as a result of a trial to shield the face against an aggressive attack and are known to be the indicators of interpersonal violence) are higher in those with substance use compared to those who do not (p:0,007). Conclusion: This study shows that exposure to physical violence and the rate of violence is higher in patients with schizophrenia compared to the control group. It is observed that schizophrenia patients who are stigmatized as being aggressive are more exposed to violence. Substance use in schizophrenia patients increases both exposure to physical violence and the use of physical violence. Physical examination and anamnesis that question violence are important tools to reveal the exposure to violence in patients. Furthermore, some specific bone fractures and wounds could be used to detect victimization even after plenty of time passes.Keywords: fracture, physical violence, schizophrenia, substance use
Procedia PDF Downloads 1697715 Counter-Terrorism and Civil Society in Nigeria
Authors: Emeka Thaddues Njoku
Abstract:
Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.Keywords: counter-terrorism, civil society organizations, freedom, terrorism
Procedia PDF Downloads 3917714 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2807713 The Comparison of Movement and Physical Fitness in Secondary Male Students in Altitude and Coastal Areas
Authors: Esmaeil Zabihi, Seyed Hossein Alavi
Abstract:
The purpose of this study is a comparison of movement and physical fitness in athlete's male students in altitude and sea-level. The samples consist of 450 subjects in altitude and sea-level in Iran in years of 2013 which were selected randomly from the population. We investigated the effect of high altitude on the tests activity profile of youth high altitude and sea level residents. Methods 450 Sea Level (Mahmood Abad) and 450 Altitude-resident (Shahre-Kord) athlete students tests of physical fitness near sea level (-5 m) and in Altitude (2100 m). This study is Descriptive Research (causal-comparative research). The tests of physical fitness include pull-ups test, sit-ups test, agility test(4 9), 45 sprint test, 1600 m running, long jump, and flexibility test. For determining of different between the physical fitness of altitude and sea-level students was used t-test (P ≤ 0.05). The result of this study show that there is no significant difference between the average of pull-ups test, flexibility, 45 sprints, and agility (4 9) test of students in sea-level and altitude. But there is a significant difference between the average of sit-ups, 1600 m running and long jump in altitude. The students of altitude have higher power rather than sea-level. But the students of sea-level have stronger abdominal muscles and cardio-respiratory endurance rather than altitude. High altitude reduces the distance covered by youth athlete students during tests. Neither acclimatisation nor lifelong residence at high altitude protects against detrimental effects of altitude on tests activity profile.Keywords: physical fitness, sea level, altitude areas, AAHPERD test
Procedia PDF Downloads 4387712 The Visually Impaired Jogger: Enhancing Interaction and Fitness through the Fun Run
Authors: Zasha Romero, Joe Paschall
Abstract:
This poster will detail the importance of physical activity for the Visually Impaired students and how to promote inclusion in fitness through way of social gatherings and jogging. Furthermore, it will demonstrate how a Health & Kinesiology University Club cooperated in the journey of visually impaired students from participating in physical activity to completing their first 10K fun run. Purpose: The poster will detail how a university’s Health & Kinesiology Club developed a program to promote participation in fitness activities for visually impaired individuals. Also, it will detail their journey from participation in physical activity to completing a 10K fun run. Methods: In an effort to promote inclusion of all into physical activity, a university’s Health & Kinesiology Club developed a non-profit program to challenge visually impaired students to train and complete a 10 kilometer fun run in a South Texas town. The idea was to promote physical fitness through way of social interaction. In order to maintain runners interested, Club students developed training plans and strategies to be able to navigate in a race that was attended by over 18,000 runners. The idea was to promote interaction and life-long fitness amongst participants. Implications: This strategy was done in collaboration with different non-profit institutions to create awareness and provide opportunities for physical fitness, social interaction and life-long fitness skills associated with the jogging. The workshop provided collaboration amongst different entities and novel ideas to create opportunities for a typically underserved population.Keywords: inclusion, participation, management, disability, fitness
Procedia PDF Downloads 3947711 Climate Change and Food Security: The Legal Aspects with Special Focus on the European Union
Authors: M. Adamczak-Retecka, O. Hołub-Śniadach
Abstract:
Dangerous of climate change is now global problem and as such has a strategic priority also for the European Union. Europe and European citizens try to do their best to cut greenhouse gas emissions, moreover they substantially encourage other nations and regions to follow the same way. The European Commission and a number of Member States have developed adaptation strategies in order to help strengthen EU's resilience to the inevitable impacts of climate change. The EU has long been a driving force in international negotiations on climate change and was instrumental in the development of the UN Framework Convention on Climate Change. As the world's leading donor of development aid, the EU also provides substantial funding to help developing countries tackle climate change problem. Global warming influences human health, biodiversity, ecosystems but also many social and economic sectors. The aim of this paper is to focus on impact of claimant change on for food security. Food security challenges are directly related to globalization, climate change. It means that current and future food policy is exposed to all cross-cutting and that must be linked with environmental and climate targets, which supposed to be achieved. In the 7th EAP —The new general Union Environment Action Program to 2020, called “Living well, within the limits of our planet” EU has agreed to step up its efforts to protect natural capital, stimulate resource efficient, low carbon growth and innovation, and safeguard people’s health and wellbeing– while respecting the Earth’s natural limits.Keywords: climate change, food security, sustainable food consumption, climate governance
Procedia PDF Downloads 1797710 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium
Authors: Louise Reyntjens
Abstract:
In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law
Procedia PDF Downloads 1257709 An Efficient Encryption Scheme Using DWT and Arnold Transforms
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption
Procedia PDF Downloads 4827708 The Conceptualization of the Term “Feeling Stressed” Among Polyvalent Nursing Students at ISPITS of Rabat-Morocco
Authors: Ktiri Fouad
Abstract:
Objectives: The present study examined how the polyvalent nursing students of the Higher Institute of Nursing Professions and Health Techniques (ISPITS-Rabat-Morocco) conceived the term "feeling stressed.” We checked whether they were referring to a specific type of sensation (emotional, mental, physical) or both or all of them when they said they were stressed at the time they felt it. Materials and methods: A quantitative cross-sectional study was conducted among students of the three years of polyvalent nursing courses. Using a 7-Likert scale, the students were asked to assess their states of stress and the emotional, mental and physical sensations they were experiencing before and after carrying out a mental arithmetic task. An ordinal logistic regression method was used to investigate the association between the states of stress and the 3 types of sensations. Results: 222 polyvalent nursing students out of 307 were included in the experience. Their increased perceived states of stress after carrying out the mental task were found to be significantly associated with emotional distress and mental fatigue and not with physical tiredness. The mental sensation (mental fatigue) was found to have more effects in predicting the likelihood of feeling stressed. In addition, the lower the intensity of emotional or mental sensation, the more likely the students were to experience stress, given that one of both sensations is held constant, whatever the intensity of the physical sensation. We conclude that the polyvalent nursing students refer to mental fatigue and emotional distress and not to physical tiredness when they say they felt stressed, the mental fatigue having more effects. The implications of the study are discussed.Keywords: feeling stressed”, emotional sensation, mental sensation, physical sensation
Procedia PDF Downloads 827707 The Uniting Control Lyapunov Functions in Permanent Magnet Synchronous Linear Motor
Authors: Yi-Fei Yang, Nai-Bao He, Shao-Bang Xing
Abstract:
This study investigates the permanent magnet synchronous linear motor (PMSLM) chaotic motion under the specific physical parameters, the stability and the security of motor-driven system will be unavoidably influenced. Therefore, it is really necessary to investigate the methods of controlling or suppressing chaos in PMSLM. Firstly, we derive a chaotic model of PMSLM in the closed-loop system. Secondly, in order to realize the local asymptotic stabilization of the mechanical subsystem and the global stabilization of the motor-driven system including electrical subsystem, we propose an improved uniting control lyapunov functions by introducing backstepping approach. Finally, an illustrated example is also given to show the electiveness of the obtained results.Keywords: linear motor, lyapunov functions, chao control, hybrid controller
Procedia PDF Downloads 3377706 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems
Authors: Borhan Marzougui
Abstract:
Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.Keywords: IoT, DDoS, attacks, botnet, security, agents
Procedia PDF Downloads 1437705 The Impact of Temperamental Traits of Candidates for Aviation School on Their Strategies for Coping with Stress during Selection Exams in Physical Education
Authors: Robert Jedrys, Zdzislaw Kobos, Justyna Skrzynska, Zbigniew Wochynski
Abstract:
Professions connected to aviation require an assessment of the suitability of health, psychological and psychomotor skills and overall physical fitness of the organism, who applies. Assessment of the physical condition is conducted by the committees consisting of aero-medical specialists in clinical medicine and aviation. In addition, psychological predispositions should be evaluated by specialized psychologists familiar with the specifics of the tasks and requirements for the various positions in aviation. Both, physical abilities and general physical fitness of candidates for aviation shall be assessed during the selection exams, which also test the ability to deal with stress what is very important in aviation. Hence, the mentioned exams in physical education not only help to judge on the ranking in candidates in terms of their efficiency and performance, but also allows to evaluate the functioning under stress measured using psychological tests. Moreover, before-test stress is a predictors of successfulness in the next stages of education and practical training in the aviation. The aim of the study was to evaluate the influence of temperamental traits on strategies used for coping with stress during selection exams in physical education, deciding on admission to aviation school. The study involved 30 candidates for fighter pilot training in aviation school . To evaluate the temperament 'The Formal Characteristics of Behavior-Temperament Inventory' (FCB-TI) by B. Zawadzki and J.Strelau was used. To determine the pattern of coping with stress 'The Coping Inventory for Stressful Situations' (CISS) to N. S. Endler and J. D. A. Parker were engaged. Study of temperament and styles of coping with stress was conducted directly before the exam selection of physical education. The results were analyzed with 'Statistica 9' program. The studies showed that:-There is a negative correlation between such a temperament feature as 'perseverance' and preferred style of coping with stress concentrated on the task (r = -0.590; p < 0.004); -There is a positive correlation between such a feature of temperament as 'emotional reactivity,' and preference to deal with a stressful situation with ‘style centered on emotions’ (r = 0.520; p <0.011); -There is a negative correlation between such a feature of temperament as ‘strength’ and ‘style of coping with stress concentrated on emotions’ (r = -0.580; p < 0.004). Studies indicate that temperament traits determine the perception of stress and preferred coping styles used during the selection, as during the exams in physical education.Keywords: aviation, physical education, stress, temperamental traits
Procedia PDF Downloads 2577704 Smart Forms and Intelligent Transportation Network Patterns, an Integrated Spatial Approach to Smart Cities and Intelligent Transport Systems in India Cities
Authors: Geetanjli Rani
Abstract:
The physical forms and network pattern of the city is expected to be enhanced with the advancement of technology. Reason being, the era of virtualisation and digital urban realm convergence with physical development. By means of comparative Spatial graphics and visuals of cities, the present paper attempts to revisit the very base of efficient physical forms and patterns to sync the emergence of virtual activities. Thus, the present approach to integrate spatial Smartness of Cities and Intelligent Transportation Systems is a brief assessment of smart forms and intelligent transportation network pattern to the dualism of physical and virtual urban activities. Finally, the research brings out that the grid iron pattern, radial, ring-radial, orbital etc. stands to be more efficient, effective and economical transit friendly for users, resource optimisation as well as compact urban and regional systems. Moreover, this paper concludes that the idea of flow and contiguity hidden in such smart forms and intelligent transportation network pattern suits to layering, deployment, installation and development of Intelligent Transportation Systems of Smart Cities such as infrastructure, facilities and services.Keywords: smart form, smart infrastructure, intelligent transportation network pattern, physical and virtual integration
Procedia PDF Downloads 1547703 Challenges in Anti-Counterfeiting of Cyber-Physical Systems
Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier
Abstract:
This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection
Procedia PDF Downloads 4987702 Glycemic Control in Rice Consumption among Households with Diabetes Patients: The Role of Food Security
Authors: Chandanee Wasana Kalansooriya
Abstract:
Dietary behaviour is a crucial factor affecting diabetes control. With increasing rates of diabetes prevalence in Asian countries, examining their dietary patterns, which are largely based on rice, is timely required. It has been identified that higher consumption of some rice varieties is associated with increased risk of type 2 diabetes. Although diabetes patients are advised to consume healthier rice varieties, which contains low glycemic, several conditions, one of which food insecurity, make them difficult to preserve those healthy dietary guidelines. Hence this study tries to investigate how food security affects on making right decisions of rice consumption within diabetes affected households using a sample from Sri Lanka, a country which rice considered as the staple food and records the highest diabetes prevalence rate in South Asia. The study uses data from the Household Income and Expenditure Survey 2016, a nationally representative sample conducted by the Department of Census and Statistics, Sri Lanka. The survey used a two-stage stratified sampling method to cover different sectors and districts of the country and collected micro-data on demographics, health, income and expenditures of different categories. The study uses data from 2547 households which consist of one or more diabetes patients, based on the self-recorded health status. The Household Dietary Diversity Score (HDDS), which constructed based on twelve food groups, is used to measure the level of food security. Rice is categorized into three groups according to their Glycemic Index (GI), high GI, medium GI and low GI, and the likelihood and impact made by food security on each rice consumption categories are estimated using a Two-part Model. The shares of each rice categories out of total rice consumption is considered as the dependent variable to exclude the endogeneity issue between rice consumption and the HDDS. The results indicate that the consumption of medium GI rice is likely to increase with the increasing household food security, but low GI varieties are not. Households in rural and estate sectors are less likely and Tamil ethnic group is more likely to consume low GI rice varieties. Further, an increase in food security significantly decreases the consumption share of low GI rice, while it increases the share of medium GI varieties. The consumption share of low GI rice is largely affected by the ethnic variability. The effects of food security on the likelihood of consuming high GI rice varieties and changing its shares are statistically insignificant. Accordingly, the study concludes that a higher level of food security does not ensure diabetes patients are consuming healthy rice varieties or reducing consumption of unhealthy varieties. Hence policy attention must be directed towards educating people for making healthy dietary choices. Further, the study provides a room for further studies as it reveals considerable ethnic and sectorial differences in making healthy dietary decisions.Keywords: diabetes, food security, glycemic index, rice consumption
Procedia PDF Downloads 1027701 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security
Authors: Magdalena Musiał-Karg
Abstract:
The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)
Procedia PDF Downloads 2407700 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm
Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima
Abstract:
In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.Keywords: cloud space, AES, FTP, NetBeans IDE
Procedia PDF Downloads 2067699 Testing a Motivational Model of Physical Education on Contextual Outcomes and Total Moderate to Vigorous Physical Activity of Middle School Students
Authors: Arto Grasten
Abstract:
Given the rising trend in obesity in children and youth, age-related decline in moderate- to- vigorous-intensity physical activity (MVPA) in several Western, African, and Asian countries in addition to limited evidence of behavioral, affective, cognitive outcomes in physical education, it is important to clarify the motivational processes in physical education classes behind total MVPA engagement. The present study examined the full sequence of the Hierarchical Model of Motivation in physical education including motivational climate, basic psychological needs, intrinsic motivation, contextual behavior, affect, cognition, total MVPA, and associated links to body mass index (BMI) and gender differences. A cross-sectional data comprised self-reports and objective assessments of 770 middle school students (Mage = 13.99 ± .81 years, 52% of girls) in North-East Finland. In order to test the associations between motivational climate, psychological needs, intrinsic motivation, cognition, behavior, affect, and total MVPA, a path model was implemented. Indirect effects between motivational climate and cognition, behavior, affect and total MVPA were tested by setting basic needs and intrinsic motivation as mediators into the model. The findings showed that direct and indirect paths for girls and boys associated with different contextual outcomes and girls’ indirect paths were not related with total MVPA. Precisely, task-involving climate-mediated by physical competence and intrinsic motivation related to enjoyment, importance, and graded assessments within girls, whereas task-involving climate associated with enjoyment and importance via competence and autonomy, and total MVPA via autonomy, intrinsic motivation, and importance within boys. Physical education assessments appeared to be essential in motivating students to participate in greater total MVPA. BMI was negatively linked with competence and relatedness only among girls. Although, the current and previous empirical findings supported task-involving teaching methods in physical education, in some cases, ego-involving climate should not be totally avoided. This may indicate that girls and boys perceive physical education classes in a different way. Therefore, both task- and ego-involving teaching practices can be useful ways of driving behavior in physical education classes.Keywords: achievement goal theory, assessment, enjoyment, hierarchical model of motivation, physical activity, self-determination theory
Procedia PDF Downloads 2807698 The Role of Physical Activity on Some Factors Affecting Cardiovascular Disease
Authors: M. J. Pourvaghar, M. E. Bahram, Sh. Khoshemehry
Abstract:
Hyperlipidemia or an increase in blood lipids is a condition that has been rising, especially during the last decade, with the advancement of the life-span of the car, as an important disease. In fact, it is one of the complications of industrial life and semi-industrial. Hyperlipidemia alone is not a disease, but it is recognized as an important risk factor for coronary artery disease. The methodology of this review article is the use of research to provide the best solution for physical activity and exercise in relation to lowering blood lipids and lowering blood pressure. Also, factors that contribute to improving the health status of humans should be introduced. Research findings in this article show that physical activity with a specific duration and severity can keep a person away from the cardiovascular disease. The result shows that regular physical activity with low intensity and long periods of time is essential for human health. Physical mobility reduces blood pressure, reduces the harmful fats and does not cause cardiovascular disease. More than half of the patients suffering from cardiovascular problems are afflicted with blood lipids. On the other hand, high blood pressure is one of the serious health hazards in the world today, which causes a large number of cardiovascular problems and mortality in the world. Undoubtedly, the second most common risk factor for heart disease is high blood pressure after cigarette smoking.Keywords: blood pressure, cardiovascular, hyperlipidemia, risk factor
Procedia PDF Downloads 2407697 Exploring the Working Conditions of Physical Education Teachers in Times of COVID-19: A Phenomenological Study
Authors: Raziel Mojica
Abstract:
This study delves into the challenging working conditions faced by physical education (PE) teachers in public schools, particularly during the transition to remote teaching due to the impact of the COVID-19 pandemic. Using a qualitative, hermeneutic phenomenological approach, the research involves in-depth interviews with PE teachers to gain profound insight into their lived experiences and to answer the main question: What is the essence of the lived experience of physical education? The study explores the following sub-questions: (1) How do the participants describe their lived experience regarding their working conditions as physical education teachers in the new normal setup?; (2) What themes emerge from the testimonies of Physical Education Public School teachers from the Division of Calamba?; (3) Based on the consolidated findings and reflection, what material may be produced to inspire the physical education public school teachers? The study identifies emerging themes such as professional growth, personal life boundaries, accessible facilities and equipment, time management, and school leadership. Framed by Frederick Herzberg's Work-Motivation Theory, the study emphasizes motivator and hygienic factors that significantly impact job satisfaction and dissatisfaction. As a result of the study, the teachers vividly identified the challenges they face, including the lack of resources, training, and support from school leaders, which have made it difficult for them to adapt to the new teaching environment. These findings underscore the urgent need to revise teacher training curricula and for school leaders to provide strategic support to PE teachers in remote learning contexts. In conclusion, the study recommends targeted interventions to address these challenges and better equip PE teachers for the new normal in education.Keywords: PE teachers, COVID-19 pandemic, hermeneutic phenomenological, physical education, new normal
Procedia PDF Downloads 247696 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method
Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption
Procedia PDF Downloads 5187695 Physical Training in the Context of Preparation for the Performance of Junior Two: Sports Dance Practitioners
Authors: Rosa Alin Cristian
Abstract:
As in any other sports branch, there is also a relationship of dependence between the motor qualities and the technical skills in the sports dance, in the sense that superior performances from a technical, artistic point of view can be obtained only on the basis of a certain level of motor qualities and of the morphological and functional indices of the organism. Starting from the premise that physical training is a basic component of the dancers' training process, determining the efficacy and efficiency of the athletes in training and competitions, its main objectives are to obtain an optimal functional capacity of the body, which is reached through a superior level of development and manifestation of the basic and specific motor qualities, through appropriate values of the morph-functional indices, all against the background of a perfect state of health. We propose in this paper to create an inventory of the motor qualities specific to the sports dance, of their forms of manifestation, to establish some methodical priorities for their development, in order to support the specialists in their attempt to approach the physical training in the most rigorous and efficient way, according to the characteristics of each age category.Keywords: physical training, motor skills, sports dance, performance
Procedia PDF Downloads 757694 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 1727693 Physical Activity and Sport Research with People with Impairments: Oppression–Empowerment Continuum
Authors: Gyozo Molnar, Nancy Spencer-Cavaliere
Abstract:
Research in the area of physical activity and sport, while becoming multidisciplinary, is still dominated by post-positivist approaches that have the tendency to position the researcher as an expert and the participant as subordinate thereby perpetuating an unequal balance of power. Despite physical activity’s and sport’s universal appeal, their historic practices have excluded particular groups of people who assumed lesser forms of human capital. Adapted physical activity (APA) is a field that has responded to those segregations with specific application and relevance to people with impairments. Nevertheless, to date, similar to physical activity and sport, research in APA is still dominated by post-positivist epistemology. Stemming from this, there is gradually growing criticism within the field related to the abundance of research ‘on’ people with impairments and lack of research ‘with’ and ‘by’ people with impairments. Furthermore, research questions in the field are most often pursued from a single axis of analysis and constructed by non-disabled researchers. Concurrently, while calls for interdisciplinary approaches to understanding disability are growing in popularity, there is also a clear need to take an intersectionality-informed research methodology to understanding physical activity and sport and power (im)balances therein. In other words, impairment needs to be considered in conjunction with other socially and politically constructed and historically embedded differences such as gender, race, class, etc. when analyzing physical activity and sport experiences for people with impairments. Moreover, it is reasonable to argue that non-disabled researchers must recognize and theorize ableism in its complicated intersectional manifestation to show the structural constraints that disabled scholars face in the field. Consequently, this presentation will offer an alternative approach that acknowledges and prioritizes the perspectives and experiences of people with impairments to expand the field of APA. As such, the importance of broadening epistemologies in APA and prioritizing an appreciation for multiple bits of knowledge of people with impairments through intersections of social locations (e.g., gender, race, class) will be considered.Keywords: adapted physical activity, disability, intersectionality, post-positivist, power imbalances
Procedia PDF Downloads 2377692 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks
Authors: Sulemana Ibrahim
Abstract:
Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks
Procedia PDF Downloads 627691 Quality Assurance Practices in the Universities of Pakistan: Physical Facilities as Encouragement
Authors: Ijaz Ahamad Tatlah
Abstract:
The justification of this study was to identify about physical facilities as encouragement to Quality Assurance Practices (QAP) in the Universities of Pakistan concerning the views of students, teachers and Directors of Quality Enhancement Cells’ (QEC’s) and to differentiate the views of students, teachers and Directors of QECs in relation to physical facilities about quality assurance practices in the universities of Pakistan. It was a quantitative and qualitative research study. This study was conducted on a sample of 28 universities (public and private sector) of Pakistan by using random and purposive sampling technique. Questionnaires and semi-structured interviews were planned to gather information from students, teachers and Directors of QECs in relation to physical facilities about quality assurance practices in the universities of Pakistan. The data was analyzed by using Descriptive, inferential statistics, and thematic coding. The study revealed that students, teachers and Directors of QEC’s faced a lot of problems and issues without physical facilities. Quality assurance Agency (QAA), Quality Assurance Department (QAD) and Higher Education commission (HEC) all are relevant Pakistani Agencies, which are working consistently of both sectors i.e. public and private to supervise, guide and facilitate the universities of Pakistan for developing quality assurance practices. Majority of the students teachers and Directors’ of QECs opined that books, research journals, manuals for use of science laboratories, equipment for experiments and update computers were available for teachers and students’ in the universities. It was suggested by the students teachers and Directors of QECs of universities that Quality Assurance Practices (QAP) can be accelerated by thinking the following steps: provision of sufficient resources, add the latest software for computers laboratories and new edition of books.Keywords: physical facilities, quality assurance practices, library, laboratory
Procedia PDF Downloads 3857690 Description of the Process Which Determine the Criterion Validity of Semi-Structured Interview PARA-SCI.CZ
Authors: Jarmila Štěpánová, Martin Kudláček, Lukáš Jakubec
Abstract:
The people with spinal cord injury are one of the least sport active members of our society. Their hypoactivity is determined by primary injury, i.e., the loss of motor function, the injured part of the body is connected with health complications and social handicap. Study performs one part of the standardization process of semi-structured interview PARA-SCI.CZ (Czech version of the Physical Activity Recall Assessment for People with Spinal Cord Injury), which measures the type, frequency, duration, and intensity of physical activity of people with spinal cord injury. The study focused on persons with paraplegia who use a wheelchair as their primary mode of mobility. The aim of this study was to perform a process to determine the criterion validity of PARA-SCI.CZ. The actual physical activity of wheelchair users was monitored during three days by using accelerometers Actigraph GT3X fixed on the non-dominant wrist, and semi-structured interview PARA-SCI.CZ. During the PARA-SCI.CZ interview, participants were asked to recall activities they had done over the past 3 days, starting with the previous day. PARA-SCI.CZ captured frequency, duration, and intensity (low, moderate, and heavy) of two categories of physical activity (leisure time physical activity and activities of a usual day). Accelerometer Actigraph GT3X captured duration and intensity (low and moderate + heavy) of physical activity during three days and nights. The study presented three potential recalculations of measured data. Standardization process of PARA-SCI.CZ is essential to critically approach issues of health and active lifestyle of persons with spinal cord injury in the Czech Republic. Standardized PARA-SCI.CZ can be used in practice by physiotherapists and sports pedagogues from the field of adapted physical activities.Keywords: physical activity, lifestyle, paraplegia, semi-structure interview, accelerometer
Procedia PDF Downloads 325