Search results for: English for secondary school students
2637 Death Anxiety, Quality of Life, and Self-Esteem of the Elderly in Surat Thani Province, Thailand
Authors: W. Phokhwang-Just, A. Saraketrin, P. Thongpet, J. Udomkitpipat, J. Kaewsakulthong
Abstract:
The more people get older and live longer, the more health problems they may have. This cross-sectional study aims to study a correlation between death anxiety, quality of life, and self-esteem as well as factors affecting these variables in the elderly living in Surat Thani Province, Thailand. Of 382 elderly people, who were proportionally sampled from 19 districts in Surat Thani Province, 256 (67%) already returned the questionnaires. The Thai version of Templer’s Death Anxiety, Quality of Life (WHO-BREF), and of Rosenberg’s Self-Esteem Questionnaires were employed. The result showed that the samples had a mean age of 72 years old, 53% were female, 62% were married, 61% graduated with primary-school, and 61% had at least one chronic disease Approximately, 19% of them had 3 diseases. The quality of life (QOL), self-esteem (SE), and death anxiety (DA) of samples were in moderate (n= 91, mean = 86.89, SD = 15.47), high (n = 138, mean = 29.33, SD=4.77), and low level (n= 85, mean = 6.23, SD= 3.65), respectively. The QOL was not significantly different between male and female as well as among different marital status. The female elderly had more DA and less SE than male (t= 2.095, df = 83; t =-3.258, df =135, respectively, p < 0.05). The female elderly, who were separated or widow, had a higher level of DA than did the married elderly (LSD: p < 0.05). The married elderly had a higher level of SE than did the separated, widowed (Tukey HSD, LSD: p < 0.05), or single elderly (LSD: p < 0.05). The more diseases the elderly got, the lower level of QOL they had (r = -0.335, p < 0.05). The QOL was significantly correlated with SE (r =0.434, p < 0.05), but not significantly related to DA (r = -0.200, p = 0.069). The lower level of SE the elderly had, the higher level of DA they become (r = -2.71, p < 0.05). In order to promote the QOL, the SE of the elderly should be enhanced. Consequently, the DA can be minimized. Healthcare providers should provide care that promotes QOL, SE, and reduces DA of the elderly, especially those, who are female, single, and separated or widowed as well as those, who have more diseases than the othersKeywords: death anxiety, quality of life, self-esteem, elderly
Procedia PDF Downloads 3172636 Computer Network Applications, Practical Implementations and Structural Control System Representations
Authors: El Miloudi Djelloul
Abstract:
The computer network play an important position for practical implementations of the differently system. To implement a system into network above all is needed to know all the configurations, which is responsible to be a part of the system, and to give adequate information and solution in realtime. So if want to implement this system for example in the school or relevant institutions, the first step is to analyze the types of model which is needed to be configured and another important step is to organize the works in the context of devices, as a part of the general system. Often before configuration, as important point is descriptions and documentations from all the works into the respective process, and then to organize in the aspect of problem-solving. The computer network as critic infrastructure is very specific so the paper present the effectiveness solutions in the structured aspect viewed from one side, and another side is, than the paper reflect the positive aspect in the context of modeling and block schema presentations as an better alternative to solve the specific problem because of continually distortions of the system from the line of devices, programs and signals or packed collisions, which are in movement from one computer node to another nodes.Keywords: local area networks, LANs, block schema presentations, computer network system, computer node, critical infrastructure packed collisions, structural control system representations, computer network, implementations, modeling structural representations, companies, computers, context, control systems, internet, software
Procedia PDF Downloads 3672635 Security Analysis of Mod. S Transponder Technology and Attack Examples
Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski
Abstract:
All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.Keywords: flight safety, hijack, mod S transponder, security analysis
Procedia PDF Downloads 3002634 The Clustering of Multiple Sclerosis Subgroups through L2 Norm Multifractal Denoising Technique
Authors: Yeliz Karaca, Rana Karabudak
Abstract:
Multifractal Denoising techniques are used in the identification of significant attributes by removing the noise of the dataset. Magnetic resonance (MR) image technique is the most sensitive method so as to identify chronic disorders of the nervous system such as Multiple Sclerosis. MRI and Expanded Disability Status Scale (EDSS) data belonging to 120 individuals who have one of the subgroups of MS (Relapsing Remitting MS (RRMS), Secondary Progressive MS (SPMS), Primary Progressive MS (PPMS)) as well as 19 healthy individuals in the control group have been used in this study. The study is comprised of the following stages: (i) L2 Norm Multifractal Denoising technique, one of the multifractal technique, has been used with the application on the MS data (MRI and EDSS). In this way, the new dataset has been obtained. (ii) The new MS dataset obtained from the MS dataset and L2 Multifractal Denoising technique has been applied to the K-Means and Fuzzy C Means clustering algorithms which are among the unsupervised methods. Thus, the clustering performances have been compared. (iii) In the identification of significant attributes in the MS dataset through the Multifractal denoising (L2 Norm) technique using K-Means and FCM algorithms on the MS subgroups and control group of healthy individuals, excellent performance outcome has been yielded. According to the clustering results based on the MS subgroups obtained in the study, successful clustering results have been obtained in the K-Means and FCM algorithms by applying the L2 norm of multifractal denoising technique for the MS dataset. Clustering performance has been more successful with the MS Dataset (L2_Norm MS Data Set) K-Means and FCM in which significant attributes are obtained by applying L2 Norm Denoising technique.Keywords: clinical decision support, clustering algorithms, multiple sclerosis, multifractal techniques
Procedia PDF Downloads 1752633 Using Computerized Analogical Reasoning Tasks as a Way to Improve Literacy Skills in Children with Mild Intellectual Disability
Authors: Caroline Denaes
Abstract:
The ability to read is crucial for a successful path in school and in a social and professional context. Children with mild intellectual disability are confronted to serious difficulties in literacy. A lot of them do not read or are illiterate. Only one child out of five is able to acquire basic reading skills, which increases the likelihood to misfit in society, especially when these children grow up and cannot manage themselves in situations requiring higher reading levels. One way to help these children acquiring basic reading skills is to use analogical reasoning, as some researchers demonstrated that this mechanism is fundamental for any reading process. For this purpose, we developed computerized analogies displayed on a touch screen tablet. Analogies are comparisons that give children a framework they can use to understand new information. They work by comparing one thing to another in order to emphasize some mutual quality. If one of the items is unfamiliar, that mutual quality can help make it understandable, or it can cause the children to consider something familiar in some new way, such as transferring what they know about familiar words to help them identify unfamiliar words. In addition, using touch screen tablets represents several advantages: the ease of use, the relevance to this specific population and the appeal of a self-directed activity gives individuals and practitioners a modern tool that differs from the traditional paper-and-pencil material. In addition, the touch screen dimension is especially appropriate for children as assistive technology has been found to be more motivating that any other types of devices and improves the children’ attention span.Keywords: literacy, intellectual disabilities, touch screen techonology, literacy skill
Procedia PDF Downloads 2742632 Pontine and Lobar Hemorrhage from Venous Infarction secondary to Cerebral Venous Thrombosis in a 70-year old Filipina with Protein S Deficiency: A Case Report
Authors: Michelangelo Liban, Debbie Liquete
Abstract:
A 70-year-old right-handed Filipina was seen by the Neurology service due to a new onset headache, bi-occipital in location, dull squeezing in character with a pain score of 8/10 with associated nausea and one episode of non-projectile, which provided no relief. Due to the alarming features of the headache despite the absence of risk factors and an essentially normal neurologic examination, a cranial CTA+CTV was done, which revealed a small left frontal and small right pontine hyper density with minimal perilesional edema. Findings also revealed filling defects in the straight and right transverse sinus and a consideration of hypoplastic left transverse sinus with no definite evidence of aneurysm nor A-V malformation. She had normal levels of D-Dimer, Protein C, ANA and Anti-DS DNA but had a low Protein S of 56% (N.V is 70-120%). Antithrombin, homocysteine and Factor V Leiden were not done due to unavailability of the tests. She was then treated as a case of Cerebral Venous Thrombosis with multiple hemorrhage from venous infraction and was given anticoagulants which provided relief of the headache. She did not manifest with any further cortical, bulbar or sensorimotor deficits hence was discharged improved after 15 hospital days. To our knowledge, there are no case reports of patients with CVT from Protein S deficiency and venous anomaly that presented with multiple hemorrhage from venous infarction, more so affecting the brainstem. In this paper, a rare location of CVT in a newly diagnosed Protein S deficient patient is presented together with an uneventful course and favorable outcome.Keywords: protein S deficiency, cerebral venous thrombosis, pontine hemorrhage from venous infarction, elderly
Procedia PDF Downloads 802631 Optimization of Economic Order Quantity of Multi-Item Inventory Control Problem through Nonlinear Programming Technique
Authors: Prabha Rohatgi
Abstract:
To obtain an efficient control over a huge amount of inventory of drugs in pharmacy department of any hospital, generally, the medicines are categorized on the basis of their cost ‘ABC’ (Always Better Control), first and then categorize on the basis of their criticality ‘VED’ (Vital, Essential, desirable) for prioritization. About one-third of the annual expenditure of a hospital is spent on medicines. To minimize the inventory investment, the hospital management may like to keep the medicines inventory low, as medicines are perishable items. The main aim of each and every hospital is to provide better services to the patients under certain limited resources. To achieve the satisfactory level of health care services to outdoor patients, a hospital has to keep eye on the wastage of medicines because expiry date of medicines causes a great loss of money though it was limited and allocated for a particular period of time. The objectives of this study are to identify the categories of medicines requiring incentive managerial control. In this paper, to minimize the total inventory cost and the cost associated with the wastage of money due to expiry of medicines, an inventory control model is used as an estimation tool and then nonlinear programming technique is used under limited budget and fixed number of orders to be placed in a limited time period. Numerical computations have been given and shown that by using scientific methods in hospital services, we can give more effective way of inventory management under limited resources and can provide better health care services. The secondary data has been collected from a hospital to give empirical evidence.Keywords: ABC-VED inventory classification, multi item inventory problem, nonlinear programming technique, optimization of EOQ
Procedia PDF Downloads 2592630 Pathological Observations of Intestinal Coccidiosis in Camel (Camelus dromedarius)
Authors: Abhilasha Dadhich, Manisha Mathur, Sanjay Kumar, Hemant Dadhich
Abstract:
The camel (Camelus dromedarius) is an important animal component of the fragile desert eco-system of India. Apart from others, impaired milk and meat production decrease in performance and even death are some of the major consequences of parasitic disease like coccidiosis in camel. Coccidiosis which is an acute invasion and destruction of intestinal mucosa by protozoa of the genera Eimeria or isospora spp. Post-Mortem examinations of 5 carcasses of dromedary of different age groups aged from 2 to 5 years were conducted. The history indicated that the camels were suffering from diarrhoea, dysentery, pyrexia, inappetence, weight loss, and emaciation. Post mortem examinations showed macroscopic and microscopic alterations in the small intestine, particularly in jejunum and ileum regions. The mucosae were congested, and haemorrhagic on which there were numerous whitish-grey nodular foci were observed. The affected intestinal tissue specimens were preserved in 10% formal saline and processed mechanically for paraffin embedding by acetone and benzene technique. The sections were stained with haematoxylin and eosin method of staining for histopathological examinations. Histologically, typical lesions such as congestion and haemorrhages were present. The intestinal villi were oedematous; mucosa degenerated and desquamated, along with infiltration of eosinophils and macrophages. Crypts of lieberkuhn were obliterated due to presence of schizonts in lamina propria. Older camels served as the source of spread of coccidial infection and were also predisposed to secondary infections.Keywords: camel, coccidiosis, Eimeria, histopathology
Procedia PDF Downloads 1932629 Pellegrini-Stieda Syndrome: A Physical Medicine and Rehabilitation Approach
Authors: Pedro Ferraz-Gameiro
Abstract:
Introduction: The Pellegrini-Stieda lesion is the result of post-traumatic calcification and/or ossification on the medial collateral ligament (MCL) of the knee. When this calcification is accompanied by gonalgia and limitation of knee flexion, it is called Pellegrini-Stieda syndrome. The pathogenesis is probably the calcification of a post-traumatic hematoma at least three weeks after the initial trauma or secondary to repetitive microtrauma. On anteroposterior radiographs, a Pellegrini-Stieda lesion is a linear vertical ossification or calcification of the proximal portion of the MCL and usually near the medial femoral condyle. Patients with Pellegrini-Stieda syndrome present knee pain associated with loss of range of motion. The treatment is usually conservative with analgesic and anti-inflammatory drugs, either systemic or intra-articular. Physical medicine and rehabilitation techniques associated with shock wave therapy can be a way of reduction of pain/inflammation. Patients who maintain instability with significant limitation of knee mobility may require surgical excision. Methods: Research was done using PubMed central using the terms Pellegrini-Stieda syndrome. Discussion/conclusion: Medical treatment is the rule, with initial rest, anti-inflammatory, and physiotherapy. If left untreated, this ossification can potentially form a significant bone mass, which can compromise the range of motion of the knee. Physical medicine and rehabilitation techniques associated with shock wave therapy are a way of reduction of pain/inflammation.Keywords: knee, Pellegrini-Stieda syndrome, rehabilitation, shock waves therapy
Procedia PDF Downloads 1452628 Child Labour Issue: Practice of Enforecement of Right of the Child in Nigeria
Authors: Gift Salawa, Perkins Erhijakpor, Henry Ukwu
Abstract:
This study will explore child labour issues in Nigeria because it is capable of affecting the physical and general well-being of children who perform hazardous work. This feat will be achieved through qualitative research methodology. Data collection shall be elicited by oral interviews and documental content analysis to delve on the application of the Convention on the Rights of the Child (CRC), International Labour Organization ILO and Geneva Convention relating to child labour practices in Nigeria. This will include the relevance of present domestic laws relating to child labour as implemented in Nigeria, together with factors that contribute to the practice of child labour in the country. The oral interview data analysis will be performed by breaking the interview data into significant statements and themes. This shall be done by comparing and determining the commonalities that are prevalent in the participants’ views regarding child labour menace in Nigeria. Presumably, findings from this study shall unveil that a poor educational policy, a widespread poverty level which is mostly prevalent amongst families in the rural areas of the country, a lack of employment for adults, have led to the ineffectiveness of the local child labour laws in Nigeria. These has in turn culminated into a somewhat non-implementation of the international laws of the CRC, ILO and Geneva Declaration on child labour to which the Nigerian government is a signatory. Based on the finding, this study will calls on the government of Nigeria to extend its free educational policy from the elementary, secondary to tertiary educations. The government also has to ensure that offenders of children’s rights should face a severe punishment.Keywords: child labour, educational policy, human right, protection right
Procedia PDF Downloads 3012627 Nature of Traffic Robbery Victimisation Experience 2015-2023
Authors: Idenyi Goshen Peter, Oludayo Tade
Abstract:
Traffic robbery is a prevalent issue in Lagos State, impacting commuters and transport workers, necessitating an examination of victimization experiences and offender-victim dynamics. The research aim is to investigate the nature of traffic robbery victimization experiences, strategies employed by offenders, and the extent of the crime as reported in newspapers. Utilizing content analysis, the study examines 167 traffic robbery cases from 2015 to 2023 reported in five newspapers using the routine activity theory to understand the dynamics between offenders and victims. The research discusses the victimization experience and convergence of the offenders and victims, it documents the extent of the crime as captured by various newspapers (Vanguard, Punch. Tribune, Sun and Guardian ), and it also interrogates the strategies, methods deployed by traffic robbers. The study addresses the nature, strategies, and extent of traffic robbery victimization experiences, shedding light on the dynamics of the crime over an eight-year period. The paper implored secondary research from newspaper publications, and also content analysis for the research. Routine activity theory was used to explain the phenomenon that exists between the offender and the victim. Consequently, the common method used by offenders is dispossessing victims of their valuables, leading to fear-driven victim experiences, with spikes in incidents observed in June and December, particularly in Vanguard and Punch publications.Keywords: traffic robbery, victimisation experience, offender, routine activity
Procedia PDF Downloads 322626 The Consistency of Gerhard Kittel’s “Christian” Antisemitism in His "Die Judenfrage" and "Meine Verteidigung"
Authors: Catherine Harrison
Abstract:
Faced with arrest, imprisonment and the denazification process in 1945, Tübingen University’s Professor of Theology, Gerhard Kittel, refused to abandon the “Christian” antisemitism which he had first expounded in his Die Judenfrage [The Jewish Question] (1933 and 1934). At the heart of this paper is a critical engagement with Die Judenfrage, the first in English. Putting Die Judenfrage into dialogue with Kittel’s 1946, Meine Verteidigung [My Defence] (1945-6) exposes the remarkable consistency of Kittel’s idiosyncratic but closely argued Christian theology of antisemitism. Girdling his career as a foremost theologian, antisemite and enthusiastic supporter of Hitler and the NSDAP, the consistency between Die Judenfrage and Meine Verteidigung attests Kittel’s consistent and authentic, intellectual position. In both texts, he claims to be advancing Christian, as opposed to “vulgar” or racial, antisemitism. Yet, in the thirteen years which divide them, Kittel had mediated contact with Nazi illuminati Rudolph Hess, Alfred Rosenberg, Winnifred Wagner, Josef Goebbels and Baldur von Schirach, through his publications in various antisemitic journals. The paper argues: Die Judenfrage, as both a text and as a theme, is axiomatic to Kittel’s defence statement; and that Die Judenfrage constitutes the template of Kittel’s arcane, personal “Christian” antisemitism of which Meine Verteidigung is a faithful impression. Both are constructed on the same theologically chimeric and abstruse hypotheses regarding Volk, Spätjudentum [late Judaism] and Heilgeschichte [salvation history]. Problematising these and other definitional vagaries that make up Kittel’s “Christian” antisemitism highlight the remarkable theoretical consistency between Die Judenfrage and Meine Verteidigung. It is concluded that a deadly synergy of Nazi racial antisemitism and the New Testament antisemitism shaped Kittel’s judgement to the degree that, despite the slipstream of concentration camp footage which was shaking the foundations of post-war German academia, Meine Verteidigung is a simple restatement of the antisemitsm conveyed in Die Judenfrage.Keywords: Gerhard Kittel, Third Reich theology, the Jewish Question, Nazi antisemitism
Procedia PDF Downloads 1732625 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 1562624 Girls’ Education Policy and Practices in Three Selected Countries of Africa: Feminism, Educational Reform and Cultural Inflections in View
Authors: Endalew Fufa Kufi
Abstract:
One of the major concerns in educational provision and success determination is access to available opportunities. In that, girls’ access to education has been a point of concern, and more emphasis has come to be at the forefront regarding success. Researches have mostly been held on extremes such as equal access and success, but only a few works deal with process issues related to home and school interplay, issues of progress from lower to higher levels, and spatial conditions related to girls’ education. Hence, this survey assessed experiences in three countries of Africa: Ethiopia, Ghana, and Botswana regarding girls’ education in policy and practice as related to contextual matters in girls’ education. Contextual discourse analysis of qualitative design was used to materialize the study. From each country, five research works held 2010 onwards were purposively selected through criterion-sampling. On the policy aspect, workable documents were looked into. The findings denoted that educational access was of more stretch and generic nature, and the narration was dominated by institutional expectations, not identifying which group should benefit what. The researches largely dealt with either subject-specific dealings or access alone at large. Success studies, by far, dealt with a comparison of girls with boys rather than determinant-related projections. Moreover, the cultural representation of girls’ education had a very minimal part in both policy and researches. From that, it could be found that in-depth scrutiny on the individual, institutional, and leadership determinants of girls’ education would be necessary.Keywords: determinants, girls, education, feminism
Procedia PDF Downloads 3002623 Ecocriticism and Sustainable Development: A Study of Kamila Shamsie's a God in Every Stone
Authors: Shaista Maseeh
Abstract:
English Literature from the beginning itself has had psychological, social and environment concerns. Virgil, Shakespeare, John Milton, William Wordsworth to the most current Robert Hass have shown and proved their environmental and ecological interests as well as distress related to its loss. Pastoral literature is also one such genre that links literature with environment. Thanks to the contemporary literary theories that they successfully are relating Literature formally to the subjects other than written text. One of such literary theory is 'Ecocriticism.' It stands under the umbrella of the Economics term, Sustainable Development,' or it can also be understood as an ecological extension of it. Ecocriticism helps the reader to study the dynamic relation between literature and our degrading environment. It draws attention towards the ravaged condition of nature and animals, that how nature is exploited by human beings for their own benefit leaving nature at a repairable loss. For instance, deforestation is reducing the size of forest every year, injuring permanently flora, fauna and also the habitat of animals. This paper will study the ecological and environmental concerns in the latest novel by Pakistani British writer Kamila Shamsie, A God in every Stone (2014). The book is not only a literary masterpiece in elegant prose, but also a novel posing a lot of questions about 'nature and environment' in general and 'animals' in particular. It gives the glimpses of the interesting history of Temple of Zeus in Greece and Ancient Caria, and covers many episodes of history the Indian freedom struggle. In course of novel's narrative Kamila Shamsie poses disturbing question about environmental abuse, about how human beings are more 'beasts' than so call beasts, poor animals. She also glorifies the simplicity of past. The novel has enough instances to prove Shamsie's positive stand on saving the earth that is being more abused than used by human beings. This paper will provide an ecocritical approach to study A God in Every Stone (2014).Keywords: animals, ecocriticism, environment, nature
Procedia PDF Downloads 4352622 The 5S Responses of Obese Teenagers in Verbal Bullying
Authors: Alpha Bolinao, Francine Rose De Castro, Jessie Kate Lumba, Raztine Mae Paeste, Hannah Grace Tosio
Abstract:
The present study aimed to know the role of verbal bullying in the lives of obese teenagers exposed to it. The study employed a qualitative design specifically the phenomenological approach that focuses on the obese teenagers’ verbal bullying experiences. The study also used the social constructivism approach wherein it described the obese teenagers’ verbal bullying experiences as they interact with the social world. Through purposive and referral sampling technique, the researchers were able to choose twelve (12) respondents from different schools around the City of Manila, enrolled in the School Year 2015-2016, ages 16-21 years old, has experienced verbal bullying for the last ten (10) years and with the Body Mass Index (BMI) of equal to or greater than 30. Upon the consent of the respondents, ethical considerations were ensured. In-depth one (1) hour interviews were guided by the researchers’ aide memoir. The recorded interviews were transcribed into a field text and the responses were thoroughly analyzed through Thematic Analysis and Kelly’s Repertory Grid. It was found that the role of verbal bullying in the lives of obese teenagers exposed to it is a process and is best described through a syringe, or the 5S Responses of Obese Teenagers in Bullying, with five conceptual themes which also signify the experiences and the process that obese teenagers have gone through after experiencing verbal bullying. The themes conceptualized were: Suffering, self-doubt, suppression, self-acceptance and sanguineness. This paper may serve as a basis for a counseling program to help the obese teenagers cope with their bullying experiences.Keywords: obesity, obese teenagers, bullying, experiences
Procedia PDF Downloads 3622621 Aligning Informatics Study Programs with Occupational and Qualifications Standards
Authors: Patrizia Poscic, Sanja Candrlic, Danijela Jaksic
Abstract:
The University of Rijeka, Department of Informatics participated in the Stand4Info project, co-financed by the European Union, with the main idea of an alignment of study programs with occupational and qualifications standards in the field of Informatics. A brief overview of our research methodology, goals and deliverables is shown. Our main research and project objectives were: a) development of occupational standards, qualification standards and study programs based on the Croatian Qualifications Framework (CROQF), b) higher education quality improvement in the field of information and communication sciences, c) increasing the employability of students of information and communication technology (ICT) and science, and d) continuously improving competencies of teachers in accordance with the principles of CROQF. CROQF is a reform instrument in the Republic of Croatia for regulating the system of qualifications at all levels through qualifications standards based on learning outcomes and following the needs of the labor market, individuals and society. The central elements of CROQF are learning outcomes - competences acquired by the individual through the learning process and proved afterward. The place of each acquired qualification is set by the level of the learning outcomes belonging to that qualification. The placement of qualifications at respective levels allows the comparison and linking of different qualifications, as well as linking of Croatian qualifications' levels to the levels of the European Qualifications Framework and the levels of the Qualifications framework of the European Higher Education Area. This research has made 3 proposals of occupational standards for undergraduate study level (System Analyst, Developer, ICT Operations Manager), and 2 for graduate (master) level (System Architect, Business Architect). For each occupational standard employers have provided a list of key tasks and associated competencies necessary to perform them. A set of competencies required for each particular job in the workplace was defined and each set of competencies as described in more details by its individual competencies. Based on sets of competencies from occupational standards, sets of learning outcomes were defined and competencies from the occupational standard were linked with learning outcomes. For each learning outcome, as well as for the set of learning outcomes, it was necessary to specify verification method, material, and human resources. The task of the project was to suggest revision and improvement of the existing study programs. It was necessary to analyze existing programs and determine how they meet and fulfill defined learning outcomes. This way, one could see: a) which learning outcomes from the qualifications standards are covered by existing courses, b) which learning outcomes have yet to be covered, c) are they covered by mandatory or elective courses, and d) are some courses unnecessary or redundant. Overall, the main research results are: a) completed proposals of qualification and occupational standards in the field of ICT, b) revised curricula of undergraduate and master study programs in ICT, c) sustainable partnership and association stakeholders network, d) knowledge network - informing the public and stakeholders (teachers, students, and employers) about the importance of CROQF establishment, and e) teachers educated in innovative methods of teaching.Keywords: study program, qualification standard, occupational standard, higher education, informatics and computer science
Procedia PDF Downloads 1442620 Human Capital Mobility of a Skilled Workforce: A Need for a Future of Europe
Authors: Tiron-Tudor Adriana, Farcas Teodora Viorica, Ciolomic Ioana Andreea
Abstract:
The issue of human capital mobility inside Europe is still an open one. Even though there were created some tools in order to better move from one country to another to work and study the number of the people doing this is very low because of various factors presented in this paper. The "rethinking educational" agenda of the European Commission has open the floor for new projects which can create steps towards a European language for skills and competences, qualifications. One of these projects is the Partnership for Exchange of experience in Student on-the-job Training. As part of this project, we are interested to see the situation of the human capital inside EU and the elements that were created until now to support this mobility. Also, the main objective of the project is to make a comparison between the four countries involved in PEST project (Romania, Hungary, Finland, and Estonia), at the education and internship level. The results are helpful for the follow of the project, for identifying where changes can be done and need to be done.Keywords: ECVET, human capital mobility, partnership exchange, students on the job mobility, vocational education and training
Procedia PDF Downloads 4282619 Exploring the Travel Preferences of Generation Z: A Look into the Next Generation of Tourists
Authors: M. Panidou, F. Kilipiris, E. Christou, K. Alexandris
Abstract:
This study focuses on Generation Z, the next generation of tourists born between 1996 and 2012. Given their significant population size, Generation Z is expected to have a substantial impact on the travel and tourism sector. Therefore, understanding their travel preferences is crucial for businesses in the hospitality and tourism industry. By examining their travel preferences, this research aims to identify the unique characteristics and motivations of this generation when it comes to travel. This study used a quantitative method, and primary data was collected through a survey (online questionnaire), while secondary data was gathered from academic literature, industry reports, and online sources to provide a comprehensive analysis of the topic. The sample of the study was 100 Greek individuals aged between 18-26 years old. The data was analyzed with the support of SPSS software. The findings of the research indicated that technology, sustainability, and budget-friendly options are essential components for attracting and retaining Generation Z tourists. These preferences highlight the importance of incorporating innovative technologies, promoting sustainable practices, and offering affordable travel options to effectively engage this market niche. This research contributes to the field of hospitality and tourism businesses by providing valuable insights into the travel preferences of Generation Z. By understanding their distinct features and preferences; businesses can tailor their strategies and marketing efforts to effectively engage and retain this market segment. Considering the limitations of the sample size, future studies could aim for a larger and more diverse sample to enhance the generalizability of the findings.Keywords: gen Z, technology, travel preferences, sustainability
Procedia PDF Downloads 902618 Efficient Management through Predicting of Use E-Management within Higher Educational Institutions
Authors: S. Maddi Muhammed, Paul Davis, John Geraghty, Mabruk Derbesh
Abstract:
This study discusses the probability of using electronic management in higher education institutions in Libya. This could be as sampled by creating an electronic gate at the faculties of Engineering and Computing "Information Technology" at Zaytuna University or any other university in Libya. As we all know, the competitive advantage amongst universities is based on their ability to use information technology efficiently and broadly. Universities today value information technology as part of the quality control and assurance and a ranking criterion for a range of services including e-learning and e-Registration. This could be done by developing email systems, electronic or virtual libraries, electronic cards, and other services provided to all students, faculty or staff. This paper discusses a range of important topics that explain how to apply the gate "E" with the faculties at Zaytuna University, Bani Walid colleges in Libya.Keywords: e-management, educational institutions (EI), Libya, Zaytuna, information technology
Procedia PDF Downloads 4612617 Design, Construction And Validation Of A Simple, Low-cost Phi Meter
Authors: Gabrielle Peck, Ryan Hayes
Abstract:
The use of a phi meter allows for definition of equivalence ratio during a fire test. Previous phi meter designs have used expensive catalysts and had restricted portability due to the large furnace and requirement for pure oxygen. The new design of the phi meter did not require the use of a catalyst. The furnace design was based on the existing micro-scale combustion calorimetry (MCC) furnace and operating conditions based on the secondary oxidizer furnace used in the steady state tube furnace (SSTF). Preliminary tests were conducted to study the effects of varying furnace temperatures on combustion efficiency. The SSTF was chosen to validate the phi meter measurements as it can both pre-set and independently quantify the equivalence ratio during a test. The data were in agreement with the data obtained on the SSTF. It was also validated by a comparison of CO2 yields obtained from the SSTF oxidizer and those obtained by the phi meter. The phi meter designed and constructed in this work was proven to work effectively on a bench-scale. The phi meter was then used to measure the equivalence ratio on a series of large-scale ISO 9705 tests for numerous fire conditions. The materials used were a range of non-homogenous materials such as polyurethane. The measurements corresponded accurately to the data collected, showing the novel design can be used from bench to large-scale tests to measure equivalence ratio. This cheaper, more portable, safer and easier to use phi meter design will enable more widespread use and the ability to quantify fire conditions of tests, allowing for better understanding of flammability and smoke toxicity.Keywords: phi meter, smoke toxicity, fire condition, ISO9705, novel equipment
Procedia PDF Downloads 1062616 Simulation of a Three-Link, Six-Muscle Musculoskeletal Arm Activated by Hill Muscle Model
Authors: Nafiseh Ebrahimi, Amir Jafari
Abstract:
The study of humanoid character is of great interest to researchers in the field of robotics and biomechanics. One might want to know the forces and torques required to move a limb from an initial position to the desired destination position. Inverse dynamics is a helpful method to compute the force and torques for an articulated body limb. It enables us to know the joint torques required to rotate a link between two positions. Our goal in this study was to control a human-like articulated manipulator for a specific task of path tracking. For this purpose, the human arm was modeled with a three-link planar manipulator activated by Hill muscle model. Applying a proportional controller, values of force and torques applied to the joints were calculated by inverse dynamics, and then joints and muscle forces trajectories were computed and presented. To be more accurate to say, the kinematics of the muscle-joint space was formulated by which we defined the relationship between the muscle lengths and the geometry of the links and joints. Secondary, the kinematic of the links was introduced to calculate the position of the end-effector in terms of geometry. Then, we considered the modeling of Hill muscle dynamics, and after calculation of joint torques, finally, we applied them to the dynamics of the three-link manipulator obtained from the inverse dynamics to calculate the joint states, find and control the location of manipulator’s end-effector. The results show that the human arm model was successfully controlled to take the designated path of an ellipse precisely.Keywords: arm manipulator, hill muscle model, six-muscle model, three-link lodel
Procedia PDF Downloads 1462615 Foreign Policy and National Security Dilemma: Examining Nigerian Experience
Authors: Shuaibu Umar Abdul
Abstract:
The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.Keywords: foreign policy, nation, national security, Nigeria, security
Procedia PDF Downloads 5202614 Correlation between Consumer Knowledge of the Circular Economy and Consumer Behavior towards Its Application: A Canadian Exploratory Study
Authors: Christopher E. A. Ramsey, Halia Valladares Montemayor
Abstract:
This study examined whether the dissemination of information about the circular economy (CE) has any bearing on the likelihood of the implementation of its concepts on an individual basis. Specifically, the goal of this research study was to investigate the impact of consumer knowledge about the circular economy on their behavior in applying such concepts. Given that our current linear supply chains are unsustainable, it is of great importance that we understand what mechanisms are most effective in encouraging consumers to embrace CE. The theoretical framework employed was the theory of planned behavior (TPB). TPB, with its analysis of how attitude, subjective norms, and perceived behavioral control affect intention, provided an adequate model for testing the effects of increased information about the CE on the implementation of its recommendations. The empirical research consisted of a survey distributed among university students, faculty, and staff at a Canadian University in British Columbia.Keywords: circular economy, consumer behavior, sustainability, theory of planned behavior
Procedia PDF Downloads 1352613 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities
Authors: Eugenio Ferrer Santiago
Abstract:
The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.Keywords: data privacy, data protection, urban planning, research ethics
Procedia PDF Downloads 652612 Terrorism: Impact on Nigeria’s Foreign Policy, 1999-2015
Authors: Omolaja Akolade Oluwaseunfunmi
Abstract:
This study seeks to ascertain the origin and history of terrorism in Nigeria, determine the causes of terrorism in Nigeria, examine Nigeria’s foreign policies from 1999 to 2015, evaluate how terrorist groups like Boko Haram and the Indigenous People of Biafra (IPOB) have affected Nigeria’s foreign policies in the international arena; ascertain the measures taken by the government in tackling terrorist acts in Nigeria and give recommendations on how to tackle this menace. The methodology used in this research is the analytical method. The study derives its data from both primary and secondary sources. Findings from fieldwork showed that terrorism has also become one of the most important fundamentals of Nigeria’s foreign policies and relations; respondents from the people interviewed showed that terrorism is a menace and that terrorism must be adequately tackled in other to achieve Nigeria’s foreign policy. Furthermore, results revealed that the fight against the scourge has increasingly gained legitimacy and justification among the international community particularly as many countries consider it to be their international obligation to support the global movement to ameliorate or eliminate the menace. In conclusion, this research made, among other recommendations, that the Nigerian government should ensure the provision of a good life for its citizens, the inter-connectivity of terrorist organizations must be defeated, the government should undergo a foreign policy drive designed at rebuilding its image in the international environment, and also the promotion of peace education among various government, religious institutions, private sector, and civil society groups should be encouraged.Keywords: foreign policy, Boko Haram, movement for the emancipation of Niger delta (MEND), terrorism
Procedia PDF Downloads 352611 Housing Delivery in Nigeria: Repackaging for Sustainable Development
Authors: Funmilayo L. Amao, Amos O. Amao
Abstract:
It has been observed that majority of the people are living in poor housing quality or totally homeless in urban center despite all governmental policies to provide housing to the public. On the supply side, various government policies in the past have been formulated towards overcoming the huge shortage through several Housing Reform Programmes. Despite these past efforts, housing continues to be a mirage to ordinary Nigerian. Currently, there are various mass housing delivery programmes such as the affordable housing scheme that utilize the Public Private Partnership effort and several Private Finance Initiative models could only provide for about 3% of the required stock. This suggests the need for a holistic solution in approaching the problem. The aim of this research is to find out the problems hindering the delivery of housing in Nigeria and its effects on housing affordability. The specific objectives are to identify the causes of housing delivery problems, to examine different housing policies over years and to suggest a way out for sustainable housing delivery. This paper also reviews the past and current housing delivery programmes in Nigeria and analyses the demand and supply side issues. It identifies the various housing delivery mechanisms in current practice. The objective of this paper, therefore, is to give you an insight into the delivery option for the sustainability of housing in Nigeria, given the existing delivery structures and the framework specified in the New National Housing Policy. The secondary data were obtained from books, journals and seminar papers. The conclusion is that we cannot copy models from other nations, but should rather evolve workable models based on our socio-cultural background to address the huge housing shortage in Nigeria. Recommendations are made in this regard.Keywords: housing, sustainability, housing delivery, housing policy, housing affordability
Procedia PDF Downloads 3032610 Explore Customers' Perceptions of U.K. Fast Fashion Retailers' Identities
Authors: Ranis Cheng
Abstract:
Corporate identity is an asset of a company that is unique, valuable and provides a source of competitive advantage. This research taking a holistic view to explore all dimensions of corporate identity and influence of each on customers’ shopping experience in the fast fashion retail sector in the U.K. Unfortunately these issues have not been explored sufficiently in the extant literature, especially in the area of the identity gap. To date, there is still a lack of empirical research on corporate identity, especially in the retail sector despite the importance of the concept to all organisations. Furthermore, although customer group is one of the essential audiences of organisations and the importance of customers in corporate identity management cannot be ignored, to date limited studies have been conducted in order to understand how customers interpret and perceive corporate identity (perceived identity). Therefore, this research investigates customers’ perceptions of corporate identity in the fast fashion retail sector. 1) To explore customers’ perceptions of fast fashion retailers’ corporate identities; 2) To uncover the important constructs of corporate identity which contribute to the U.K. fast fashion retail sector. 40 semi-structured interviews with the fast fashion consumers have been carried out to identify their perceptions of fast fashion retailers' corporate identities. Secondary research on retailers' websites and press releases have been evaluated to identify their desired corporate identities. The findings have revealed that there are significant gaps between how fast fashion retailers present their identities and how their consumers perceive them. This has posed customers' negative perceptions towards the retailers and their shopping experience as a whole. This study has studied how the corporate identity constructs could be applied in the fashion context and has helped retailers to shed lights on how to minimise the gap between desired and perceived identity.Keywords: corporate identity, fast fashion, fashion retailing, identity gap
Procedia PDF Downloads 2752609 Active Learning Based on Science Experiments to Improve Scientific Literacy
Authors: Kunihiro Kamataki
Abstract:
In this study, active learning based on simple science experiments was developed in a university class of the freshman, in order to improve their scientific literacy. Through the active learning based on simple experiments of generation of cloud in a plastic bottle, students increased the interest in the global atmospheric problem and were able to discuss and find solutions about this problem positively from various viewpoints of the science technology, the politics, the economy, the diplomacy and the relations among nations. The results of their questionnaires and free descriptions of this class indicate that they improve the scientific literacy and motivations of other classroom lectures to acquire knowledge. It is thus suggested that the science experiment is strong tool to improve their intellectual curiosity rapidly and the connections that link the impression of science experiment and their interest of the social problem is very important to enhance their learning effect in this education.Keywords: active learning, scientific literacy, simple scientific experiment, university education
Procedia PDF Downloads 2632608 Applying Art Integration on Teaching Quality Assurance for Early Childhood Art Education
Authors: Shih Meng-Chi, Nai-Chia Chao
Abstract:
The study constructed an arts integrative curriculum for early childhood educators and kindergarten teachers to the exciting possibilities of the use of the art integration method. The art integrative curriculum applied art integration that combines and integrates various elements of music, observation, sound, art, instruments, and creation. The program consists of college courses that combine the use of technology with children’s literature, multimedia, music, dance, and drama presentation. This educational program is being used in kindergartens during the pre-service kindergarten teacher training. The study found that arts integrated curriculum was benefit for connecting across domains, multi-sensory experiences, teaching skills, implementation and creation on children art education. The art Integrating instruction helped to provide students with an understanding of the whole framework and improve the teaching quality.Keywords: art integration, teaching quality assurance, early childhood education, arts integrated curriculum
Procedia PDF Downloads 598