Search results for: physical security
7689 The Study of Musculoskeletal Disorders Produced by Excess Physical Effort in Marines
Authors: R. Domínguez, A. Castro, N. Fernandez, F. Hidalgo, F. Ortiz
Abstract:
Aims: Study musculoskeletal disorders produced by excess physical exertion in marines Introduction: Musculoskeletal injuries during military training are an important medical problem faced by military organizations throughout the world. Military occupations are physically demanding, which represents a high risk of injury "and subsequent disability, these injuries represent important risk factors for hospitalization, disability, and discharge Methodology: This is a causal correlational study in which data were collected in order to find a cause-effect relationship between the physical effort in marines during their career in the Chilean Navy and the musculoskeletal disorders that occur in some from them. Results:100% had experienced musculoskeletal pain in some part of the body and 73.52% of the respondents had experienced limitations in the ability to work, as a consequence forced to change jobs due to musculoskeletal pain. The neck, shoulders and the lumbar dorsal region were the regions with the highest prevalence of pain, as well as pain that limit the ability to work. Conclusion: Musculoskeletal injuries and illnesses related to injuries are common in marines, both in those who operate in campus Charles, as in another operational unit due to the nature of the work. Many of these injuries occur during physical training and sports and various studies have dealt with the descriptive epidemiology of musculoskeletal injuries in military personnel.Keywords: physical effort, marines, musculoskeletal disorders produced (MSD), training
Procedia PDF Downloads 1747688 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 1347687 Informal Governance as Response to Institutional Paralysis
Authors: Stefanie Kasparek
Abstract:
The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.Keywords: agenda-setting, decision-making, international governance, UNSC
Procedia PDF Downloads 1997686 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security
Authors: Temitope Francis Abiodun
Abstract:
The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.Keywords: terrorism, non-violent state actors, private sector intelligence, security
Procedia PDF Downloads 1377685 Mobile Cloud Computing: How to Improve
Authors: Abdullah Aljumah, Tariq Ahamad
Abstract:
The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.Keywords: Cloud Computing, MCC, SAAS, computer interaction
Procedia PDF Downloads 3817684 Impact of Self-Concept on Performance and Mental Wellbeing of Preservice Teachers
Authors: José María Agugusto-landa, Inmaculada García-Martínez, Lara Checa Domene, Óscar Gavín Chocano
Abstract:
Self-concept is the perception that a person has of himself, of his abilities, skills, traits, and values. Self-concept is composed of different dimensions, such as academic self-concept, physical self-concept, social self-concept, emotional self-concept, and family self-concept. The relationship between the dimensions of self-concept and mental health and academic performance among future teachers is a topic of interest for educational psychology. Some studies have found that: (i) There is a positive relationship between general self-concept, academic self-concept and academic performance, that is, students who have a more positive image of themselves tend to get better grades and be more motivated to learn. (ii) There is a positive relationship between emotional intelligence, physical self-concept and healthy habits, that is, students who regulate and understand their emotions better have a higher satisfaction with their physical appearance and follow a more balanced diet and a higher physical activity. As for gender differences in the dimensions of self-concept among future teachers, some studies have found that: (i) Girls tend to have a higher self-concept in the social, family and verbal dimensions, that is, they perceive themselves as more capable of relating to others, communicating effectively and receiving support from their family. (ii) Boys tend to have a higher self-concept in the physical, emotional and mathematical dimensions, that is, they perceive themselves as more capable of performing physical activities, controlling their emotions and solving mathematical problems. (iii) There are no significant differences between general self-concept and academic self-concept according to gender, that is, both girls and boys have a similar perception of their global worth and academic competence.Keywords: preservice teachers, self-concept, academic performance, mental wellbeing
Procedia PDF Downloads 807683 Climate Change and Food Security in Nigeria: The World Bank Assisted Third National Fadama Development Programme (Nfdp Iii) Approach in Rivers State, Niger Delta, Nigeria
Authors: Temple Probyne Abali
Abstract:
Port Harcourt, Rivers State in the Niger Delta region of Nigeria is bedeviled by the phenomenon of climatechange, posing threat to food security and livelihood. This study examined a 4 decadel (1980-2020) trend of climate change as well as its socio-economic impact on food security in the region. Furthermore, to achieve sustainable food security and livelihood amidst the phenomenon, the study adopted the World Bank Assisted Third National Fadama Development Programme approach. The data source for climate change involved secondary data from Nigeria Meteorological Agency (NIMET). Consequently, the results for climate change over the 4decade period were displayed in tables, charts and maps for the expected changes. Data sources on socio-economic impact of food security and livelihood were acquired through questionnairedesign. A purposive random sampling technique was used in selecting 5 coastal communities inthe region known for viable economic potentials for agricultural development and the resultswere analyzed using Analysis of Variance (ANOVA). The Participatory Rural Appraisal (PRA) technique of the World Bank for needs assessment wasadopted in selecting 5 agricultural sub-project proposals/activities based on groups’ commoneconomic interest from a total of 1,000 farmers each drawn from the 5 communities of differentage groups including men, women, youths and the vulnerable. Based on the farmers’ sub-projectinterests, the various groups’ Strength, Weakness, Opportunities and Threats (SWOT), Problem Listing Matrix, Skill Gap Analysis as well as EIAson their sub-project proposals/activities were analyzed with substantialMonitoring and Evaluation (M & E), using the Specific, Measurable, Attribute, Reliable and Time bound (SMART)approach. Based on the findings from the PRA technique, the farmers recorded considerableincreaseinincomeofover200%withinthe5yearprojectplan(2008-2013).Thestudyrecommends capacity building and advisory services on this PRA innovation. By so doing, there would be a sustainable increase in agricultural production and assured food security in an environmental friendly manner, in line with the United Nation’s Sustainable Development Goals(SDGs).Keywords: climate change, food security, fadama, world bank, agriculture, sdgs
Procedia PDF Downloads 937682 Evaluation of the Effect of Nursing Services Provided in a Correctional Institution on the Physical Health Levels and Health Behaviors of Female Inmates
Authors: Şenay Pehli̇van, Gülümser Kublay
Abstract:
Female inmates placed in a Correctional Institution (CI) have more physical health problems than other women and their male counterparts. Thus, they require more health care services in the CI and nursing services in particular. CI nurses also have the opportunity to teach behaviors which will protect and improve their health to these women who are difficult to reach in the community. The aim of this study was to evaluate effect of nursing services provided in a CI on the physical health levels and health behaviors of female inmates. The study has a quasi-experimental design. The study was done in Female Closed CI in Ankara, Turkey. The study was conducted on 30 female inmates. Before the implementation of nursing interventions in the initial phase of the study, female inmates were evaluated in terms of physical health problems and health behavior using forms, a physical examination, medical history, health files (file containing medical information related to prisons) and the Omaha System (OS). Findings obtained from evaluations were grouped and symptoms-findings were expressed with OS diagnosis codes. Knowledge, behavior and status scores of prisoners in relation to health problems were determined. After the implementation of the nursing interventions, female inmates were evaluated in terms of physical health problems and health behavior using OS. The research data were collected using the Female Evaluation Form developed by the researcher and the OS. It was found that knowledge, behavior and status scores of prisoners significantly increased after the implementation of nursing interventions (p < 0.05).Keywords: prison nursing, health promotion and protecting, nursi̇ng servi̇ces, omaha system
Procedia PDF Downloads 2637681 Analysis of Thermal Comfort in Educational Buildings Using Computer Simulation: A Case Study in Federal University of Parana, Brazil
Authors: Ana Julia C. Kfouri
Abstract:
A prerequisite of any building design is to provide security to the users, taking the climate and its physical and physical-geometrical variables into account. It is also important to highlight the relevance of the right material elements, which arise between the person and the agent, and must provide improved thermal comfort conditions and low environmental impact. Furthermore, technology is constantly advancing, as well as computational simulations for projects, and they should be used to develop sustainable building and to provide higher quality of life for its users. In relation to comfort, the more satisfied the building users are, the better their intellectual performance will be. Based on that, the study of thermal comfort in educational buildings is of relative relevance, since the thermal characteristics in these environments are of vital importance to all users. Moreover, educational buildings are large constructions and when they are poorly planned and executed they have negative impacts to the surrounding environment, as well as to the user satisfaction, throughout its whole life cycle. In this line of thought, to evaluate university classroom conditions, it was accomplished a detailed case study on the thermal comfort situation at Federal University of Parana (UFPR). The main goal of the study is to perform a thermal analysis in three classrooms at UFPR, in order to address the subjective and physical variables that influence thermal comfort inside the classroom. For the assessment of the subjective components, a questionnaire was applied in order to evaluate the reference for the local thermal conditions. Regarding the physical variables, it was carried out on-site measurements, which consist of performing measurements of air temperature and air humidity, both inside and outside the building, as well as meteorological variables, such as wind speed and direction, solar radiation and rainfall, collected from a weather station. Then, a computer simulation based on results from the EnergyPlus software to reproduce air temperature and air humidity values of the three classrooms studied was conducted. The EnergyPlus outputs were analyzed and compared with the on-site measurement results to be possible to come out with a conclusion related to the local thermal conditions. The methodological approach included in the study allowed a distinct perspective in an educational building to better understand the classroom thermal performance, as well as the reason of such behavior. Finally, the study induces a reflection about the importance of thermal comfort for educational buildings and propose thermal alternatives for future projects, as well as a discussion about the significant impact of using computer simulation on engineering solutions, in order to improve the thermal performance of UFPR’s buildings.Keywords: computer simulation, educational buildings, EnergyPlus, humidity, temperature, thermal comfort
Procedia PDF Downloads 3867680 A Fast, Reliable Technique for Face Recognition Based on Hidden Markov Model
Authors: Sameh Abaza, Mohamed Ibrahim, Tarek Mahmoud
Abstract:
Due to the development in the digital image processing, its wide use in many applications such as medical, security, and others, the need for more accurate techniques that are reliable, fast and robust is vehemently demanded. In the field of security, in particular, speed is of the essence. In this paper, a pattern recognition technique that is based on the use of Hidden Markov Model (HMM), K-means and the Sobel operator method is developed. The proposed technique is proved to be fast with respect to some other techniques that are investigated for comparison. Moreover, it shows its capability of recognizing the normal face (center part) as well as face boundary.Keywords: HMM, K-Means, Sobel, accuracy, face recognition
Procedia PDF Downloads 3317679 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union
Authors: María Elena Menéndez Ibáñez
Abstract:
After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.Keywords: border control, immigration, international cooperation, national security
Procedia PDF Downloads 1387678 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites
Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar
Abstract:
Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.Keywords: online information services, prediction, security and protection, web based services
Procedia PDF Downloads 3587677 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies
Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk
Abstract:
Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)
Procedia PDF Downloads 937676 Green, Yellow, Orange and Red Emission of Sm3+ Doped Borotellurite Glass under the 480nm Excitation Wavelength
Authors: M. R. S. Nasuha, K. Azman, H. Azhan, S. A. Senawi, A . Mardhiah
Abstract:
Sm3+ doped borotellurite glasses of the system (70-x) TeO2-20B2O3-10ZnO-xSm2O3 (where x = 0.0, 0.5, 1.0, 1.5, 2.0, and 2.5 mol%) have been prepared using melt-quenching method. Their physical properties such as density, molar volume and oxygen packing density as well as the optical measurements by mean of their absorption and emission characteristic have been carried out at room temperature using UV/VIS and photoluminescence spectrophotometer. The result of physical properties is found to vary with respect to Sm3+ ions content. Meanwhile, three strong absorption peaks are observed and are well resolved in the ultraviolet and visible regions due to transitions between the ground state and various excited state of Sm3+ ions. Thus, the photoluminescence spectra exhibit four emission bands from the initial state, which correspond to the 4G5/2 → 6H5/2, 4G5/2 → 6H7/2, 4G5/2 → 6H9/2 and 4G5/2 → 6H11/2 fluorescence transitions at 562 nm, 599 nm, 645 nm, and 706 nm, respectively.Keywords: absorption, borotellurite, emission, optical, physical
Procedia PDF Downloads 6987675 Economic Important of Manta Ray Watching Tourism in Dampier Strait, Raja Ampat, West Papua, Indonesia
Authors: Maulita Sari Hani, Abraham B. Sianipar, Jamaluddin Jompa, Natsir Nessa, Alan T. White
Abstract:
Manta ray is an icon for tourism in Raja Ampat. The tourist volume has been increased for the past ten years which up to approximately 23,000 tourists in 2017. Since 2013, Conservation International Indonesia deployed satellite and acoustic tags on manta ray in Dampier strait to track the species and identify the aggregation areas. These findings encourage the government and the local community to boost conservation through the management of marine protected areas for tourism purposes. Community in Dampier strait including the village of Arborek, Kurkapa, Kapisawar, and Sawingray involved in variety of small scale tourism business including homestay, dive shop, tour operator, and crafts. Working groups of related local businesses were established to support the local community and to ensure the sustainability of the economic viability and environmental sustainability. In order to analyze the economic benefits of manta ray tourism, this study was conducted to identify the number of local business in Dampier Strait and the economic impacts in terms of local finance security, social, humanity, individual, and physical assets. The results of this study identify 30 homestays, 2 dive shops, 10 tour operators, 30 women involved in crafts, and about 50 villagers worked for dive resorts. In addition to community assets, we confirmed the welfare of community has been improved in terms of food security, households, education for children, savings, and health insurance.Keywords: marine wildlife tourism, elasmobranch, conservation, ecotourism, co-management, economic viability, environmental sustainability
Procedia PDF Downloads 2177674 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security
Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna
Abstract:
Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.Keywords: cipher text, cryptography, plaintext, raaga
Procedia PDF Downloads 2897673 Novel Fluorescent High Density Polyethylene Composites for Fused Deposition Modeling 3D Printing in Packaging Security Features
Authors: Youssef R. Hassan, Mohamed S. Hasanin, Reda M. Abdelhameed
Abstract:
Recently, innovations in packaging security features become more important to see the originality of packaging in industrial application. Luminescent 3d printing materials have been a promising property which can provides a unique opportunity for the design and application of 3D printing. Lack emission of terbium ions, as a source of green emission, in salt form prevent its uses in industrial applications, so searching about stable and highly emitter material become essential. Nowadays, metal organic frameworks (MOFs) play an important role in designing light emitter material. In this work, fluorescent high density polyethylene (FHDPE) composite filament with Tb-benzene 1,3,5-tricarboxylate (Tb-BTC) MOFs for 3D printing have been successfully developed.HDPE pellets were mixed with Tb-BTC and melting extrustion with single screw extruders. It was found that Tb-BTCuniformly dispersed in the HDPE matrix and significantly increased the crystallinity of PE, which not only maintained the good thermal property but also improved the mechanical properties of Tb-BTC@HDPE composites. Notably, the composite filaments emitted ultra-bright green light under UV lamp, and the fluorescence intensity increased as the content of Tb-BTC increased. Finally, several brightly luminescent exquisite articles could be manufactured by fused deposition modeling (FDM) 3D printer with these new fluorescent filaments. In this context, the development of novel fluorescent Tb-BTC@HDPE composites was combined with 3D printing technology to amplified the packaging Security Features.Keywords: 3D printing, fluorescent, packaging, security
Procedia PDF Downloads 1017672 Lithium Oxide Effect on the Thermal and Physical Properties of the Ternary System Glasses (Li2O3-B2O3-Al2O3)
Authors: D. Aboutaleb, B. Safi
Abstract:
The borate glasses are known by their structural characterized by existence of unit’s structural composed by triangles and tetrahedrons boron in different configurations depending on the percentage of B2O3 in the glass chemical composition. In this paper, effect of lithium oxide addition on the thermal and physical properties of an alumina borate glass, was investigated. It was found that the boron abnormality has a significant effect in the change of glass properties according to the addition rate of lithium oxide.Keywords: borate glasses, triangles and tetrahedrons boron, lithium oxide, boron anomaly, thermal properties, physical properties
Procedia PDF Downloads 3597671 “Friction Surfaces” of Airport Emergency Plan
Authors: Jakub Kraus, Vladimír Plos, Peter Vittek
Abstract:
This article focuses on the issue of airport emergency plans, which are documents describing reactions to events with impact on aviation safety or aviation security. The article specifically focuses on the use and creation of emergency plans, where could be found a number of disagreements between different stakeholders, for which the airport emergency plan applies. Those are the friction surfaces of interfaces, which is necessary to identify and ensure them smooth process to avoid dangerous situations or delay.Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system, friction surfaces of airport emergency plan, interfaces of processes
Procedia PDF Downloads 5197670 Parents' Motivating Factors for Their Deaf and Mute Children to Participate in Physical and Recreational Activities
Authors: Ruben L. Tagare, Jr
Abstract:
This study was conducted to determine the parents’ motivating factors for their deaf and mute children to participate in physical and recreational activities. Data were collected from the 17 parents of the deaf and mute children using a specifically designed survey questionnaire as the primary instrument used in the study. Data analysis and interpretation were done with the aid of descriptive statistics, such as frequency, percentage, weighted mean and multiple responses. Most of the respondents were female with a mean average age of 38 years old. The average age of their children was 10 years old. In terms of monthly income, the respondents had an average monthly income of PhP 13,945. Furthermore, most of the respondents lived in the urban area and were all Catholic by faith or religion. As to the factors that parents used to motivate their deaf and mute children to engage in physical and recreational activities, these included the followings: First; to make my child experience and explore more meaningful things through physical and recreational activities; second; to gain other’s respect; third; to build friendship and interact with his peers; fourth; to experience the feeling of belongingness; and fifth: to learn and discover new things. On the other hand, the least chosen factors were: first; to help achieve and maintain a healthy weight; second; to reduce fats and lowering blood pressure; third; to improve balance, coordination and strength; fourth; to improve posture; and fifth; to assist the child in the development of gross motor and fine motor skills. Based on the findings of the study, it is hereby recommended that since the first factor is 'to make my child experience and explore more meaningful things through physical and recreational activities' and the other top factors are more on social aspect, the school should design extra-curricular activities such as theatrical play and other similar activities that the students will find interesting while the parents will be more motivated to engage their children into physical and recreational activities. Also, since the least chosen factors are more on physical aspect, the school should organize or conduct a seminar for the parents to be aware of the benefits of participating in physical and recreational activities for their deaf and mute children. They can also conduct an information campaign to encourage the other parents of deaf and mute children, whom they keep only inside their home to enroll in the school and let their children be exposed to the natural world. Considering that parents are the primary motivators that can best help their children become more interested in physical and recreational activities for their own development, the school should always remain motivated by creating activities for the deaf and mute children with their parents. The study also recommends conducting further study on the level of knowledge/understanding of the parents on the benefits that can be derived from participating in physical and recreational activities.Keywords: deaf and mute, participation, physical and recreational activities, adaptive PE
Procedia PDF Downloads 1827669 Physical Exertion and Fatigue: A Breakthrough in Choking Sphere
Authors: R. Maher, D. Marchant, F. Fazel
Abstract:
Choking in sport has been defined as ‘an acute performance breakdown’, and is generally explained through a range of contributory antecedents, factors, and explanatory theories. The influence of mental antecedents on an athlete’s performance under pressure has been widely examined through numerous studies. Researchers have only recently begun to investigate the influence of physical effort and associated residual fatigue as a potential contributor to choking in sport. Consequently, the initial aim of the present study was to examine the extent to which both physical exertion and pressure affect free-throw shooting performance. It was hypothesized that the free-throw shooting scores would decline under manipulated conditions. Design and Methods: Using a within-subjects design, 50 student-athletes were assigned to four manipulated conditions: (a) higher pressure-running, (b) higher pressure-no running, (c) lower pressure-running, and (d) lower pressure-no running. The physical exertion was manipulated by including a 56 meter shuttle-run in two of the running conditions. The pressure was manipulated with the presence of an audience, video-recording, performance contingent rewards, and weighting successful shots in the higher pressure conditions. A repeated measure analysis of variance was used to analyse the data. Results: The free-throw performance significantly deteriorated under manipulated physical exertion F (1, 49) = 10.13, p = .003, ηp 2 = .17 and pressure conditions F (1, 49) = 5.25, p = .02, ηp 2 = .09. The lowest free-throw scores were observed in the higher pressure-running condition, whereas the highest free-throw scores were reported in the lower pressure-no running condition. Conclusions: Physical exertion and the associated residual fatigue were contributors to choking. The results of the present study herald a new concept in choking research and yield a practical platform for use by athletes, coaches, and sport psychologists to better manage the psychological and physiological aspects of performance under pressure.Keywords: anxiety, basketball, choking, fatigue, free-throw shooting, physical exertion
Procedia PDF Downloads 2867668 The Correlation of Physical Activity and Plantar Pressure in Young Adults
Authors: Lovro Štefan
Abstract:
Background: The main purpose of the present study was to explore the correlations between physical activity and peak plantar pressure in dynamic mode. Methods: Participants were one hundred forty-six first-year university students (30.8% girls). Plantar pressure generated under each region of the foot (forefoot, midfoot, and heel) was measured by using Zebris dynamometric platform (Isny, Germany). The level of physical activity (PA) was calculated with the International Physical Activity questionnaire (IPAQ - short form). Results: In boys, forefoot peak plantar pressure was correlated with moderate PA (MPA; r=-0.21), vigorous PA (VPA; r=-0.18), and moderate-to-vigorous PA (MVPA; r=-0.28). No significant correlations with other foot regions (p>0.05) were observed. In girls, forefoot peak plantar pressure was correlated with MPA (r =-0.30), VPA (r=-0.39) and MVPA (r=-0.38). Also, heel peak pressure was significantly correlated with MPA (r=-0.33), while no significant correlations with VPA (r=0.05) and MVPA (r=-0.15) were observed. Conclusion: This study shows that different intensities of PA were mostly correlated with forefoot peak plantar pressure in both boys and girls. Therefore, strategies that reduce plantar pressure through a more active lifestyle should be implemented within the education system.Keywords: pedobarography, youth, exercise, associations
Procedia PDF Downloads 977667 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect
Authors: Debasish Nandy
Abstract:
India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.Keywords: bilateral, diplomacy, infiltration, terrorism
Procedia PDF Downloads 5387666 Methodological Aspect of Emergy Accounting in Co-Production Branching Systems
Authors: Keshab Shrestha, Hung-Suck Park
Abstract:
Emergy accounting of the systems networks is guided by a definite rule called ‘emergy algebra’. The systems networks consist of two types of branching. These are the co-product branching and split branching. The emergy accounting procedure for both the branching types is different. According to the emergy algebra, each branch in the co-product branching has different transformity values whereas the split branching has the same transformity value. After the transformity value of each branch is determined, the emergy is calculated by multiplying this with the energy. The aim of this research is to solve the problems in determining the transformity values in the co-product branching through the introduction of a new methodology, the modified physical quantity method. Initially, the existing methodologies for emergy accounting in the co-product branching is discussed and later, the modified physical quantity method is introduced with a case study of the Eucalyptus pulp production. The existing emergy accounting methodologies in the co-product branching has wrong interpretations with incorrect emergy calculations. The modified physical quantity method solves those problems of emergy accounting in the co-product branching systems. The transformity value calculated for each branch is different and also applicable in the emergy calculations. The methodology also strictly follows the emergy algebra rules. This new modified physical quantity methodology is a valid approach in emergy accounting particularly in the multi-production systems networks.Keywords: co-product branching, emergy accounting, emergy algebra, modified physical quantity method, transformity value
Procedia PDF Downloads 2927665 Assessing the Physical Conditions of Motorcycle Taxi Stands and Comfort Conditions of the Drivers in the Central Business District of Bangkok
Authors: Nissa Phloimontri
Abstract:
This research explores the current physical conditions of motorcycle taxi stands located near the BTS stations in the central business district (CBD) and the comfort conditions of motorcycle taxi drivers. The criteria set up for physical stand survey and assessment are the integration of multimodal access design guidelines. After the survey, stands that share similar characteristics are classified into a series of typologies. Based on the environmental comfort model, questionnaires and in-depth interviews are conducted to evaluate the comfort levels of drivers including physical, functional, and psychological comfort. The results indicate that there are a number of motorcycle taxi stands that are not up to standard and are not conducive to the work-related activities of drivers. The study concludes by recommending public policy for integrated paratransit stops that support the multimodal transportation and seamless mobility concepts within the specific context of Bangkok as well as promote the quality of work life of motorcycle taxi drivers.Keywords: motorcycle taxi, paratransit stops, environmental comfort, quality of work life
Procedia PDF Downloads 1127664 Random Analysis of Physical and Mechanical Characteristics of Superfine Animal Fibres
Authors: Sepehr Moradi
Abstract:
The physical and mechanical property parameters, inter-relation of key dimensional and distribution profile of raw Australia Superfine Merino Wool (ASFW) and Inner Mongolia Cashmere (IMC) fibres have been studied. The relationship between the properties of these fibres is assessed using fit transformation functions obtained through correlation coefficient analysis. ASFW and IMC fibre properties are found to be both positively skewed and asymmetric in nature. Whilst fibre diameter varies along its length and both ends have a tapering shape. The basic physical features, namely linear density, true local diameter, true length and breaking load are positively correlated while their tenacity is negatively correlated. The tenacity and true length follow a second order polynomial while the true local diameter is linearly correlated. Assessment of the diameter and length is sufficient to estimate the evaluation of quality for commercial grade ASFW and IMC fibres.Keywords: Australia Superfine Merino Wool fibre, Inner Mongolia Cashmere fibre, distribution profile, physical properties
Procedia PDF Downloads 1577663 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security
Authors: Serkan Kocapinar
Abstract:
Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.Keywords: ISIS, security, terrorism, threats
Procedia PDF Downloads 2937662 Leisure Time Physical Activity during Pregnancy and the Associated Factors Based on Health Belief Model: A Cross Sectional Study
Authors: Xin Chen, Xiao Yang, Rongrong Han, Lu Chen, Lingling Gao
Abstract:
Background: Leisure time physical activity (LTPA) benefits both pregnant women and their fetuses. The guidelines recommended that pregnant women should do at least 150 minutes of moderate-intensity aerobic physical activity throughout the week. The aim of this study was to investigate the rate of LTPA participation among Chinese pregnant women and to identify its predictors based on the health belief model. Methods: A cross-sectional study was conducted from June 2019 to September 2019 in Changchun, China. A total of 225 pregnant women aged 18 years or older with no severe physical or mental disease were recruited in the obstetric clinic. Self-administered questionnaires were used to collect data. LTPA was assessed by a pregnant physical activity questionnaire (PPAQ). A revised pregnancy physical activity health belief scale and social-demographic and perinatal characteristics factors were collected and used to predict LTPA participation. Data were analyzed using descriptive statistics and multivariate logistic regression. Results: The participants had a high level of perceived susceptibility, perceived severity, perceived benefits, and action clues, with mean item scores above 3.5. The predictors of LTPA in Chinese pregnant women were pre-pregnancy exercise habits [OR 3.236 (95% CI:1.632, 6.416)], perceived susceptibility score [OR 2.083 (95% CI:1.002, 4.331)], and perceived barriers score [OR 3.113 (95%CI:1.462, 6.626)]. Conclusions: The results of this study will lead to better identification of pregnant women who may not participate in LTPA. Healthcare professionals should be cognizant of issues that may affect LTPA participation among pregnant women, including pre-pregnancy exercise habits, perceived susceptibility, and perceived barriers.Keywords: pregnancy, health belief model., leisure time physical activity, factors
Procedia PDF Downloads 797661 Analyzing the Relationship between Physical Fitness and Academic Achievement in Chinese High School Students
Authors: Juan Li, Hui Tian, Min Wang
Abstract:
In China, under the considerable pressure of 'Gaokao' –the highly competitive college entrance examination, high school teachers and parents often worry that doing physical activity would take away the students’ precious study time and may have a negative impact on the academic grades. There was a tendency to achieve high academic scores at the cost of physical exercise. Therefore, the purpose of this study was to examine the relationship between the physical fitness and academic achievement of Chinese high school students. The participants were 968 grade one (N=457) and grade two students (N=511) with an average age of 16 years from three high schools of different levels in Beijing, China. 479 were boys, and 489 were girls. One of the schools is a top high school in China, another is a key high school in Beijing, and the other is an ordinary high school. All analyses were weighted using SAS 9.4 to ensure the representatives of the sample. The weights were based on 12 strata of schools, sex, and grades. Physical fitness data were collected using the scores of the National Physical Fitness Test, which is an annual official test administered by the Ministry of Education in China. It includes 50m run, sits and reach test, standing long jump, 1000m run (for boys), 800m run (for girls), pull-ups for 1 minute (for boys), and bent-knee sit-ups for 1 minute (for girls). The test is an overall evaluation of the students’ physical health on the major indexes of strength, endurance, flexibility, and cardiorespiratory function. Academic scores were obtained from the three schools with the students’ consent. The statistical analysis was conducted with SPSS 24. Independent-Samples T-test was used to examine the gender group differences. Spearman’s Rho bivariate correlation was adopted to test for associations between physical test results and academic performance. Statistical significance was set at p<.05. The study found that girls obtained higher fitness scores than boys (p=.000). The girls’ physical fitness test scores were positively associated with the total academic grades (rs=.103, p=.029), English (rs=.096, p=.042), physics (rs=.202, p=.000) and chemistry scores (rs=.131, p=.009). No significant relationship was observed in boys. Cardiorespiratory fitness had a positive association with physics (rs=.196, p=.000) and biology scores (rs=.168, p=.023) in girls, and with English score in boys (rs=.104, p=.029). A possible explanation for the greater association between physical fitness and academic achievement in girls rather than boys was that girls showed stronger motivation in achieving high scores in whether academic tests or fitness tests. More driven by the test results, girls probably tended to invest more time and energy in training for the fitness test. Higher fitness levels were associated with an academic benefit among girls generally in Chinese high schools. Therefore, physical fitness needs to be given greater emphasis among Chinese adolescents and gender differences need to be taken into consideration.Keywords: physical fitness; adolescents; academic achievement; high school
Procedia PDF Downloads 1327660 Social Media Use and Exercise Behaviors
Authors: Justin M. Swanson, Anna Nelson, Daniel Handysides, Patti Herring, Christopher Hill
Abstract:
Not only may social media use have a psychological impact, but increased use may be tied to decreases in physical activity and influencing sedentary behaviors. Social media can be used to share physically active lifestyles and possibly influence others to participate. In contrast, social media use may have adverse effects by decreasing participation in exercise. This study used a qualitative design to examine the relationship between social media use and exercise patterns. Participants were asked questions about their social media habits and how it might impact their physical activity behaviors. Self-reported exercise seemed to increase after viewing others engage in relatable activities or viewing someone that has overcame challenges. To increase the likelihood of engaging in exercise, exercise related posts should be low in difficulty, require few materials, or displayed progress from the individual posting.Keywords: social media, exercise, physical activity, adults
Procedia PDF Downloads 265