Search results for: security program
5612 The Effectiveness of the Sensory-Motor and Spatial Perception Rehabilitation Program Based on Parent-Child Interaction and Its Effectiveness on Kinesio phobia in Children with Visually Impairment
Authors: Saheb Yousefi, Kim T. Zebehazy, Parviz Sharifi Daramadi, Tahereh Najafi Fard, Kevin Murfitt
Abstract:
Context: Children with visual impairments often face challenges in their cognitive, motor, and social development. Sensory-motor and spatial perception therapies can be beneficial for these children, but many existing programs only focus on a limited set of therapies. This study aims to investigate the effectiveness of a rehabilitation program for sensory- motor and spatial perception in reducing the fear of mobility in visually impaired children. Research Aim: The aim of this study is to determine if a rehabilitation program based on parent-child interaction can reduce the fear of mobility in visually impaired children. Methodology: This study uses a semi-experimental approach with an uneven control group design. Visually impaired children aged 10 to 14 and their parents from the Board of the Blind and Visually Impaired in Tehran Province were included in the study. The sample was divided into experimental and control groups, with a total of 30 participants. The experimental group participated in a rehabilitation program for sensory-motor and spatial perception based on parent-child interaction, while the control group did not receive this intervention. Data was collected using questionnaires on transportation issues and analyzed using multivariate and univariate mixed analysis of variance tests. Findings: The analysis of the data showed that the fear of movement was significantly improved in the experimental group compared to the control group after the intervention. Theoretical Importance: This study highlights the effectiveness of a rehabilitation program for sensory- motor and spatial perception based on parent-child interaction in reducing the fear of mobility in visually impaired children. It contributes to the existing knowledge by demonstrating the positive impact of this type of intervention on the cognitive, motor, and social development of these children. Data Collection and Analysis Procedures: Data was collected through the use of questionnaires administered to the children before and after the intervention. The data was analyzed using multivariate and univariate mixed analysis of variance tests to examine the effects of the rehabilitation program. Questions Addressed: This study addresses the question of whether a rehabilitation program based on parent-child interaction can reduce the fear of mobility in visually impaired children. Conclusion: The findings of this study support the effectiveness of the sensory-motor and spatial perception rehabilitation program based on parent-child interaction in reducing the fear of movement in visually impaired children. This intervention can be considered as a suitable method to enhance the fear of mobility in these children.Keywords: vision impairment, sensory-motor rehabilitation, space perception, parent-child interaction, fear of movement.
Procedia PDF Downloads 665611 Reducing Falls in Memory Care through Implementation of the Stopping Elderly Accidents, Deaths, and Injuries Program
Authors: Cory B. Lord
Abstract:
Falls among the elderly population has become an area of concern in healthcare today. The negative impacts of falls lead to increased morbidity, mortality, and financial burdens for both patients and healthcare systems. Falls in the United States is reported at an annual rate of 36 million in those aged 65 and older. Each year, one out of four people in this age group will suffer a fall, with 20% of these falls causing injury. The setting for this Doctor of Nursing Practice (DNP) project was a memory care unit in an assisted living community, as these facilities house cognitively impaired older adults. These communities lack fall prevention programs; therefore, the need exists to add to the body of knowledge to positively impact this population. The objective of this project was to reduce fall rates through the implementation of the Center for Disease Control and Prevention (CDC) STEADI (stopping elderly accidents, deaths, and injuries) program. The DNP project performed was a quality improvement pilot study with a pre and post-test design. This program was implemented in the memory care setting over 12 weeks. The project included an educational session for staff and a fall risk assessment with appropriate resident referrals. The three aims of the DNP project were to reduce fall rates among the elderly aged 65 and older who reside in the memory care unit, increase staff knowledge of STEADI fall prevention measures after an educational session, and assess the willingness of memory care unit staff to adopt an evidence-based a fall prevention program. The Donabedian model was used as a guiding conceptual framework for this quality improvement pilot study. The fall rate data for 12 months before the intervention was evaluated and compared to post-intervention fall rates. The educational session comprised of a pre and post-test to assess staff knowledge of the fall prevention program and the willingness of staff to adopt the fall prevention program. The overarching goal was to reduce falls in the elderly population who live in memory care units. The results of the study showed, on average that the fall rate during the implementation period of STEADI (μ=6.79) was significantly lower when compared to the prior 12 months (μ= 9.50) (p=0.02, α = 0.05). The mean staff knowledge scores improved from pretest (μ=77.74%) to post-test (μ=87.42%) (p=0.00, α= 0.05) after the education session. The results of the willingness to adopt a fall prevention program were scored at 100%. In summation, implementing the STEADI fall prevention program can assist in reducing fall rates for residents aged 65 and older who reside in a memory care setting.Keywords: dementia, elderly, falls, STEADI
Procedia PDF Downloads 1375610 The Food and Nutrition Security in Brazilian Quilombo: The Account of Experiences in Two Titled Territories
Authors: Dyego Ramos Henrique, Viviane Pimentel, Katia Souto, Ana Valéria Mendonça, Andrea Gallassi
Abstract:
Socioeconomic inequalities in Brazil have accentuated the aggravations of poverty among the most vulnerable populations, among which are the quilombola communities. The objective was to reflect on a situation of food and nutritional security in two Brazilian quilombola communities. The data were collected by means of reports of experience through the production of talk wheels in two quilombola communities (Itamatatiua and Mesquita), located in the cities of Alcântara and Cidade Ocidental. Access to health services and health promotion actions were still incipient in the quilombola communities visited. The perceptions of the participants of the quilombolas revealed that there are still repressed demands that have rendered the fulfillment of the principles of equity, universality and integrality, both for access to health and for access and availability of food. They recognize in governmental instances a socioeconomic-cultural valorization and nutritional qualities intrinsic to the foods produced by them. Although they have been used as communities of quilombolas live and their level of access to services and programs, dealing with quilombola communities does not mean dealing with 'isolated groups or a strictly homogeneous population.' It demands a great need of attention in relation to the access and availability of food, besides overcoming barriers that made it an unfeasible valuation of social, economic and cultural precepts, intrinsic to the thought about food and nutritional security in Brazilian quilombos.Keywords: access to services, food and nutrition security, health promotion, quilombo population
Procedia PDF Downloads 2335609 India and Space Insurance Policy: An Analytical Insight
Authors: Shreyas Jayasimha, Suneel Anand Sundharesan, Rohan Tigadi
Abstract:
In the recent past, the United States of America and Russia were the only two dominant players in the field of space exploration and had a virtual monopoly in the field of space and technology. However, this has changed over the past few years. Many other nation states such as India, China, and the UK have made significant progress in this field. Amongst these nations, the growth and development of the Indian space program have been nothing short of a miracle. Starting recently, India has successfully launched a series of satellites including its much acclaimed Mangalyaan mission, which placed a satellite in Mars’ orbit. The fact that India was able to attain this feat in its attempt demonstrates the enormous growth potential and promise that the Indian space program holds for the coming years. However, unlike other space-faring nations, India does not have a comprehensive and consolidated space insurance policy. In this regard, it is pertinent to note that, the costs and risks involved in a administering a space program are enormous. Therefore, in the absence of a comprehensive space insurance policy, any losses from an unsuccessful will have to be borne by the state exchequer. Thus, in order to ensure that Indian space program continues on its upward trajectory, the Indian establishment should seriously consider formulating a comprehensive insurance policy. This paper intends to analyze the international best practices followed by other space-faring nations in relation to space insurance policy. Thereafter, the authors seek to examine the current regime in India relating to space insurance policy. Finally, the authors will conclude by providing a series of recommendations regarding the essential elements that should be part of any Indian space insurance policy regime.Keywords: India, space insurance policy, space law, Indian space research organization
Procedia PDF Downloads 2345608 Information Extraction Based on Search Engine Results
Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk
Abstract:
The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.Keywords: search engines, information extraction, agent system
Procedia PDF Downloads 4325607 The Nexus between Migration and Human Security: The Case of Ethiopian Female Migration to Sudan
Authors: Anwar Hassen Tsega
Abstract:
International labor migration is an integral part of the modern globalized world. However, the phenomenon has its roots in some earlier periods in human history. This paper discusses the relatively new phenomenon of female migration in Africa. In the past, African women migrants were only spouses or dependent family members. But as modernity swept most African societies, with rising unemployment rates, there is evidence everywhere in Africa that women labor migration is a growing phenomenon that deserves to be understood in the context of human security research. This work explores these issues further, focusing on the experience of Ethiopian women labor migrants to Sudan. The migration of Ethiopian people to Sudan is historical; nevertheless, labor migration mainly started since the discovery and subsequent exploration of oil in the Sudan. While the paper is concerned with the human security aspect of the migrant workers, we need to be certain that the migration process will provide with a decent wage, good working conditions, the necessary social security coverage, and labor protection as a whole. However, migration to Sudan is not always safe and female migrants become subject to violence at the hands of brokers, employers and migration officials. For this matter, the paper argued that identifying the vulnerable stages and major problem facing female migrant workers at various stages of migration is a prerequisite to combat the problem and secure the lives of the migrant workers. The major problems female migrants face include extra degrees of gender-based violence, underpayment, various forms of abuse like verbal, physical and sexual and other forms of torture which include beating and slaps. This peculiar situation could be attributed to the fact that most of these women are irregular migrants and fall under the category of unskilled and/or illiterate migrants.Keywords: Ethiopia, human security, labor migration, Sudan
Procedia PDF Downloads 2555606 Opacity Synthesis with Orwellian Observers
Authors: Moez Yeddes
Abstract:
The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.Keywords: security policies, opacity, formal verification, orwellian observation
Procedia PDF Downloads 2305605 Gendered Appartus of a Military: The Role of Military Wives in Defining Security
Authors: Taarika Singh
Abstract:
Military wives – women married to army officers have largely been recognized as mere supporters or as auxiliaries to military men rather than propagators of thought and ideologies. The military wife (and her participation) is often dismissed as 'private', 'domestic', or 'trivial' and is acknowledged, if at all, only as an (inevitable/normative) entity, seen as a natural product/outcome of militarization. It is because the military wife has come to be constructed and accepted as normative by states and militaries that women of the military are easily ‘trivialised’ and are made to appear to be socially, politically, or theoretically irrelevantand/or insignificant. This paper, using ethnography-- structured and semi-structured interviews -- makes a gendered analysis of militarization, by bringing the military wife to the forefront and placing her at the nexus of the military and state apparatus. Moving away from gendered analyses that focus on the impact of militarization on women or draw attention to the ways in which militarization has been challenged/resisted by women, the paper pays attention to the centrality of women in shaping, validating, and perpetuating militarization, patriarchal control, and gendered hierarchies. The paper will demonstrate how military wives accept and comply with patriarchy as an institutional form of social organization that extends beyond the family and kinship relations into the military as an organization of the state. The paper will draw attention to the ways in which military norms, patriarchal values, and belief systems shape the social personhood, identity, and worldview of military wives; as a consequence of which, women play a central role in upholding and reproducing social inequalities and hierarchies; in shaping social status, and power relationships amongst men and women within and outside the military. The paper will allude to the processes and ideologies via which womena) accept and reproducemen as exclusive holders of power, status, and privilege; and b) recognize international relations, politics, andmatters related to security to be male dominated arenas inviting overwhelming masculine participation. In doing so, the paper will argue that women of the military play a critical role in perpetuating and upholding gendered meanings associated with the notion of and discourse around security. The paper will illustratehow military wives accept and assume security to be inherently a gendered idea -- a masculine notion, a male dominated arena, as something granted by men. In other words, the paper will demonstrate how the militarization of the military wives and the perpetuation of militarization by military wives plays a crucial role in propagating and perpetuating security to be a masculine notion or a male dominated arena. The paper will then question the degree to which such gendered analyses can shape the broader meanings, definitions, and discourses around security, matters related to security, and security threats.Keywords: gender, militarisation, security, women
Procedia PDF Downloads 1475604 Changes in Knowledge and Awareness for a Community-Based Cancer Screening Educational Program
Authors: Shenghui Wu, Patricia Chalela, Amelie G. Ramirez
Abstract:
Background: Cervical cancer (CC), colorectal cancer (CRC), and breast cancer (BC) are diseases that can be prevented/detected through early test. Through educational programs, individuals can become better informed about these cancers and understand the importance of screening and early detection. A community-based educational program was developed to improve knowledge and awareness toward the screening of the three cancer types in a South Texas underserved population. Methods: Residents living in Laredo, Texas were invited to participate in the present study. From January 2020 to April 2021, participants were recruited using social media and flyer distributions in general community. Participants received a free live web cancer education presentation delivered by bilingual community health educators, and online pre- and post-education surveys for CC, CRC, and BC separately. Pre-post changes in knowledge for individual items were compared using McNemar’s chi-squared tests. Results: Overall, participants demonstrated increases in CC (n=237), CRC (n=59), and BC (n=56) screening knowledge and awareness after receiving the cancer screening education (Ps<0.05). After receiving the cancer screening education, 85-97% of participants had an intent to talk to a healthcare provider about CC/CRC/BC screening, 88-97% had an intent to get a CC/CRC/BC screening test in the next 12 months or at the next routine appointment, and 90-97% had an intent to talk about CC/CRC/BC with their family members or friends. Conclusion: A community-based educational program can help increase knowledge and awareness about cervical, colorectal, and breast cancer screening, promote positive changes in population's knowledge and awareness about the benefits of cancer screening.Keywords: cervical cancer, colorectal cancer, breast cancer, educational program, health knowledge, awareness, Hispanics, screening, health education
Procedia PDF Downloads 1105603 Ethics and Military Defections in Nonviolent Resistance Campaigns
Authors: Adi Levy
Abstract:
Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.Keywords: culpability, defections, nonviolence, permissibility
Procedia PDF Downloads 1225602 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives
Authors: Obinna Emmanuel Nkomadu
Abstract:
Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms
Procedia PDF Downloads 965601 Accelerating Decision-Making in Oil and Gas Wells: 'A Digital Transformation Journey for Rapid and Precise Insights from Well History Data'
Authors: Linung Kresno Adikusumo, Ivan Ramos Sampe Immanuel, Liston Sitanggang
Abstract:
An excellent, well work program in the oil and gas industry can have numerous positive business impacts, contributing to operational efficiency, increased production, enhanced safety, and improved financial performance. In summary, an excellent, well work program not only ensures the immediate success of specific projects but also has a broader positive impact on the overall business performance and reputation of the oil and gas company. It positions the company for long-term success in a competitive and dynamic industry. Nevertheless, a number of challenges were encountered when developing a good work program, such as the poor quality and lack of integration of well documentation, the incompleteness of the well history, and the low accessibility of well documentation. As a result, the well work program was delivered less accurately, plus well damage was managed slowly. Our solution implementing digital technology by developing a web-based database and application not only solves those issues but also provides an easy-to-access report and user-friendly display for management as well as engineers to analyze the report’s content. This application aims to revolutionize the documentation of well history in the field of oil and gas exploration and production. The current lack of a streamlined and comprehensive system for capturing, organizing, and accessing well-related data presents challenges in maintaining accurate and up-to-date records. Our innovative solution introduces a user-friendly and efficient platform designed to capture well history documentation seamlessly.Keywords: digital, drilling, well work, application
Procedia PDF Downloads 825600 A Novel Parametric Chaos-Based Switching System PCSS for Image Encryption
Authors: Mohamed Salah Azzaz, Camel Tanougast, Tarek Hadjem
Abstract:
In this paper, a new low-cost image encryption technique is proposed and analyzed. The developed chaos-based key generator provides complex behavior and can change it automatically via a random-like switching rule. The designed encryption scheme is called PCSS (Parametric Chaos-based Switching System). The performances of this technique were evaluated in terms of data security and privacy. Simulation results have shown the effectiveness of this technique, and it can thereafter, ready for a hardware implementation.Keywords: chaos, encryption, security, image
Procedia PDF Downloads 4785599 Preparation Control Information and Analyzing of Metering Gas System Based of Orifice Plate
Authors: A. Harrouz, A. Benatiallah, O. Harrouz
Abstract:
This paper presents the search for errors in the measurement instruments in a dynamic system of metering liquid or gas and sees the tolerance defined by the international standards and recommendations. We will implement a program on MATLAB/Simulink which is calculated based on the ISO-5167. This program will take the system parameters on considerations such as: the willingness plates, the size of the orifice, the given design conditions, reference conditions, find pressure drop for a given flow, or flow for a loss of given load. The results are considered very good and satisfactory because the errors identified of measuring instruments system are within the margin of error limit by the regulations.Keywords: analyzing, control, gas, meters system
Procedia PDF Downloads 4035598 The Effect of Core Training on Physical Fitness Characteristics in Male Volleyball Players
Authors: Sibel Karacaoglu, Fatma Ç. Kayapinar
Abstract:
The aim of the study is to investigate the effect of the core training program on physical fitness characteristics and body composition in male volleyball players. 26 male university volleyball team players aged between 19 to 24 years who had no health problems and injury participated in the study. Subjects were divided into training (TG) and control groups (CG) as randomly. Data from twenty-one players who completed all training sessions were used for statistical analysis (TG,n=11; CG,n=10). A core training program was applied to the training group three days a week for 10 weeks. On the other hand, the control group did not receive any training. Before and after the 10-week training program, pre- and post-testing comprised of body composition measurements (weight, BMI, bioelectrical impedance analysis) and physical fitness measurements including flexibility (sit and reach test), muscle strength (back, leg and grip strength by dynamometer), muscle endurance (sit-ups and push-ups tests), power (one-legged jump and vertical jump tests), speed (20m sprint, 30m sprint) and balance tests (one-legged standing test) were performed. Changes of pre- and post- test values of the groups were determined by using dependent t test. According to the statistical analysis of data, no significant difference was found in terms of body composition in the both groups for pre- and post- test values. In the training group, all physical fitness measurements improved significantly after core training program (p<0.05) except 30m speed and handgrip strength (p>0.05). On the hand, only 20m speed test values improved after post-test period (p<0.05), but the other physical fitness tests values did not differ (p>0.05) between pre- and post- test measurement in the control group. The results of the study suggest that the core training program has positive effect on physical fitness characteristics in male volleyball players.Keywords: body composition, core training, physical fitness, volleyball
Procedia PDF Downloads 3495597 Developing Curricula for Signaling and Communication Course at Malaysia Railway Academy (MyRA) through Industrial Collaboration Program
Authors: Mohd Fairus Humar, Ibrahim Sulaiman, Pedro Cruz, Hasry Harun
Abstract:
This paper presents the propose knowledge transfer program on railway signaling and communication by Original Equipment Manufacturer (OEM) Thales Portugal. The fundamental issue is that there is no rail related course offered by local universities and colleges in Malaysia which could be an option to pursue student career path. Currently, dedicated trainings related to the rail technology are provided by in-house training academies established by the respective rail operators such as Malaysia Railway Academy (MyRA) and Rapid Rail Training Centre. In this matter, the content of training and facilities need to be strengthened to keep up-to-date with the dynamic evolvement of the rail technology. This is because rail products have evolved to be more sophisticated and embedded with high technology components which no longer exist in the mechanical form alone but combined with electronics, information technology and others. These demand for a workforce imbued with knowledge, multi-skills and competency to deal with specialized technical areas. Talent is needed to support sustainability in Southeast Asia. Keeping the above factors in mind, an Industrial Collaboration Program (ICP) was carried out to transfer knowledge on curricula of railway signaling and communication to a selected railway operators and tertiary educational institution in Malaysia. In order to achieve the aim, a partnership was formed between Technical Depository Agency (TDA), Thales Portugal and MyRA for two years with three main stages of program implementation comprising of: i) training on basic railway signaling and communication for 1 month with Thales in Malaysia; ii) training on advance railway signaling and communication for 4 months with Thales in Portugal and; iii) a series of workshop. Two workshops were convened to develop and harmonize curricula of railway signaling and communication course and were followed by one training for installation equipment of railway signaling and Controlled Train Centre (CTC) system from Thales Portugal. With active involvement from Technical Depository Agency (TDA), railway operators, universities, and colleges, in planning, executing, monitoring, control and closure, the program module of railway signaling and communication course with a lab railway signaling field equipment and CTC simulator were developed. Through this program, contributions from various parties help to build committed societies to engage important issues in relation to railway signaling and communication towards creating a sustainable future.Keywords: knowledge transfer program, railway signaling and communication, curricula, module and teaching aid simulator
Procedia PDF Downloads 1955596 Supporting Homeless People in Red Deer, Canada
Authors: Cornelius Ehlers, Lisa Harmatiuk, Sharon Rowland, Michelle Shafers
Abstract:
The objective of the Street Connect program is to provide client-centered care for the homeless population within the City of Red Deer. The program aims to provide an extended continuum of care (addiction, mental health, and physical health) for high acuity homeless individuals who are not connected to a service provider and/or community service agency. Street Connect includes both primary and secondary streams of service: Overall, Street Connect has demonstrated its ability to support vulnerable populations within the City of Red Deer, specifically those who are homeless and seeking addiction, mental health, and medical assistance. The results from the data extract and chart audit reflect the complexity and vulnerability of the clients enrolled in the Street Connect program. The clients were predominantly male, with an average age of 41 years. The majority did not have a permanent address, and 65% did not have employment. Substance abuse/addiction issues were common, combined with a history of psychiatric diagnoses and previous mental health hospitalizations. The most utilized drugs were street drugs such as methamphetamine, fentanyl, and other opioids.Keywords: client-centred care, homelessness, mental health, rural
Procedia PDF Downloads 995595 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography
Authors: Merad Boudia Omar Rafik, Feham Mohammed
Abstract:
Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysisKeywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption
Procedia PDF Downloads 3045594 DCT and Stream Ciphers for Improved Image Encryption Mechanism
Authors: T. R. Sharika, Ashwini Kumar, Kamal Bijlani
Abstract:
Encryption is the process of converting crucial information’s unreadable to unauthorized persons. Image security is an important type of encryption that secures all type of images from cryptanalysis. A stream cipher is a fast symmetric key algorithm which is used to convert plaintext to cipher text. In this paper we are proposing an image encryption algorithm with Discrete Cosine Transform and Stream Ciphers that can improve compression of images and enhanced security. The paper also explains the use of a shuffling algorithm for enhancing securing.Keywords: decryption, DCT, encryption, RC4 cipher, stream cipher
Procedia PDF Downloads 3665593 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level
Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil
Abstract:
This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing
Procedia PDF Downloads 3855592 Reimagining Urban Food Security Through Informality Practices: The Case of Street Food Vending in Johannesburg, South Africa
Authors: Blessings Masuku
Abstract:
This study positions itself within the nascent of street food vending that plays a crucial role in addressing urban household food security across the urban landscape of South Africa. The study aimed to understand how various forms of infrastructure systems (i.e., energy, water and sanitation, housing, and transport, among others) intersect with food and urban informality and how vendors and households’ choices and decisions made around food are influenced by infrastructure assemblages. This study noted that most of the literature studies on food security have mainly focused on the rural agricultural sector, with limited attention to urban food security, notably the role of informality practices in addressing urban food insecurity at the household level. This study pays close attention to how informal informality practices such as street food vending can be used as a catalyst to address urban poverty and household food security and steer local economies for sustainable livelihoods of the urban poor who live in the periphery of the city in Johannesburg. This study deconstructs the infrastructure needs of street food vendors, and the aim was to understand how such infrastructure needs intersect with food and policy that governs urban informality practices. The study argues that the decisions and choices of informality actors in the city of Johannesburg are chiefly determined by the assemblages of infrastructure, including regulatory frameworks that govern the informal sector in the city of Johannesburg. A qualitative approach that includes surveys (open-ended questions), archival research (i., e policy and other key document reviews), and key interviews mainly with city officials and informality actors. A thematic analysis was used to analyze the data collected. This study contributes to greater debates on urban studies and burgeoning literature on urban food security in many ways that include Firstly, the pivotal role that the informal food sector, notably street food vending, plays within the urban economy to address urban poverty and household food security, therefore questioning the conservative perspectives that view the informal sector as a hindrance to a ‘modern city’ and an annoyance to ‘modern’ urban spaces. Secondly, this study contributes to the livelihood and coping strategies of the urban poor who, despite harsh and restrictive regulatory frameworks, devise various agentive ways to generate incomes and address urban poverty and food insecurities.Keywords: urban food security, street food vending, informal food sector, infrastructure systems, livelihood strategies, policy framework and governance
Procedia PDF Downloads 675591 The Effect of Using Water Wireless Aqua Com System on the Development of Dolphin Kick Movements on the Female Swimming Team at the Faculty of Physical Education
Authors: Wisal Alrabadi
Abstract:
The study's goal was to see how the use of water wireless Aqua Com System and its accompanying music affected the Female Swimming Team at the Faculty of Physical Education's development of dolphin kick movements. To that end, a training program consisting of (12) training units spread out over four weeks, three units per week, was created and applied to a study sample of (10) students from the swimming pool enrolled in the first semester of the academic year 2022. Pre-measuring and timing the movements of dolphins kicking with and without fins above and below, measuring the water's surface over a distance of 25 meters. The results showed that there are statistically significant differences in favor of telemetry from the start within the limits of the area specified for a distance of 15 m after the comparison between the pre and post-measurement using the test (T) of the double samples, and this indicates the impact of the training program using the Aqua Com System in the swimming team(Female) at Faculty of Physical Education, and in light of this a set of recommendations was developed.Keywords: aqua com system training program, accompanying music, dolphin kick movements, swimming team female
Procedia PDF Downloads 1595590 Efficacy of Comprehensive Diabetic Care Program with the Reduction of HbA1c in Overweight Type II Diabetes Mellitus Patients: A Retrospective Study
Authors: Rohit Sane, Pravin Ghadigaonkar, Purvi Ahuja, Suvarna Tirmare, Archana Kelhe, Kranti Shinde, Rahul Mandole
Abstract:
To evaluate the efficacy of Comprehensive Diabetic Care Program with the reduction of HbA1c in overweight Diabetes Mellitus Type II patients retrospectively. Methods: Retrospective study was carried out on 34 overweight type II diabetic patients (Mean Age = 54.58 ±11.38 yrs). A total of 34 patients were enrolled after screening of 68 patients (HbA1c 7-10%). The patients were on concomitant drugs namely insulin (11.76%), DPP-4 inhibitor (17.64%), Biguanide (55.88%), Sulfonylurea (52.94%), thiazolidinedione (11.76%), other medications (20.58%) and no allopathic medications (14.70%). The patients were given Comprehensive Diabetic Care Program consisting of panchkarma procedures namely snehana (external oleation), swedana (passive heat therapy) and basti (enema), which was completed in 15 sittings. During the therapy and next 90 days, the patients followed low carbohydrate and moderate protein & fat diet. The primary endpoint of this study was the evaluation of reduction in HbA1c at the end of the follow-up after 90 days. Results: Thirty-four overweight type II diabetic patients (mean age: 54.58[±11.38], HbA1c[7-10%], 67.64% male and 32.35% female) were enrolled in the study. A significant reduction was observed in HbA1c levels (14.30%, p<0.05) at the end of the 90 days follow-up as compared to baseline. Also, BMI was reduced by 5.87%. There was reduction in the usage of the concomitant drugs namely insulin (2.94%), DPP-4 inhibitor (2.94%), Biguanide (32.35%), Sulfonylurea (35.29%), thiazolidinedione (5.88%), other medications(17.64%) and no allopathic medications (32.35%). Conclusion: The results of the study highlight not only in the reduction of HbA1c, but also in BMI and drug tapering of the CDC program in the overweight type II diabetic patients with HbA1c (7-10%).Keywords: HbA1c, low carb diet, Panchakarma therapy, Type II Diabetes
Procedia PDF Downloads 2865589 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 2875588 A Nutritional Wellness Program for Overweight Health Care Providers in Hospital Setting: A Randomized Controlled Trial Pilot Study
Authors: Kim H. K. Choy, Oliva H. K. Chu, W. Y. Keung, B. Lim, Winnie P. Y. Tang
Abstract:
Background: The prevalence of workplace obesity is rising worldwide; therefore, the workplace is an ideal venue to implement weight control intervention. This pilot randomized controlled trial aimed to develop, implement, and evaluate a nutritional wellness program for obese health care providers working in a hospital. Methods: This hospital-based nutritional wellness program was an 8-week pilot randomized controlled trial for obese health care providers. The primary outcomes were body weight and body mass index (BMI). The secondary outcomes were serum fasting glucose, fasting cholesterol, triglyceride, high-density (HDL) and low-density (LDL) lipoprotein, body fat percentage, and body mass. Participants were randomly assigned to the intervention (n = 20) or control (n = 22) group. Participants in both groups received individual nutrition counselling and nutrition pamphlets, whereas only participants in the intervention group were given mobile phone text messages. Results: 42 participants completed the study. In comparison with the control group, the intervention group showed approximately 0.98 kg weight reduction after two months. Participants in intervention group also demonstrated clinically significant improvement in BMI, serum cholesterol level, and HDL level. There was no improvement of body fat percentage and body mass for both intervention and control groups. Conclusion: The nutritional wellness program for obese health care providers was feasible in hospital settings. Health care providers demonstrated short-term weight loss, decrease in serum fasting cholesterol level, and HDL level after completing the program.Keywords: weight management, weight control, health care providers, hospital
Procedia PDF Downloads 2495587 Perceived Procedural Justice and Organizational Citizenship Behavior: Evidence from a Security Organization
Authors: Noa Nelson, Orit Appel, Rachel Ben-ari
Abstract:
Organizational Citizenship Behavior (OCB) is voluntary employee behavior that contributes to the organization beyond formal job requirements. It can take different forms, such as helping teammates (OCB toward individuals; hence, OCB-I), or staying after hours to attend a task force (OCB toward the organization; hence, OCB-O). Generally, OCB contributes substantially to organizational climate, goals, productivity, and resilience, so organizations need to understand what encourages it. This is particularly challenging in security organizations. Security work is characterized by high levels of stress and burnout, which is detrimental to OCB, and security organizational design emphasizes formal rules and clear hierarchies, leaving employees with less freedom for voluntary behavior. The current research explored the role of Perceived Procedural Justice (PPJ) in enhancing OCB in a security organization. PPJ refers to how fair decision-making processes are perceived to be. It involves the sense that decision makers are objective, attentive to everyone's interests, respectful in their communications and participatory - allowing individuals a voice in decision processes. Justice perceptions affect motivation, and it was specifically suggested that PPJ creates an attachment to one's organization and personal interest in its success. Accordingly, PPJ had been associated with OCB, but hardly any research tested their association with security organizations. The current research was conducted among prison guards in the Israel Prison Service, to test a correlational and a causal association between PPJ and OCB. It differentiated between perceptions of direct commander procedural justice (CPJ), and perceptions of organization procedural justice (OPJ), hypothesizing that CPJ would relate to OCB-I, while OPJ would relate to OCB-O. In the first study, 336 prison guards (305 male) from 10 different prisons responded to questionnaires measuring their own CPJ, OPJ, OCB-I, and OCB-O. Hierarchical linear regression analyses indicated the significance of commander procedural justice (CPJ): It associated with OCB-I and also associated with OPJ, which, in turn, associated with OCB-O. The second study tested CPJ's causal effects on prison guards' OCB-I and OCB-O; 311 prison guards (275 male) from 14 different prisons read scenarios that described either high or low CPJ, and then evaluated the likelihood of that commander's prison guards performing OCB-I and OCB-O. In this study, CPJ enhanced OCB-O directly. It also contributed to OCB-I, indirectly: CPJ enhanced the motivation for collaboration with the commander, which respondents also evaluated after reading scenarios. Collaboration, in turn, associated with OCB-I. The studies demonstrate that procedural justice, especially commander's PJ, promotes OCB in security work environments. This is important because extraordinary teamwork and motivation are needed to deal with emergency situations and with delicate security challenges. Following the studies, the Israel Prison Service implemented personal procedural justice training for commanders and unit level programs for procedurally just decision processes. From a theoretical perspective, the studies extend the knowledge on PPJ and OCB to security work environments and contribute evidence on PPJ's causal effects. They also call for further research, to understand the mechanisms through which different types of PPJ affect different types of OCB.Keywords: organizational citizenship behavior, perceived procedural justice, prison guards, security organizations
Procedia PDF Downloads 2225586 Rural Territorial Sustainable Development: Interinstitutional Dialogue and Transition to Sustainable Livelihoods
Authors: Aico Nogueira
Abstract:
This paper examines the interinstitutional dialogues within the Brazilian federal structures, which comprises federal, state and local levels, around the themes of new approaches and interventions aimed to promote sustainable rural development, particularly rural development as part of a territorial approach. The work seeks to understand to what extent the various levels of the state interact with these strategies, particularly with the locally constituted powers, focusing on the importance of the transition of traditional agriculture methods to more sustainable agroecological systems and its effects on food security and sustainable rural development. The research analyses as case studies the Sustainable Rural Territories Development Program (PRONAT) of the Ministry of Agrarian Development at the federal level, as well as the State of São Paulo and the Vale do Ribeira Territory, an area characterized by environmental and social vulnerability, restrictive environmental laws and attempts to promote sustainable development. In order to examine how the interrelationships between different levels of governance and civil society, in addition to the neo-institutionalist polity centered literature, the research uses an adaptation of the concept of arena in Ostrom and Hannigan, produced at different scales of decision-making processes, as well as the multilevel governance literature. Document analysis, interviews, focus groups and direct observation techniques are also used. The main findings of this study are that how different levels of governance understand and organize themselves for this work and have a direct impact on the actions taken. Consequently, programs formulated for this purpose are not associated with the creation of institutions capable of breaking with a traditional sectoral view that has historically prevailed in policymaking. And the transition from traditional agriculture to agroecological production systems is hampered by a sectorial foundation, based on large-scale production and the strengthening of the traditional country's land concentration model.Keywords: agroecology, food security, inter-institutional dialogue, rural poverty, sustainable rural development, territorial development
Procedia PDF Downloads 2065585 Requirements Engineering via Controlling Actors Definition for the Organizations of European Critical Infrastructure
Authors: Jiri F. Urbanek, Jiri Barta, Oldrich Svoboda, Jiri J. Urbanek
Abstract:
The organizations of European and Czech critical infrastructure have specific position, mission, characteristics and behaviour in European Union and Czech state/ business environments, regarding specific requirements for regional and global security environments. They must respect policy of national security and global rules, requirements and standards in all their inherent and outer processes of supply-customer chains and networks. A controlling is generalized capability to have control over situational policy. This paper aims and purposes are to introduce the controlling as quite new necessary process attribute providing for critical infrastructure is environment the capability and profit to achieve its commitment regarding to the effectiveness of the quality management system in meeting customer/ user requirements and also the continual improvement of critical infrastructure organization’s processes overall performance and efficiency, as well as its societal security via continual planning improvement via DYVELOP modelling.Keywords: added value, DYVELOP, controlling, environments, process approach
Procedia PDF Downloads 4165584 Disaster Response Training Simulator Based on Augmented Reality, Virtual Reality, and MPEG-DASH
Authors: Sunho Seo, Younghwan Shin, Jong-Hong Park, Sooeun Song, Junsung Kim, Jusik Yun, Yongkyun Kim, Jong-Moon Chung
Abstract:
In order to effectively cope with large and complex disasters, disaster response training is needed. Recently, disaster response training led by the ROK (Republic of Korea) government is being implemented through a 4 year R&D project, which has several similar functions as the HSEEP (Homeland Security Exercise and Evaluation Program) of the United States, but also has several different features as well. Due to the unpredictiveness and diversity of disasters, existing training methods have many limitations in providing experience in the efficient use of disaster incident response and recovery resources. Always, the challenge is to be as efficient and effective as possible using the limited human and material/physical resources available based on the given time and environmental circumstances. To enable repeated training under diverse scenarios, an AR (Augmented Reality) and VR (Virtual Reality) combined simulator is under development. Unlike existing disaster response training, simulator based training (that allows remote login simultaneous multi-user training) enables freedom from limitations in time and space constraints, and can be repeatedly trained with different combinations of functions and disaster situations. There are related systems such as ADMS (Advanced Disaster Management Simulator) developed by ETC simulation and HLS2 (Homeland Security Simulation System) developed by ELBIT system. However, the ROK government needs a simulator custom made to the country's environment and disaster types, and also combines the latest information and communication technologies, which include AR, VR, and MPEG-DASH (Moving Picture Experts Group - Dynamic Adaptive Streaming over HTTP) technology. In this paper, a new disaster response training simulator is proposed to overcome the limitation of existing training systems, and adapted to actual disaster situations in the ROK, where several technical features are described.Keywords: augmented reality, emergency response training simulator, MPEG-DASH, virtual reality
Procedia PDF Downloads 3045583 Understanding Europe’s Role in the Area of Liberty, Security, and Justice as an International Actor
Authors: Barrere Sarah
Abstract:
The area of liberty, security, and justice within the European Union is still a work in progress. No one can deny that the EU struggles between a monistic and a dualist approach. The aim of our essay is to first review how the European law is perceived by the rest of the international scene. It will then discuss two main mechanisms at play: the interpretation of larger international treaties and the penal mechanisms of European law. Finally, it will help us understand the role of a penal Europe on the international scene with concrete examples. Special attention will be paid to cases that deal with fundamental rights as they represent an interesting case study in Europe and in the rest of the World. It could illustrate the aforementioned duality currently present in the Union’s interpretation of international public law. On the other hand, it will explore some specific European penal mechanism through mutual recognition and the European arrest warrant in the transnational criminality frame. Concerning the interpretation of the treaties, it will first, underline the ambiguity and the general nature of some treaties that leave the EU exposed to tension and misunderstanding then it will review the validity of an EU act (whether or not it is compatible with the rules of International law). Finally, it will focus on the most complete manifestation of liberty, security and justice through the principle of mutual recognition. Used initially in commercial matters, it has become “the cornerstone” of European construction. It will see how it is applied in judicial decisions (its main event and achieving success is via the European arrest warrant) and how European member states have managed to develop this cooperation.Keywords: European penal law, international scene, liberty security and justice area, mutual recognition
Procedia PDF Downloads 411