Search results for: security program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6512

Search results for: security program

5522 Counter-Terrorism and Civil Society in Nigeria

Authors: Emeka Thaddues Njoku

Abstract:

Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.

Keywords: counter-terrorism, civil society organizations, freedom, terrorism

Procedia PDF Downloads 396
5521 Analysis study According Some of Physical and Mechanical Variables for Joint Wrist Injury

Authors: Nabeel Abdulkadhim Athab

Abstract:

The purpose of this research is to conduct a comparative study according analysis of programmed to some of physical and mechanical variables for joint wrist injury. As it can be through this research to distinguish between the amount of variation in the work of the joint after sample underwent rehabilitation program to improve the effectiveness of the joint and naturally restore its effectiveness. Supposed researcher that there is statistically significant differences between the results of the tests pre and post the members research sample, as a result of submission the sample to the program of rehabilitation, which led to the development of muscle activity that are working on wrist joint and this is what led to note the differences between the results of the tests pre and post. The researcher used the descriptive method. The research sample included (6) of injured players in the wrist joint, as the average age (21.68) and standard deviation (1.13) either length average (178cm) and standard deviation (2.08). And the sample as evidenced homogeneous among themselves. And where the data were collected, introduced in program for statistical processing to get to the most important conclusions and recommendations and that the most important: 1-The commitment of the sample program the qualifying process variables studied in the search for the heterogeneity of study activity and effectiveness of wrist joint for injured players. 2-The analysis programmed a high accuracy in the measurement of the research variables, and which led to the possibility of discrimination into account differences in motor ability camel and injured in the wrist joint. To search recommendations including: 1-The use of computer systems in the scientific research for the possibility of obtaining accurate research results. 2-Programming exercises rehabilitation according to an expert system for possible use by patients without reference to the person processor.

Keywords: analysis of joint wrist injury, physical and mechanical variables, wrist joint, wrist injury

Procedia PDF Downloads 433
5520 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 284
5519 Enumerative Search for Crane Schedule in Anodizing Operations

Authors: Kanate Pantusavase, Jaramporn Hassamontr

Abstract:

This research aims to develop an algorithm to generate a schedule of multiple cranes that will maximize load throughputs in anodizing operation. The algorithm proposed utilizes an enumerative strategy to search for constant time between successive loads and crane covering range over baths. The computer program developed is able to generate a near-optimal crane schedule within reasonable times, i.e. within 10 minutes. Its results are compared with existing solutions from an aluminum extrusion industry. The program can be used to generate crane schedules for mixed products, thus allowing mixed-model line balancing to improve overall cycle times.

Keywords: crane scheduling, anodizing operations, cycle time minimization

Procedia PDF Downloads 467
5518 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 303
5517 Monitoring and Evaluation of Web-Services Quality and Medium-Term Impact on E-Government Agencies' Efficiency

Authors: A. F. Huseynov, N. T. Mardanov, J. Y. Nakhchivanski

Abstract:

This practical research is aimed to improve the management quality and efficiency of public administration agencies providing e-services. The monitoring system developed will provide continuous review of the websites compliance with the selected indicators, their evaluation based on the selected indicators and ranking of services according to the quality criteria. The responsible departments in the government agencies were surveyed; the questionnaire includes issues of management and feedback, e-services provided, and the application of information systems. By analyzing the main affecting factors and barriers, the recommendations will be given that lead to the relevant decisions to strengthen the state agencies competencies for the management and the provision of their services. Component 1. E-services monitoring system. Three separate monitoring activities are proposed to be executed in parallel: Continuous tracing of e-government sites using built-in web-monitoring program; this program generates several quantitative values which are basically related to the technical characteristics and the performance of websites. The expert assessment of e-government sites in accordance with the two general criteria. Criterion 1. Technical quality of the site. Criterion 2. Usability/accessibility (load, see, use). Each high-level criterion is in turn subdivided into several sub-criteria, such as: the fonts and the color of the background (Is it readable?), W3C coding standards, availability of the Robots.txt and the site map, the search engine, the feedback/contact and the security mechanisms. The on-line survey of the users/citizens – a small group of questions embedded in the e-service websites. The questionnaires comprise of the information concerning navigation, users’ experience with the website (whether it was positive or negative), etc. Automated monitoring of web-sites by its own could not capture the whole evaluation process, and should therefore be seen as a complement to expert’s manual web evaluations. All of the separate results were integrated to provide the complete evaluation picture. Component 2. Assessment of the agencies/departments efficiency in providing e-government services. - the relevant indicators to evaluate the efficiency and the effectiveness of e-services were identified; - the survey was conducted in all the governmental organizations (ministries, committees and agencies) that provide electronic services for the citizens or the businesses; - the quantitative and qualitative measures are covering the following sections of activities: e-governance, e-services, the feedback from the users, the information systems at the agencies’ disposal. Main results: 1. The software program and the set of indicators for internet sites evaluation has been developed and the results of pilot monitoring have been presented. 2. The evaluation of the (internal) efficiency of the e-government agencies based on the survey results with the practical recommendations related to the human potential, the information systems used and e-services provided.

Keywords: e-government, web-sites monitoring, survey, internal efficiency

Procedia PDF Downloads 308
5516 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law

Procedia PDF Downloads 130
5515 "Good" Discretion Among Private Sector Street Level Bureaucrats

Authors: Anna K. Wood, Terri Friedline

Abstract:

In April and May 2020, the private banking industry approved over 1.7 million emergency small business loans, totaling over $650 billion in federal relief funds as part of the Paycheck Protection Program (PPP). Since the program’s rollout, the extensive evidence of discriminatory lending and misuse of funds has been revealed by investigative journalism and academic studies. This study is based on 41 interviews with frontline banking industry professionals conducted during the days and weeks of the PPP rollout, presenting a real-time narrative of the program rollout through the eyes of those in the role of a street-level bureaucrat. We present two themes from this data about the conditions under which these frontline workers experienced the PPP: Exigent Timelines and Defaulting to Existing Workplace Norms and Practices. We analyze these themes using literature on street-level organizations, bureaucratic discretion, and the differences between public and private sector logic. The results of this study present new directions for theorizing sector-level differences in street-level bureaucratic discretion in the context of mixed-sector collaboration on public service delivery, particularly under conditions of crisis and urgency.

Keywords: street level bureaucracy, social policy, bureaucratic discretion, public private partnerships

Procedia PDF Downloads 109
5514 External Program Evaluation: Impacts and Changes on Government-Assisted Refugee Mothers

Authors: Akiko Ohta, Masahiro Minami, Yusra Qadir, Jennifer York

Abstract:

The Home Instruction for Parents of Preschool Youngsters (HIPPY) is a home instruction program for mothers of children 3 to 5 years old. Using role-play as a method of teaching, the participating mothers work with their home visitors and learn how to deliver the HIPPY curriculum to their children. Applying HIPPY, Reviving Hope and Home for High-risk Refugee Mothers Program (RHH) was created to provide more personalized peer support and to respond to ongoing settlement challenges for isolated and vulnerable Government Assisted Refugee (GAR) mothers. GARs often have greater needs and vulnerabilities than other refugee groups. While the support is available, they often face various challenges and barriers in starting their new lives in Canada, such as inadequate housing, low first-language literacy levels, low competency in English or French, and social isolation. The pilot project was operated by Mothers Matter Centre (MMC) from January 2019 to March 2021 in partnership with the Immigrant Services Society of BC (ISSofBC). The formative evaluation was conducted by a research team at Simon Fraser University. In order to provide more suitable support for GAR mothers, RHH intended to offer more flexibility in HIPPY delivery, supported by a home visitor, to meet the need of refugee mothers facing various conditions and challenges; to have a pool of financial resources to be used for the RHH families when necessitated during the program period; to have another designated staff member, called a community navigator, assigned to facilitate the support system for the RHH families in their settlement; to have a portable device available for each RHH mother to navigate settlement support resources; and to provide other variations of the HIPPY curriculum as an option for the RHH mothers, including a curriculum targeting pre-HIPPY age children. Reflections on each program component was collected from RHH mothers and staff members of MMC and ISSofBC, including frontline workers and management staff, through individual interviews and focus group discussions. Each of the RHH program components was analyzed and evaluated by applying Moore’s four domains framework to identify key information and generate new knowledge (data). To capture RHH mothers’ program experience more in depth based on their own reflections, the photovoice method was used. Some photos taken by the mothers will be shared to illustrate their RHH experience as part of their life stories. Over the period of the program, this evaluation observed how RHH mothers became more confident in various domains, such as communicating with others, taking public transportations alone, and teaching their own child(ren). One of the major factors behind the success was their home visitors’ flexibility and creativity to create a more meaningful and tailored approach for each mother, depending on her background and personal situation. The role of the community navigator was tested out and improved during the program period. The community navigators took the key role to assess the needs of the RHH families and connect them with community resources. Both the home visitors and community navigators were immigrant mothers themselves and owing to their dedicated care for the RHH mothers; they were able to gain trust and work closely and efficiently with RHH mothers.

Keywords: refugee mothers, settlement support, program evaluation, Canada

Procedia PDF Downloads 178
5513 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 487
5512 Nutrition Role in the Management of Psychiatric Disorders

Authors: Abeer Mohammed, Nevein Mustafa Elashery, Mona Hassan Abdel Aal, Ereny Wilson Nagib

Abstract:

The Aim of the current study is to investigate nutrition role in the management of psychiatric disorders. Research Design: A quasi- experimental research design was utilized for this study. Setting The study was conducted at outpatient clinic at Institute of Psychiatry affiliated to Ain Shams University hospitals, using a convenient sample of 50 psychiatric patients with depression, schizophrenia, bipolar disorders, and obsessive compulsive disorders. Tools: data were collected through; first, an interview questionnaire covering socio-demographic characteristics, second, nutrition assessment tools Third, nutrition risk assessment. Fourth, nutrition management program Results showed that there were highly statistically significant improvements in modified nutritional supplements for patients with depression, schizophrenia, bipolar disorders, and obsessive compulsive disorders' patients after conducting the nutrition management program. Regarding psychiatric patients’ knowledge about healthy food, healthy nutritional habits, and patients’ awareness & readiness for change, there were highly statistically significant improvements. Concerning signs and symptoms of psychiatric disorders, there were highly statistically significant improvements for depression, schizophrenia, bipolar disorders, and obsessive-compulsive patients after conducting the management program. In conclusion, the nutrition management program was effective in improving symptoms associated with, depression, schizophrenia, bipolar disorders, and obsessive compulsive disorders. The study recommended that nurses should have more contribution in counseling psychiatric patients, and their families about healthy diet and healthy habits. Further research should recommend studying the effectiveness of herbs on enhancing mental health for psychiatric patients.

Keywords: nutrition, role, management, psychiatric disorders

Procedia PDF Downloads 352
5511 Effects of Kinesio Taping on Pain and Functions of Chronic Nonspecific Low Back Pain Patients

Authors: Ahmed Assem Abd El Rahim

Abstract:

BACKGROUND: Low back pain (LBP) is enormously common health problem& most of subjects experience it at some point of their life. Kinesio-taping is one of therapy methods introduced for studied cases with nonspecific low back pain. OBJECTIVES: to look at how Kinesio-taping affects studied cases with non-specific low back pain in terms of discomfort, range of motion, & back muscular strength. SUBJECTS: 40 mechanical LBP patients aged 20-40 years had been assigned haphazardly into two groups, They had been selected from outpatient clinic, KasrAl-AiniHospital, Cairo university. Methods: GroupA: 20 patients received the I-shape KT longitudinally & conventional physiotherapy program. Group B:20 studied cases received application of the KT Horizontally & conventional physiotherapy program. pain had been measured by visual analog scale, Range of motion had been measured by Roland Morris Disability Questionnaire (RMDQ), & strength had been measured by an isokinetic dynamometer before & after therapy. Therapy sessions had been three times weekly for four weeks. RESULTS: Groups (A & B) discovered decrease in pain& disability and rise in their flexion, extension ROM & peak torque of trunk extensor after end of 4 weeks of program. mean values of pain scale after therapy had been 3.7 and 5.04 in groups A & B. mean values of Disability scale after treatment had been 7.87.and 9.35 in groups A & B. mean values of ROM of flexion had been 28.06, and 24.53 in groups A & B. mean values of ROM of extension had been 13.43 & 10.73 in groups A & B. mean values of Peak torque of lumbar extensors were 65.43 and 63.22 in groups A & B. Though, participants who received the I-shape KT longitudinally as well as conventional physiotherapy program (group A), discovered more reduction in pain& disability and more improvement in ROM of flexion, extension, and Peak torque of lumbar extensors value (P<0.001) after therapy program CONCLUSION: Therapeutic longitudinal Kinesio-taping application with conventional physiotherapy will be more valuable than Therapeutic horizontal Kinesio-taping application with conventional physiotherapy when treating nonspecific low back pain studied cases.

Keywords: Kinesio taping, function, low back pain, muscle power

Procedia PDF Downloads 67
5510 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 146
5509 Glycemic Control in Rice Consumption among Households with Diabetes Patients: The Role of Food Security

Authors: Chandanee Wasana Kalansooriya

Abstract:

Dietary behaviour is a crucial factor affecting diabetes control. With increasing rates of diabetes prevalence in Asian countries, examining their dietary patterns, which are largely based on rice, is timely required. It has been identified that higher consumption of some rice varieties is associated with increased risk of type 2 diabetes. Although diabetes patients are advised to consume healthier rice varieties, which contains low glycemic, several conditions, one of which food insecurity, make them difficult to preserve those healthy dietary guidelines. Hence this study tries to investigate how food security affects on making right decisions of rice consumption within diabetes affected households using a sample from Sri Lanka, a country which rice considered as the staple food and records the highest diabetes prevalence rate in South Asia. The study uses data from the Household Income and Expenditure Survey 2016, a nationally representative sample conducted by the Department of Census and Statistics, Sri Lanka. The survey used a two-stage stratified sampling method to cover different sectors and districts of the country and collected micro-data on demographics, health, income and expenditures of different categories. The study uses data from 2547 households which consist of one or more diabetes patients, based on the self-recorded health status. The Household Dietary Diversity Score (HDDS), which constructed based on twelve food groups, is used to measure the level of food security. Rice is categorized into three groups according to their Glycemic Index (GI), high GI, medium GI and low GI, and the likelihood and impact made by food security on each rice consumption categories are estimated using a Two-part Model. The shares of each rice categories out of total rice consumption is considered as the dependent variable to exclude the endogeneity issue between rice consumption and the HDDS. The results indicate that the consumption of medium GI rice is likely to increase with the increasing household food security, but low GI varieties are not. Households in rural and estate sectors are less likely and Tamil ethnic group is more likely to consume low GI rice varieties. Further, an increase in food security significantly decreases the consumption share of low GI rice, while it increases the share of medium GI varieties. The consumption share of low GI rice is largely affected by the ethnic variability. The effects of food security on the likelihood of consuming high GI rice varieties and changing its shares are statistically insignificant. Accordingly, the study concludes that a higher level of food security does not ensure diabetes patients are consuming healthy rice varieties or reducing consumption of unhealthy varieties. Hence policy attention must be directed towards educating people for making healthy dietary choices. Further, the study provides a room for further studies as it reveals considerable ethnic and sectorial differences in making healthy dietary decisions.

Keywords: diabetes, food security, glycemic index, rice consumption

Procedia PDF Downloads 107
5508 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 248
5507 REFLEX: A Randomized Controlled Trial to Test the Efficacy of an Emotion Regulation Flexibility Program with Daily Measures

Authors: Carla Nardelli, Jérome Holtzmann, Céline Baeyens, Catherine Bortolon

Abstract:

Background. Emotion regulation (ER) is a process associated with difficulties in mental health. Given its transdiagnostic features, its improvement could facilitate the recovery of various psychological issues. A limit of current studies is the lack of knowledge regarding whether available interventionsimprove ER flexibility (i.e., the ability to implement ER strategies in line with contextual demands), even though this capacity has been associated with better mental health and well-being. Therefore, the aim of the study is to test the efficacy of a 9-weeks ER group program (the Affect Regulation Training-ART), using the most appropriate measures (i.e., experience sampling method) in a student population. Plus, the goal of the study is to explore the potential mediative role of ER flexibility on mental health improvement. Method. This Randomized Controlled Trial will comparethe ER program group to an active control group (a relaxation program) in 100 participants. To test the mediative role of ER flexibility on mental health, daily measures will be used before, during, and after the interventions to evaluate the extent to which participants are flexible in their ER. Expected outcomes. Using multilevel analyses, we expect an improvement in anxious-depressive symptomatology for both groups. However, we expect the ART group to improve specifically on ER flexibility ability and the last to be a mediative variable on mental health. Conclusion. This study will enhance knowledge on interventions for students and the impact of interventions on ER flexibility. Also, this research will improve knowledge on ecological measures for assessing the effect of interventions. Overall, this project represents new opportunities to improve ER skills to improve mental health in undergraduate students.

Keywords: emotion regulation flexibility, experience sampling method, psychological intervention, emotion regulation skills

Procedia PDF Downloads 141
5506 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 210
5505 The Effects of a Nursing Dignity Care Program on Patients’ Dignity in Care

Authors: Yea-Pyng Lin

Abstract:

Dignity is a core element of nursing care. Maintaining the dignity of patients is an important issue because the health and recovery of patients can be adversely affected by a lack of dignity in their care. The aim of this study was to explore the effects of a nursing dignity care program upon patients’ dignity in care. A quasi-experimental research design was implemented. Nurses were recruited by purposive sampling, and their patients were recruited by simple random sampling. Nurses in the experimental group received the nursing educational program on dignity care, while nurses in the control group received in-service education as usual. Data were collected via two instruments: the dignity in care scale for nurses and the dignity in care scale to patients, both of which were developed by the researcher. Both questionnaires consisted of three domains: agreement, importance, and frequencies of providing dignity care. A total of 178 nurses in the experimental group and 193 nurses in the control group completed the pretest and the follow-up evaluations at the first month, the third month, and the sixth month. The number of patients who were cared for by the nurses in the experimental group was 94 in the pretest. The number of patients in the post-test at the first, third, and sixth months were 91, 85, and 77, respectively. In the control group, 88 patients completed the II pretest, and 80 filled out the post-test at the first month, 77 at the third, and 74 at the sixth month. The major findings revealed the scores of agreement domain among nurses in the experimental group were found significantly different from those who in the control group at each point of time. The scores of importance domain between these two groups also displayed significant differences at pretest and the first month of post-test. Moreover, the frequencies of proving dignity care to patients were significant at pretest, the third month and sixth month of post-test. However, the experimental group had only significantly different from those who in the control group on the frequencies of receiving dignity care especially in the items of ‘privacy care,’ ‘communication care,’ and ‘emotional care’ for the patients. The results show that the nursing program on dignity care could increase nurses’ dignity care for patients in three domains of agreement, importance, and frequencies of providing dignity care. For patients, only the frequencies of receiving dignity care were significantly increased. Therefore, the nursing program on dignity care could be applicable for nurses’ in-service education and practice to enhance the ability of nurses to care for patient’s dignity.

Keywords: nurses, patients, dignity care, quasi-experimental, nursing education

Procedia PDF Downloads 469
5504 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core

Authors: Yashas Bedre Raghavendra, Pim Vullers

Abstract:

This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.

Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction

Procedia PDF Downloads 74
5503 The Effectiveness of Laughing Qigong for Women with Breast Cancer in Community

Authors: Chueh Chang, Chia-jung Hsieh, Fu-yu Yu, Yu-Hwa Lin

Abstract:

Background:The majority of women diagnosed with breast cancer undergo treatment involving surgery and radiotherapy or chemotherapy, or both. With these major advances in breast cancer management, many patients still have to deal with short or long-term side effects and psychological distress related to the disease and treatment, which have a substantial impact on their quality of life. The Laughing Qigong Program (LQP) is an interactive laughter program that combines the physical and physiological benefits of laughter with the mental benefits of Chinese qigong. Purpose: In order to improve the quality of life for breast cancer women in the community as well as echoing the WHO 2004 “Promoting Mental Health” for every one. This study focused on how to promote the positive mental health for women of breast cancer through the “laughter program” in Taiwan. During the presentation, how to practice Laughing Qigong will be demonstrated. Method: Using nonequivalent pretest-posttest design, ix-one breast cancer patients were volunteered to enroll in this study from the Taiwan Breast Cancer Alliance (TBCA). Thirty patients were assigned to the experimental group and the other 31 patients were assigned to the control group. The women who were assigned to the experimental group received laughter program one hour per session, once a week, totally 12 sessions. All subjects were tested before and after the intervention on the following: Self-Esteem scale (RSE), Face Scale (FS), Anxiety and pain experience were measured as psychological markers; saliva cortisol (CS) as an immunological marker; blood pressure (BP), heart rate (HR),and heart rate variability (HRV) as physiological markers of the body’s response to stress. Results: After comparing the experimental and control groups, the results revealed that those breast cancer women with “laughing program” their sense of humor were improved, less uncomfortable on self report physical conditions, more positive attitudes toward stress management by using laughter, and had emotional improvement according to the face scale.

Keywords: mental health promotion, breast cancer, laughing Qigong, women

Procedia PDF Downloads 491
5502 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 525
5501 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 175
5500 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks

Authors: Sulemana Ibrahim

Abstract:

Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.

Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks

Procedia PDF Downloads 67
5499 Readiness Assessment to Implement Net-Zero Energy Building Program of Government Buildings in the Philippines

Authors: Patrick T. Aquino, Jimwel B. Balunday, Cephas Olivier V. Cabatit, Mary Grace Q. Razonable

Abstract:

In 2023, the Philippine Department of Energy (PDOE) published the National Energy Efficiency and Conservation Plan (NEECP) and Roadmap 2023-2050 to be the basis of a comprehensive program for the efficient supply and economical use of energy. The building sector, as one of the most energy-intensive sectors, shall conform to the energy-conserving design to reduce the use of energy. The concept of Net-Zero Energy Building (NZEB), and its definitions promote to improve energy efficiency of the buildings. The PDOE partnered with Meralco Power Academy to survey and conduct focus group discussions to establish the readiness into NZE-aspiring buildings of government entities. This paper outlines important NZEB principles, best practices from other countries, issues and gaps relating to energy management program, and the recommendations on the development of a framework for NZEB under government building in the Philippines. Results revealed the limitation on specific data to establish a baseline building energy efficiency performance index and significant energy uses; the need to update the Guidelines for Energy Conservation Design of Buildings, including NZEB definition and requirements; appropriate enabling infrastructures and programs to transition government buildings into NZE-aspiring buildings to Nearly Zero Energy Buildings by 2050.

Keywords: NZEB, energy efficiency, buildings, Philippines

Procedia PDF Downloads 96
5498 Value Clusters of Grade 9 Teachers in the District of Trece Martires City, Division of Cavite: Basis for a Revised Values Education Program (RVEP)"

Authors: Juland D. Salayo

Abstract:

With numerous innovations introduced in the Philippine educational system, the country’s struggle of materializing its national goal of transforming lives ends with great loss. Many agree that the failure to emerge the integral values of the program, framework and the implementers impedes realization. Employing a descriptive-correlational method, it aimed to determine the value clusters of the Grade 9 teachers as assessed by themselves and by the students, the significant difference of the assessed values and the significant difference on the values based on their profile. Respondents were composed of sixty-nine (69) teachers and three hundred forty (340) students using simple random sampling. Through a survey-questionnaire, the study revealed that the teachers have high regards on their self-reliance, honesty and trustworthiness, obedience, politeness and respect and self-discipline and spirituality. In contrast, they have ranked the following values fairly: justice and fairness, courage, responsibility and punctuality and nationalism and patriotism. Having assessed by the students, they have highly regarded their teachers’ self-reliance, responsibility and punctuality, obedience, politeness and respect and fair play and sportsmanship. On the other hand, the student-respondents made a low assessment on the level of the teachers’ justice and fairness, nationalism and patriotism, honesty and trustworthiness and excellence. Using t-test, it showed that there is a significant difference between the assessments of the respondents. Finally, among the demographic profiles, only civil status and age rejected the hypothesis. The following were recommended: provide educators value-enhancement trainings and conferences, organize value-oriented organizations and activities, and make intensive value-campaigns heightening the low-assessed values. Thus, a Revised Values Education Program (RVEP) was made to further meet the objectives of the program, address the needs of its clienteles, and responding to the demands of both education and society towards excellence in service, social and economic revolution, and constructive national goals which are based from integral values.

Keywords: values, value clusters, values education program, values education, teachers' assessed values

Procedia PDF Downloads 289
5497 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)

Authors: Tewelde Gebresslase Haile, S. P. Singh

Abstract:

To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.

Keywords: social protection, livelihood assets, social vulnerability, public policy SVI

Procedia PDF Downloads 95
5496 Evaluating the Impact of a Child Sponsorship Program on Paediatric Health and Development in Calauan, Philippines: A Retrospective Audit

Authors: Daniel Faraj, Arabella Raupach, Charlotte Hespe, Helen Wilcox, Kristie-Lee Anning

Abstract:

Aim: International child sponsorship programs comprise a considerable proportion of global aid accessible to the general population. Team Philippines (TP), a healthcare and welfare initiative run in association with the University of Notre Dame Sydney since 2013, leads a holistic sponsorship program for thirty children from Calauan, Philippines. To date, empirical research has not been performed on the overall success and impact of the TP child sponsorship program. As such, this study aims to evaluate its effectiveness in improving pediatric outcomes. Methods: Study cohorts comprised thirty sponsored and twenty-nine age- and gender-matched non-sponsored children. Data were extracted from the TP Medical Director database and lifestyle questionnaires for July-November 2019. Outcome measures included anthropometry, markers of medical health, dental health, exercise, and diet. Statistical analyses were performed in SPSS. Results: Sponsorship resulted in fewer medical diagnoses and prescription medications, superior dental health, and improved diet. Further, sponsored children may show a clinically significant trend toward improved physical health. Sponsorship did not affect growth and development metrics or levels of physical activity. Conclusions: The TP child sponsorship program significantly impacts positive pediatric health outcomes in the Calauan community. The strength of the program lies in its holistic, sustainable, and community-based model, which is enabled by effective international child sponsorship. This study further supports the relationship between supporting early livelihood and improved health in the pediatric population.

Keywords: child health, public health, health status disparities, healthcare disparities, social determinants of health, morbidity, community health services, culturally competent care, medically underserved areas, population health management, Philippines

Procedia PDF Downloads 117
5495 Second Language Skill through M-Learning

Authors: Subramaniam Chandran, A. Geetha

Abstract:

This paper addresses three issues: how to prepare the instructional design for imparting English language skill from inter-disciplinary self-learning material; how the disadvantaged students are benefited from such kind of language skill imparted through m-learning; and how do m-learners perform better than the other learners. This paper examines these issues through an experimental study conducted among the distance learners enrolled in a preparatory program for bachelor’s degree. This program is designed for the disadvantaged learners especially for the school drop-outs to qualify to pursue graduate program through distant education. It also explains how mobile learning helps them to enhance their capacity in learning despite their rural background and other disadvantages. In India, nearly half of the students enrolled in schools do not complete their study. The pursuance of higher education is very low when compared with developed countries. This study finds a significant increase in their learning capacity and mobile learning seems to be a viable alternative where the conventional system could not reach the disadvantaged learners. Improving the English language skill is one of the reasons for such kind of performance. Exercises framed from the relevant self-learning material for enhancing English language skill not only improves language skill but also widens the subject-knowledge. This paper explains these issues out of the study conducted among the disadvantaged learners.

Keywords: English language skill, disadvantaged learners, distance education, m-learning

Procedia PDF Downloads 429
5494 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 138
5493 Reflections from Participants and Researchers on a Trauma-Sensitive Yoga Program

Authors: Jessica Gladden

Abstract:

This study explored the perceived benefits of trauma-sensitive yoga programs. Participants attended one of two six-week trauma-sensitive yoga programs utilizing the G.R.A.C.E model, a format developed based on Emerson’s trauma-sensitive yoga guidelines and modified by the instructors. Participants in this study completed surveys on their experiences. The results of the surveys indicated that participants perceived improvements in self-care, embodiment, and mood. These results show that trauma-sensitive yoga may have benefits beyond the treatment of specific diagnoses that could be applied to a variety of populations. Reflections from one of the researchers who teaches in this program, as well as qualitative statements from the participants, will be shared to support the continued use of this method.

Keywords: yoga, trauma-sensitive, yoga therapy, trauma

Procedia PDF Downloads 167