Search results for: employee security behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9347

Search results for: employee security behavior

8237 Risk Management Approach for a Secure and Performant Integration of Automated Drug Dispensing Systems in Hospitals

Authors: Hind Bouami, Patrick Millot

Abstract:

Medication dispensing system is a life-critical system whose failure may result in preventable adverse events leading to longer patient stays in hospitals or patient death. Automation has led to great improvements in life-critical systems as it increased safety, efficiency, and comfort. However, critical risks related to medical organization complexity and automated solutions integration can threaten drug dispensing security and performance. Knowledge about the system’s complexity aspects and human machine parameters to control for automated equipment’s security and performance will help operators to secure their automation process and to optimize their system’s reliability. In this context, this study aims to document the operator’s situation awareness about automation risks and parameters involved in automation security and performance. Our risk management approach has been deployed in the North Luxembourg hospital center’s pharmacy, which is equipped with automated drug dispensing systems since 2009. With more than 4 million euros of gains generated, North Luxembourg hospital center’s success story was enabled by the management commitment, pharmacy’s involvement in the implementation and improvement of the automation project, and the close collaboration between the pharmacy and Sinteco’s firm to implement the necessary innovation and organizational actions for automated solutions integration security and performance. An analysis of the actions implemented by the hospital and the parameters involved in automated equipment’s integration security and performance has been made. The parameters to control for automated equipment’s integration security and performance are human aspects (6.25%), technical aspects (50%), and human-machine interaction (43.75%). The implementation of an anthropocentric analysis system before automation would have prevented and optimized the control of risks related to automation.

Keywords: Automated drug delivery systems, Hospitals, Human-centered automated system, Risk management

Procedia PDF Downloads 122
8236 Behavior of the Foundation of Bridge Reinforced by Rigid and Flexible Inclusions

Authors: T. Karech A. Noui, T. Bouzid

Abstract:

This article presents a comparative study by numerical analysis of the behavior of reinforcements of clayey soils by flexible columns (stone columns) and rigid columns (piles). The numerical simulation was carried out in 3D for an assembly of foundation, columns and a pile of a bridge. Particular attention has been paid to take into account the installation of the columns. Indeed, in practice, due to the compaction of the column, the soil around it sustains a lateral expansion and the horizontal stresses are increased. This lateral expansion of the column can be simulated numerically. This work represents a comparative study of the interaction between the soil on one side, and the two types of reinforcement on the other side, and their influence on the behavior of the soil and of the pile of a bridge.

Keywords: piles, stone columns, interaction, foundation, settlement, consolidation

Procedia PDF Downloads 258
8235 Predictors of Behavior Modification Prior to Bariatric Surgery

Authors: Rosemarie Basile, Maria Loizos, John Pallarino, Karen Gibbs

Abstract:

Given that complications can be significant following bariatric surgery and with rates of long-term success measured in excess weight loss varying as low as 33% after five years, an understanding of the psychological factors that may mitigate findings and increase success and result in better screening and supports prior to surgery are critical. An internally oriented locus of control (LOC) has been identified as a predictor for success in obesity therapy, but has not been investigated within the context of bariatric surgery. It is hypothesized that making behavioral changes prior to surgery which mirror those that are required post-surgery may ultimately predict long-term success. 122 subjects participated in a clinical interview and completed self-report measures including the Multidimensional Health Locus of Control Scale, Overeating Questionnaire (OQ), and Lifestyle Questionnaire (LQ). Pearson correlations were computed between locus of control orientation and likelihood to make behavior changes prior to surgery. Pearson correlations revealed a positive correlation between locus of control and likelihood to make behavior changes r = 0.23, p < .05. As hypothesized, there was a significant correlation between internal locus of control and likelihood to make behavior changes. Participants with a higher LOC believe that they are able to make decisions about their own health. Future research will focus on whether this positive correlation is a predictor for future bariatric surgery success.

Keywords: bariatric surgery, behavior modification, health locus of control, overeating questionnaire

Procedia PDF Downloads 293
8234 Variants of Fat Mass Obesity Associated rs 9939609 Associated with Obesity and Eating Behavior in Adolescent of Minangkabau Ethnic

Authors: Susmiati, Ingrid S. Surono, Jamsari, Nur Indrawati Lipoeto

Abstract:

There are two contradicting opinions on the relationship between fat mass obesity associated (FTO) rs 9939609 variants and obesity on various ethnics and races. The first opinion agrees that there is an association between the two variables, yet another one disagree. Minangkabau ethnic had a different dietary pattern with other ethnics in Indonesia. They had higher fat and low fiber intakes compared to the other ethnics groups. There is little research in genetic factors that influence eating behavior (food preference or food selection). The objective of this study was to investigate the association between FTO rs 9939609 variants with obesity and eating behavior in adolescent girls of Minangkabau Ethnic. The research design was case control study. A total of 275 adolescent girls aged 12-15 years old (130 obese and 145 normal) were randomly chosen from four districts at West Sumatera (Padang, Padang Pariaman, Padang Panjang and Tanah Datar). Genetic variants of FTO rs 9939609 were analyzed with Tetra-primer Amplification Refractory Mutation System-Polimerase Chain Reaction (AMRS PCR), eating behavior were gathered using eating habits questionnaire, and Body Mass Index (BMI) was calculated according to BMI Z-score (WHO). The result showed that genetic variants of FTO rs 9939609 (TT, TA and AA genotype) had associated with obesity (p = 0,013), whereas subject with An Allele was significantly associated with obesity (odds ratio 1,62 [95% confidential interval, 1,00-2,60]). Subjects with An Allele carrier reported a higher consumption of fried food (p < 0.05) as compared to TT genotypes carriers. There is no association between genetic variants and meal frequency, fruit and fiber intakes p > 0.05. The genetic variants of FTO rs 9939609 are associated with obesity and eating behavior in adolescent of Minangkabau Ethics.

Keywords: FTO rs9939609, obesity, eating behavior, adolescents

Procedia PDF Downloads 157
8233 A Comparative Study on Creep Modeling in Composites

Authors: Roham Rafiee, Behzad Mazhari

Abstract:

Composite structures, having incredible properties, have gained considerable popularity in the last few decades. Among all types, polymer matrix composites are being used extensively due to their unique characteristics including low weight, convenient fabrication process and low cost. Having polymer as matrix, these type of composites show different creep behavior when compared to metals and even other types of composites since most polymers undergo creep even in room temperature. One of the most challenging topics in creep is to introduce new techniques for predicting long term creep behavior of materials. Depending on the material which is being studied the appropriate method would be different. Methods already proposed for predicting long term creep behavior of polymer matrix composites can be divided into five categories: (1) Analytical Modeling, (2) Empirical Modeling, (3) Superposition Based Modeling (Semi-empirical), (4) Rheological Modeling, (5) Finite Element Modeling. Each of these methods has individual characteristics. Studies have shown that none of the mentioned methods can predict long term creep behavior of all PMC composites in all circumstances (loading, temperature, etc.) but each of them has its own priority in different situations. The reason to this issue can be found in theoretical basis of these methods. In this study after a brief review over the background theory of each method, they are compared in terms of their applicability in predicting long-term behavior of composite structures. Finally, the explained materials are observed through some experimental studies executed by other researchers.

Keywords: creep, comparative study, modeling, composite materials

Procedia PDF Downloads 422
8232 The Mediation Effect of PTSD and Aggression on the Relationship of Childhood Physical Abuse and Suicidal Behavior in Homeless People

Authors: Jina Hong, Seongeun Ryu, Sungeun You

Abstract:

Suicide rate among homeless people are much higher than one in the general population. The purpose of this study was to examine the mediating effect of PTSD and aggression in the relationship between childhood physical abuse and suicidal behavior among homeless people. One hundred one homeless were recruited from street and shelters in Korea. Face-to-face interviews were conducted by master’s level graduate students or facility employees of shelters. All participants completed the Suicidal Behaviors Questionnaire-Revised (SBQ-R), Life History of Aggression Questionnaire (LHAQ), Primary Care PTSD (PC-PTSD), and Traumatic Life Events Questionnaire (TLEQ). The average age of homeless people participated in the study was 55.2 years (SD = 10.7) with the age range of 30 to 87. Results indicated that PTSD symptoms and aggression fully mediated the relationship between childhood physical abuse and suicidal behavior among the homeless. These findings suggest the need for trauma-informed care for the homeless, and warrant the need for psychological services for PTSD and aggression in order to reduce suicide risk among homeless people.

Keywords: aggression, homeless, PTSD, suicidal behavior

Procedia PDF Downloads 364
8231 Design and Implementation of a Nano-Power Wireless Sensor Device for Smart Home Security

Authors: Chia-Chi Chang

Abstract:

Most battery-driven wireless sensor devices will enter in sleep mode as soon as possible to extend the overall lifetime of a sensor network. It is necessary to turn off unnecessary radio and peripheral functions, especially the radio unit always consumes more energy than other components during wireless communication. The microcontroller is the most important part of the wireless sensor device. It is responsible for the manipulation of sensing data and communication protocols. The microcontroller always has different sleep modes, each with a different level of energy usage. The deeper the sleep, the lower the energy consumption. Most wireless sensor devices can only enter the sleep mode: the external low-frequency oscillator is still running to wake up the sleeping microcontroller when the sleep timer expires. In this paper, our sensor device can enter the extended sleep mode: none of the oscillator is running and the wireless sensor device has the nanoampere consumption and self-awaking ability. Finally, these wireless sensor devices were deployed in a smart home security network.

Keywords: wireless sensor network, battery-driven, sleep mode, home security

Procedia PDF Downloads 289
8230 Effect of Aggregate Size on Mechanical Behavior of Passively Confined Concrete Subjected to 3D Loading

Authors: Ibrahim Ajani Tijani, C. W. Lim

Abstract:

Limited studies have examined the effect of size on the mechanical behavior of confined concrete subjected to 3-dimensional (3D) test. With the novel 3D testing system to produce passive confinement, concrete cubes were tested to examine the effect of size on stress-strain behavior of the specimens. The effect of size on 3D stress-strain relationship was scrutinized and compared to the stress-strain relationship available in the literature. It was observed that the ultimate stress and the corresponding strain was related to the confining rigidity and size. The size shows a significant effect on the intersection stress and a new model was proposed for the intersection stress based on the conceptual design of the confining plates.

Keywords: concrete, aggregate size, size effect, 3D compression, passive confinement

Procedia PDF Downloads 191
8229 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 118
8228 Social Identification among Employees: A System Dynamic Approach

Authors: Muhammad Abdullah, Salman Iqbal, Mamoona Rasheed

Abstract:

Social identity among people is an important source of pride and self-esteem, consequently, people struggle to preserve a positive perception of their groups and collectives. The purpose of this paper is to explain the process of social identification and to highlight the underlying causal factors of social identity among employees. There is a little research about how the social identity of employees is shaped in Pakistan’s organizational culture. This study is based on social identity theory. This study uses Systems’ approach as a research methodology. The feedback loop approach is applied to explain the underlying key elements of employee behavior that collectively form social identity among social groups in corporate arena. The findings of this study reveal that effective, evaluative and cognitive components of an individual’s personality are associated with the social identification. The system dynamic feedback loop approach has revealed the underlying structure that is associated with social identity, social group formation, and effective component proved to be the most associated factor. This may also enable to understand how social groups become stable and individuals act according to the group requirements. The value of this paper lies in the understanding gained about the underlying key factors that play a crucial role in social group formation in organizations. It may help to understand the rationale behind how employees socially categorize themselves within organizations. It may also help to design effective and more cohesive teams for better operations and long-term results. This may help to share knowledge among employees as well. The underlying structure behind the social identification is highlighted with the help of system modeling.

Keywords: affective commitment, cognitive commitment, evaluated commitment, system thinking

Procedia PDF Downloads 117
8227 A Structural Constitutive Model for Viscoelastic Rheological Behavior of Human Saphenous Vein Using Experimental Assays

Authors: Rassoli Aisa, Abrishami Movahhed Arezu, Faturaee Nasser, Seddighi Amir Saeed, Shafigh Mohammad

Abstract:

Cardiovascular diseases are one of the most common causes of mortality in developed countries. Coronary artery abnormalities and carotid artery stenosis, also known as silent death, are among these diseases. One of the treatment methods for these diseases is to create a deviatory pathway to conduct blood into the heart through a bypass surgery. The saphenous vein is usually used in this surgery to create the deviatory pathway. Unfortunately, a re-surgery will be necessary after some years due to ignoring the disagreement of mechanical properties of graft tissue and/or applied prostheses with those of host tissue. The objective of the present study is to clarify the viscoelastic behavior of human saphenous tissue. The stress relaxation tests in circumferential and longitudinal direction were done in this vein by exerting 20% and 50% strains. Considering the stress relaxation curves obtained from stress relaxation tests and the coefficients of the standard solid model, it was demonstrated that the saphenous vein has a non-linear viscoelastic behavior. Thereafter, the fitting with Fung’s quasilinear viscoelastic (QLV) model was performed based on stress relaxation time curves. Finally, the coefficients of Fung’s QLV model, which models the behavior of saphenous tissue very well, were presented.

Keywords: Viscoelastic behavior, stress relaxation test, uniaxial tensile test, Fung’s quasilinear viscoelastic (QLV) model, strain rate

Procedia PDF Downloads 310
8226 Numerical Study of the Dynamic Behavior of an Air Conditioning with a Muti Confined Swirling Jet

Authors: Mohamed Roudane

Abstract:

The objective of this study is to know the dynamic behavior of a multi swirling jet used for air conditioning inside a room. To conduct this study, we designed a facility to ensure proper conditions of confinement in which we placed five air blowing devices with adjustable vanes, providing multiple swirling turbulent jets. The jets were issued in the same direction and the same spacing defined between them. This study concerned the numerical simulation of the dynamic mixing of confined swirling multi-jets, and examined the influence of important parameters of a swirl diffuser system on the dynamic performance characteristics. The CFD investigations are carried out by a hybrid mesh to discretize the computational domain. In this work, the simulations have been performed using the finite volume method and FLUENT solver, in which the standard k-ε RNG turbulence model was used for turbulence computations.

Keywords: simulation, dynamic behavior, swirl, turbulent jet

Procedia PDF Downloads 379
8225 Effect of Exercise on Sexual Behavior and Semen Quality of Sahiwal Bulls

Authors: Abdelrasoul, Khalid Ahmed Elrabie

Abstract:

The study was conducted on Sahiwal cattle bulls maintained at the Artificial Breeding Complex, NDRI, Karnal, Hayana, India, to determine the effect of exercise on the sexual behavior and semen quality. Fourteen Sahiwal bulls were classified into two groups of seven each. Group-1, bulls were exercised by walking in a bull exerciser once a week one hour before semen collection, whereas bulls in group-2 were exercised daily. Sexual behavior and semen quality traits studied were: Reaction time (RT), Dismounting time (DMT), Total time taken in mounts (TTTM), Flehmen response (FR), Erection Score (ES), Protrusion Score (PS), Intensity of thrust (ITS), Temperament Score (TS), Libido Score (LS), Semen volume, Physical appearance, Mass activity, Initial progressive motility, Non-eosinophilic spermatozoa count (NESC) and post thaw motility percent. Data were analyzed by least squares technique. Group-2 showed significantly (p < 0.01) higher value in RT (sec), DMT (sec), TTTM (sec), ES, PS, ITS, LS, semen volume, semen color density and mass activity.

Keywords: exercise, Sahiwal bulls, semen quality, sexual behavior

Procedia PDF Downloads 311
8224 Naltrexone and Borderline Personality Disorder: A Brief Review

Authors: Azadeh Moghaddas, Mehrnoush Dianatkhah, Padideh Ghaeli

Abstract:

The main characteristics of borderline personality disorder (BPD) are instable regulation of affect and self-image, impulsive behavior, and lack of interpersonal relationships. Clinically, emotional dysregulation, impulsive aggression, repeated self-injury, and suicidal thought are noted with this disorder. Proper management of patients with BPD is a difficult challenge due to the complex features of this disorder. Pharmacotherapy of BPD in order to control impulsive behavior and to stabilize affect in patients with BPD has been receiving a lot of attention. Anticonvulsant agents such as topiramate, valproate, or lamotrigine, atypical antipsychotics such as aripiprazole and olanzapine and antidepressants such as monoamine oxidase inhibitors and selective serotonin reuptake inhibitors like fluvoxamine have been implicated in the treatment of BPD. Unfortunately, none of these medications can be used alone or even in combination as sole treatment of BPD. Medications may be used mostly to resolve or reduce impulsivity and aggression in these patients. Naltrexone (NTX), a nonspecific competitive opiate antagonist has been suggested, in the literature, to control self-injurious behavior (SIB) and dissociative symptoms in patients with BPD. This brief review has been intended to look at all documented evidence on the use of NTX in the management of BPD and to reach a comprehensive conclusion.

Keywords: borderline personality disorder, naltrexone, self-injurious behavior, dissociative symptoms

Procedia PDF Downloads 278
8223 The Effect of Connections Form on Seismic Behavior of Portal Frames

Authors: Kiavash Heidarzadeh

Abstract:

The seismic behavior of portal frames is mainly based on the shape of their joints. In these structures, vertical and inclined connections are the two general forms of connections. The shapes of connections can make differences in seismic responses of portal frames. Hence, in this paper, for the first step, the non-linear performance of portal frames with vertical and inclined connections has been investigated by monotonic analysis. Also, the effect of section sizes is considered in this analysis. For comparison, hysteresis curves have been evaluated for two model frames with different forms of connections. Each model has three various sizes of the column and beam. Other geometrical parameters have been considered constant. In the second step, for every model, an appropriate size of sections has been selected from the previous step. Next, the seismic behavior of each model has been analyzed by the time history method under three near-fault earthquake records. Finite element ABAQUS software is used for simulation and analysis of samples. Outputs show that connections form can impact on reaction forces of portal frames under earthquake loads. Also, it is understood that the load capacity in frames with vertical connections is more than the frames with inclined connections.

Keywords: inclined connections, monotonic, portal frames, seismic behavior, time history, vertical connections

Procedia PDF Downloads 214
8222 Segregation of Domestic Solid Waste: An Evidence of Households’ Knowledge, Attitude, Behavior, and Challenges from Manipal, India

Authors: Vidya Pratap, Seena Biju, A. Keshavdev

Abstract:

The ever-increasing quantity and variety of domestic solid waste pose a major challenge to both households as well as to municipal authorities. In keeping with the Indian Prime Minister’s mission of Swachh Bharat (Clean India), the local municipal administration distributed 2 buckets to each household in a residential colony in Manipal (an educational town in southern India). Households were instructed to segregate their waste into wet and dry waste and keep these buckets at their gate for daily collection. This paper captures the knowledge, attitude, and behavior of 145 households along with the challenges they face in segregating their wastes. Survey representatives self-administered a questionnaire based on 107 variables that gathered demographic details, attitude and behavior constructs, knowledge about waste segregation and method of disposal for organic, recyclable and hazardous wastes. The study used descriptive tools to explore the data. While 95% of the respondents preferred good segregation practices, only 86% of them exhibited such behavior. 88% of the families observed had members who were either graduates or post-graduates whereas only 37% of the families had women who were working. In both attitude and behavior, 63% of the households did not have working women. Also, among those who practiced segregation, 7% were observed to not practice segregation in spite of the lady member being at home (The authors of this study in no way intend to name women as responsible for waste segregation at home; this thought is based on the fact that while in conversation with households, all respondents opined that women lead this activity). The findings of the study are intended to add value to the existing perceptions of the municipality regarding citizen behavior towards policy implementation/improvement. India as a country faces roadblocks at many levels of policy implementation. The findings of this study are meant to contribute/clarify about the Clean India drive.

Keywords: attitude, behavior, knowledge, segregation of domestic waste

Procedia PDF Downloads 156
8221 Designing Roudbar Residential Complex Inspired by Anti-Seismic Technologies

Authors: Sara Hadad Dabaghi

Abstract:

Iran is among the first five earthquake prone regions of the world. During the past 90 years, more than 85 catastrophic earthquakes have happened in Iran, leaving approximately 120000 casualties. Therefore, it is necessary to apply modern anti-seismic technologies to the construction of building such earthquake prone zones. This is especially the case with the northern regions of this country where the existence Khazar and Alborz Faults necessitate the observation of building construction security. Thus, the goal of this research is to solve this problem and to design earthquake resistant buildings. The present study is descriptive-analytical carried out on a mixed method platform. The study focuses on designing Roudbar Residential Complex adopting an anti-seismic approach. It is a cross-sectional applied research since its findings could be used to solve the security problems of Roudbar building with respect to earthquakes of the regions. The causality relationship in this research could be formulated as follows: the novel anti-seismic technologies increase security and reduce damages caused by earthquakes.

Keywords: design, residential complex, inspiration, anti-seismic technology, Roudbar

Procedia PDF Downloads 273
8220 Is Fashion Consumption Ageless? A Study of Differences in Fashion Consumption Behavior of Generation X, Y, and Z Females

Authors: Vaishali Joshi, Pallav Joshi

Abstract:

The main objective of this study is to examine the fashion consumption behavior of females with respect to their age group. Differences were studied in the pre-purchase, purchase and post-purchase behavior of females belonging to three age cohorts such as Generation X, Generation Y, and Generation Z. Quantitative approach was used to conduct this research. Data was collected through structured questionnaire. The questionnaire consisted of three sections. Section one included a question of the source of information of purchasing fashion apparels which measure the pre-purchase behavior. Section two measures purchase behavior which included two questions: i. motivations for purchasing fashion apparel and ii. important attributes considered for purchasing fashion apparel. The last section included a question regarding disposal of fashion apparel which measures the post-purchase behavior. Hundred females were selected as the respondents for this study through convenience sampling in the fashion streets. They were categorized into three age groups and then the results were analyzed. Four hypotheses were developed after reviewing the existing literature. Regression analysis was conducted for testing the hypothesis. Hypothesis one was accepted which stated that ‘social influence’ as a source of information for purchasing fashion apparels decreases with age. Hypothesis two was accepted which suggested that motivation of ‘Attention seeking’ for purchasing fashion apparel decreases with age. Hypothesis three and four also accepted which suggested that the importance of ‘Quality’ and ‘Price’ increases with age but hypothesis five was rejected which suggested that the importance of ‘Fit’ increases with age and last but not the least hypothesis six was accepted which suggested that the ‘duration’ of using fashion apparel increases with age. Limitation of the study deals with the sample of only female respondents. Implication can be made from this research in the field of Fashion apparel industry with respect to consumer segmentation and better marketing approaches can be implemented by the marketers form this study. Further research can be concluded by including male respondents also.

Keywords: fashion, consumption behavior, age cohorts, motivation

Procedia PDF Downloads 248
8219 Cloud Computing: Major Issues and Solutions

Authors: S. Adhirai Subramaniyam, Paramjit Singh

Abstract:

This paper presents major issues in cloud computing. The paper describes different cloud computing deployment models and cloud service models available in the field of cloud computing. The paper then concentrates on various issues in the field. The issues such as cloud compatibility, compliance of the cloud, standardizing cloud technology, monitoring while on the cloud and cloud security are described. The paper suggests solutions for these issues and concludes that hybrid cloud infrastructure is a real boon for organizations.

Keywords: cloud, cloud computing, mobile cloud computing, private cloud, public cloud, hybrid cloud, SAAS, PAAS, IAAS, cloud security

Procedia PDF Downloads 323
8218 Localization Problem in Optical Fiber Sensors

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The security industry is making many efforts to lower the costs of system installation. However, the dominant technique is the application of fiber optic sensors. It is necessary to determine the location of the disorder of long optical fiber cables. For a number of years, many research centers developed their own solutions. The article presents the construction of the sensor systems with the possibility of disorder location. We present a methodology for determining location of the disorder. The aim of investigations is to answer the question of which of optical sensor configuration offer the best performance for location of the disorder.

Keywords: fiber optic sensor, security sensor, fiber cables, system instillation

Procedia PDF Downloads 621
8217 The Relationship between Body Image, Eating Behavior and Nutritional Status for Female Athletes

Authors: Selen Muftuoglu, Dilara Kefeli

Abstract:

The present study was conducted by using the cross-sectional study design and to determine the relationship between body image, eating behavior and nutritional status in 80 female athletes who were basketball, volleyball, flag football, indoor soccer, and ice hockey players. This study demonstrated that 70.0% of the female athletes had skipped meal. Also, female athletes had a normal body mass index (BMI), but 65.0% of them indicated that want to be thinner. On the other hand, we analyzed that their daily nutrients intake, so we observed that 43.4% of the energy was from the fatty acids, especially saturated fatty acids, and they had lower fiber, calcium and iron intake. Also, we found that BMI, waist circumference, waist to hip ratio were negatively correlated with Multidimensional Body-Self Relations Questionnaire and The Dutch Eating Behavior Questionnaire score and they were lower in who had meal skipped or not received diet therapy. As a conclusion, nutrition education is frequently neglected in sports programs. There is a paucity of nutrition education interventions among different sports.

Keywords: body image, eating behavior, eating disorders, female athletes, nutritional status

Procedia PDF Downloads 140
8216 Research Progress of the Relationship between Urban Rail Transit and Residents' Travel Behavior during 1999-2019: A Scientific Knowledge Mapping Based on Citespace and Vosviewer

Authors: Zheng Yi

Abstract:

Among the attempts made worldwide to foster urban and transport sustainability, transit-oriented development certainly is one of the most successful. Residents' travel behavior is a concern in the researches about the impacts of transit-oriented development. The study takes 620 English journal papers in the core collection database of Web of Science as the study objects; the paper tries to map out the scientific knowledge mapping in the field and draw the basic conditions by co-citation analysis, co-word analysis, a total of citation network analysis and visualization techniques. This study teases out the research hotspots and evolution of the relationship between urban rail transit and resident's travel behavior from 1999 to 2019. According to the results of the analysis of the time-zone view and burst-detection, the paper discusses the trend of the next stage of international study. The results show that in the past 20 years, the research focuses on these keywords: land use, behavior, model, built environment, impact, travel behavior, walking, physical activity, smart card, big data, simulation, perception. According to different research contents, the key literature is further divided into these topics: the attributes of the built environment, land use, transportation network, transportation policies. The results of this paper can help to understand the related researches and achievements systematically. These results can also provide a reference for identifying the main challenges that relevant researches need to address in the future.

Keywords: urban rail transit, travel behavior, knowledge map, evolution of researches

Procedia PDF Downloads 98
8215 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 239
8214 Behavior of Engineering Students in Kuwait University

Authors: Mohammed A. Al-Ajmi, Reem S. Al-Kandari

Abstract:

This study is concerned with the behavior of engineering students in Kuwait University which became a concern due to the global issues of education in all levels. A survey has been conducted to identify academic and societal issues that affect the engineering student performance through. The study is drawing major conclusions with regard to private tutoring and the online availability of textbooks’ solution manuals.

Keywords: solution manual, engineering, textbook, ethics

Procedia PDF Downloads 477
8213 Assessment of Seismic Behavior of Masonry Minarets by Discrete Element Method

Authors: Ozden Saygili, Eser Cakti

Abstract:

Mosques and minarets can be severely damaged as a result of earthquakes. Non-linear behavior of minarets of Mihrimah Sultan and Süleymaniye Mosques and the minaret of St. Sophia are analyzed to investigate seismic response, damage and failure mechanisms of minarets during earthquake. Selected minarets have different height and diameter. Discrete elements method was used to create the numerical minaret models. Analyses were performed using sine waves. Two parameters were used for evaluating the results: the maximum relative dislocation of adjacent drums and the maximum displacement at the top of the minaret. Both parameters were normalized by the drum diameter. The effects of minaret geometry on seismic behavior were evaluated by comparing the results of analyses.

Keywords: discrete element method, earthquake safety, nonlinear analysis, masonry structures

Procedia PDF Downloads 297
8212 A Memristive Device with Intrinsic Rectification Behavior and Performace of Crossbar Arrays

Authors: Yansong Gao, Damith C.Ranasinghe, Siad F. Al-Sarawi, Omid Kavehei, Derek Abbott

Abstract:

Passive crossbar arrays is in principle the simplest functional electrical circuit, together with memristive device in cross-point, holding great promise in future high-density, non-volatile memories. However, the greatest problem of crossbar array is the sneak path current. In this paper, we investigate one type of memristive device with intrinsic rectification behavior to address the sneak path currents. Firstly, a SPICE behavior model written in Verilog-A language of the memristive device is presented to fit experimental data published in literature. Next, systematic performance simulations including read margin and power consumption of crossbar array, which uses the self-rectifying memristive device as storage element at cross-point, with respect to different crossbar sizes, interconnect resistance, ratio of HRS/LRS (High Resistance State/ Low Resistance State), rectification ratio and different read schemes are conducted. Subsequently, Trade-offs among reading margin, power consumption, and reading schemes are analyzed to provide guidelines for circuit design. Finally, performance comparison between the memristive device with/without intrinsic rectification behavior is given to show the worthiness of this intrinsic rectification behavior.

Keywords: memristive device, memristor, crossbar, RRAM, read margin, power consumption

Procedia PDF Downloads 426
8211 Discrete Element Modeling of the Effect of Particle Shape on Creep Behavior of Rockfills

Authors: Yunjia Wang, Zhihong Zhao, Erxiang Song

Abstract:

Rockfills are widely used in civil engineering, such as dams, railways, and airport foundations in mountain areas. A significant long-term post-construction settlement may affect the serviceability or even the safety of rockfill infrastructures. The creep behavior of rockfills is influenced by a number of factors, such as particle size, strength and shape, water condition and stress level. However, the effect of particle shape on rockfill creep still remains poorly understood, which deserves a careful investigation. Particle-based discrete element method (DEM) was used to simulate the creep behavior of rockfills under different boundary conditions. Both angular and rounded particles were considered in this numerical study, in order to investigate the influence of particle shape. The preliminary results showed that angular particles experience more breakages and larger creep strains under one-dimensional compression than rounded particles. On the contrary, larger creep strains were observed in he rounded specimens in the direct shear test. The mechanism responsible for this difference is that the possibility of the existence of key particle in rounded particles is higher than that in angular particles. The above simulations demonstrate that the influence of particle shape on the creep behavior of rockfills can be simulated by DEM properly. The method of DEM simulation may facilitate our understanding of deformation properties of rockfill materials.

Keywords: rockfills, creep behavior, particle crushing, discrete element method, boundary conditions

Procedia PDF Downloads 304
8210 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 150
8209 Internet Usage Behavior on Mobile Phones of the Faculty of Management Science Students at Suan Sunandha Rajabhat University

Authors: Arpapron Phokajang

Abstract:

The objectives of this research were to study the internet usage, including; date, time, description of using service, network service, telephone charge, and to study the internet usage behavior on mobile phones of the Faculty of Management Science students at Suan Sunandha Rajabhat University. The samples consisted of 395 students from the Faculty of Management Science. Questionnaires were used for collecting the data. Descriptive statistics used in this research including percentage, mean, and standard deviation. The findings of this research found that most respondents were female, aged between 21 and 25 years old, used the monthly AIS network service calls on Monday to Friday around 6.01-12.00 p.m., the internet usage behavior on mobile phones for entertainment was found in the highest level in all aspects, and education, business and commerce, and communication were found in the moderate level and using the internet to watch YouTube in the highest level also.

Keywords: faculty of management science, internet usage behavior, mobile phones, Suan Sunandha Rajabhat University

Procedia PDF Downloads 226
8208 Contextualizing Household Food Security: A Comparison of Two Villages, Ambros and Maramanzhi, South Africa

Authors: Felicity Aphiwe Mkhongi, Walter Musakwa

Abstract:

Smallholder crop production is a defining factor in achieving food security, particularly at the household level. However, the number of abandoned arable fields is increasing in communal areas of South Africa. While substantial efforts have been devoted to addressing food insecurity in the country, ownership of arable land has not been supplemented with sustainable food production for households. This paper analyses household food security in the context of deagrarianization in two villages, Ambros (Eastern Cape) and Maramanzhi (Limpopo). Semi-structured questionnaires were administered to acquire both qualitative and quantitative data from 106 heads of households. The IBM SPSS Statistics 28.0 computer program was applied to complete data analysis. From the findings of the study, it was evident that compared to arable fields, a greater proportion of households own home-gardens with an average size of 2100m in Ambros and 3400m in Maramanzhi village. The majority of arable fields were abandoned, particularly in Ambros village. Household food access challenges were measured using the Household Food Insecurity Access Scale (HFIAS). This food security indicator revealed that the majority of households were mildly food insecure owing to food shortages emanating from insufficient monthly income and waning household crop production. Food was rated as a very important reason for engaging in cultivation in both villages of the study, but deagrarianization has eroded opportunities for increasing household crop production. Among other possible solutions, this study recommends that the government invest more in agriculture to allow for sustainable strategies that revive abandoned arable land, such as arable fields in communal areas of South Africa, as this could increase food production for households.

Keywords: cultivation, deagrarianization, food security, rural households, smallholder farmers

Procedia PDF Downloads 36