Search results for: perception control system security strategy
29802 Mitigating the Cost of Empty Container Repositioning through the Virtual Container Yard: An Appraisal of Carriers’ Perceptions
Authors: L. Edirisinghe, Z. Jin, A. W. Wijeratne, R. Mudunkotuwa
Abstract:
Empty container repositioning is a fundamental problem faced by the shipping industry. The virtual container yard is a novel strategy underpinning the container interchange between carriers that could substantially reduce this ever-increasing shipping cost. This paper evaluates the shipping industry perception of the virtual container yard using chi-square tests. It examines if the carriers perceive that the selected independent variables, namely culture, organization, decision, marketing, attitudes, legal, independent, complexity, and stakeholders of carriers, impact the efficiency and benefits of the virtual container yard. There are two major findings of the research. Firstly, carriers view that complexity, attitudes, and stakeholders may impact the effectiveness of container interchange and may influence the perceived benefits of the virtual container yard. Secondly, the three factors of legal, organization, and decision influence only the perceived benefits of the virtual container yard. Accordingly, the implementation of the virtual container yard will be influenced by six key factors, namely complexity, attitudes, stakeholders, legal, organization and decision. Since the virtual container yard could reduce overall shipping costs, it is vital to examine the carriers’ perception of this concept.Keywords: virtual container yard, imbalance, management, inventory
Procedia PDF Downloads 19529801 The Ontology of Assurance
Authors: Odd Ivar Haugen
Abstract:
This paper explores the ontology of assurance in safety-critical systems, emphasising the importance of knowledge and confidence in system behaviour. Assurance is defined as providing grounds for justified confidence in system properties, such as safety and security. The paper discusses the main concepts of assurance, including system requirements, confidence, and justification. It discusses the CESM metamodel for understanding system behaviour and emergent properties. The paper also highlights the importance of objectivity in assessing the strength of knowledge and the role of verification in generating evidence as a part of the argumentation. The assurance case is presented as a systematic way to represent knowledge and support decision-making.Keywords: assurance, CESM metamodel, confidence, emergent properties, knowledge, objectivity, risk, system behaviour, system safety
Procedia PDF Downloads 729800 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya
Authors: Sewe Silvanus Odhiambo
Abstract:
Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.Keywords: COVID-19, corporate governance, firm performance, private security firms
Procedia PDF Downloads 16029799 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)
Authors: Syed Sibtain Hussain Shah
Abstract:
The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat
Procedia PDF Downloads 14229798 Stability Enhancement of a Large-Scale Power System Using Power System Stabilizer Based on Adaptive Neuro Fuzzy Inference System
Authors: Agung Budi Muljono, I Made Ginarsa, I Made Ari Nrartha
Abstract:
A large-scale power system (LSPS) consists of two or more sub-systems connected by inter-connecting transmission. Loading pattern on an LSPS always changes from time to time and varies depend on consumer need. The serious instability problem is appeared in an LSPS due to load fluctuation in all of the bus. Adaptive neuro-fuzzy inference system (ANFIS)-based power system stabilizer (PSS) is presented to cover the stability problem and to enhance the stability of an LSPS. The ANFIS control is presented because the ANFIS control is more effective than Mamdani fuzzy control in the computation aspect. Simulation results show that the presented PSS is able to maintain the stability by decreasing peak overshoot to the value of −2.56 × 10−5 pu for rotor speed deviation Δω2−3. The presented PSS also makes the settling time to achieve at 3.78 s on local mode oscillation. Furthermore, the presented PSS is able to improve the peak overshoot and settling time of Δω3−9 to the value of −0.868 × 10−5 pu and at the time of 3.50 s for inter-area oscillation.Keywords: ANFIS, large-scale, power system, PSS, stability enhancement
Procedia PDF Downloads 30629797 Design and Development of a Computerized Medical Record System for Hospitals in Remote Areas
Authors: Grace Omowunmi Soyebi
Abstract:
A computerized medical record system is a collection of medical information about a person that is stored on a computer. One principal problem of most hospitals in rural areas is using the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved, this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to quickly retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.Keywords: programming, computing, data, innovation
Procedia PDF Downloads 11929796 Design Intelligence in Garment Design Between Technical Creativity and Artistic Creativity
Authors: Kanwar Varinder Pal Singh
Abstract:
Art is one of the five secondary sciences next to the social sciences. As per the single essential concept in garment design, it is the coexistence and co-creation of two aspects of reality: Ultimate reality and apparent or conventional reality. All phenomena possess two natures: That which is revealed by correct perception and that which is induced by deceptive perception. The object of correct perception is the ultimate reality, the object of deceptive perception is conventional reality. The same phenomenon, therefore, may be perceived according to its ultimate nature or its apparent nature. Ultimate reality is also called ‘emptiness’. Emptiness does not mean that all phenomena are nothing but do not exist in themselves. Although phenomena, the universe, thoughts, beings, time, and so on, seem very real in themselves, ultimately, they are not. Each one of us can perceive the changing and unpredictable nature of existence. This transitory nature of phenomena, impermanence, is the first sign of emptiness. Sometimes, the interdependence of phenomena leads to ultimate reality, which is nothing but emptiness, e.g., a rainbow, which is an effect due to the function of ‘sun rays,’ ‘rain,’ and ‘time.’ In light of the above, to achieve decision-making for the global desirability of garment design, the coexistence of artistic and technical creativity must achieve an object of correct perception, i.e., ultimate reality. This paper mentions the decision-making technique as semiotic engineering, both subjective and objective.Keywords: global desirability, social desirability, comfort desirability, handle desirability, overall desirability
Procedia PDF Downloads 1229795 Impact of Forced Displacement on Place Attachment and Home Perception of Internally Displaced Turkish Cypriots
Authors: Makbule Oktay
Abstract:
Home is a significant entity in people’s lives. It is a place that provides shelter to people and a place to which one feels a sense of attachment and belonging. It is an entity that people develop feelings and meaning to it. People – place bond, or in other words place attachment, and home perception might alter as a consequence of lifetime experiences. Thus, forced displacement appears as a dramatic experience for people who lose their homes, belongings and communities. It impacts people who involuntarily leave their homes and belongings behind, experience physical, social, cultural and economic disruption and are forced to settle in an unfamiliar environment. Place attachment and home perception of internally displaced people who involuntarily leave their homes might be different from those who haven’t experience forced displacement. Although place attachment, meaning of home and forced displacement are the subjects that have been broadly studied, there is a lack of studies which question the relation between the three subjects in general and on Turkish Cypriot case in particular. Considering this, it is the aim of this paper to investigate the impact of forced displacement to internally displaced people’s attachment to a particular place and home perception. To do so, the study focuses on internally displaced Turkish Cypriots who have been internally displaced as a result of conflict. Interview and questionnaire as two of the commonly used techniques in the place attachment and home perception studies have been used in this study too. The results of the study indicate that internal displacement has an apparent impact on place attachment of forcibly displaced people. As a consequence of longstanding displacement, forcibly displaced people developed multiple attachments. Compared to people who have not experienced displacement, forcibly displaced people have low attachments. Forced displacement does not strongly impact the home perception in terms of meaning of home in longstanding displacement situations even though displacement-related meanings of home exist.Keywords: forcibly displaced people, home perception, internal displacement, place attachment, Turkish Cypriots
Procedia PDF Downloads 21729794 Efficient Position Based Operation Code Authentication
Authors: Hashim Ali, Sheheryar Khan
Abstract:
Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication
Procedia PDF Downloads 27229793 Increasing Self-Efficacy of Secondary School Students in Physics Using Mentoring Enhanced Strategy
Authors: Gabriel Odeh Ankeli
Abstract:
The study determined how mentoring enhanced strategy can increase self-efficacy of secondary school students in physics in education zone C of Benue State, Nigeria. The study was guided by two research questions while two hypotheses were formulated and tested at 0.05 level of significance. The design of the study was the quasi-experimental, non-randomized, pre-test and post-test control groups. The population of the study consisted of 4,064 SS two physics students in the 94 schools in Education Zone C. The sample comprised 406 SS two physics students drawn from 10 schools using multi-stage sampling technique. The research instrument adapted and used for data collection was Students Self-Efficacy Scale (SSES). The research instrument was subjected to a reliability analysis using Cronbachs Alpha which yielded a reliability co-efficient of 0.84. Data collected were analyzed using discriptive statistics of mean and standard deviation to answer the research questions while inferential statistics of Analysis of Covariance (ANCOVA) was used to test the hypotheses. The findings revealed that students who were exposed to mentoring exhibited lower self-efficacy levels (F 1,405 = 2.751, P = 0.09˃0.05) than those students who were not exposed to mentoring. There was significant difference between male and female students’ self-efficacy level (F 1,211 = 5.496, P = 0.02˂0.05). Based on these findings, it was recommended among others that longer duration of mentoring period should be encouraged when using the mentoring strategy for better enhancement of Self-efficacy of students.Keywords: physics, self-efficacy, mentoring enhanced strategy, students
Procedia PDF Downloads 3029792 Maize Farmers’ Perception of Sharp Practices among Agro-Input Dealers in Ibadan/Ibarapa Agricultural Zone, Oyo State
Authors: Ademola A. Ladele, Peace I. Aburime
Abstract:
Fake and substandard agricultural inputs pose a serious stumbling block to farm productivity and subsequently improved livelihood. There is, therefore, a need to pave ways for sustainable agriculture and self-sufficiency in food production by proffering solutions to this challenge. Maize farmers' perception of sharp practices among agro-input dealers in Ibadan/Ibarapa agricultural zone in Oyo state was therefore investigated. A multi-stage random sampling technique was used to select registered maize farmers in the Ibadan/Ibarapa agricultural zone of the Oyo State Agricultural Development Programme (OYSADEP). A structured questionnaire was used to collect information on the perception of sharp practices and the effects of sharp practices. A total of seventy-five maize farmers were interviewed. A focus group discussion was organized to identify ways of curbing sharp practices to complement the survey. Data were analyzed using descriptive statistics, Chi-square, and Pearson Product Moment Correlation (PPMC). Forms of sharp practices indicated were sales of expired fertilizers, expired pesticides, expired herbicides, underweight fertilizers, adulterated fertilizers, adulterated herbicides, packs containing broken seeds, infested seeds, lack of truth in labeling/wrong labels, manipulation of measuring scales, and false declaration of hecterages covered by tractor operators. The majority had unfavorable perception of agro-input dealers on sharp practices. A significant relationship was observed between respondents’ level of education and their perception of sharp practices. There were no significant relationships between respondents’ sex, marital status and religion, and their perception of sharp practices. A significant correlation exists between the forms of sharp practices and the perceived effect on agricultural production. It is concluded that the perceived effect of sharp practices was critical and the endemic culture of sharp practices prevailed in agro-input in Ibadan/Ibarapa agricultural zone. A standard regulatory system that will certify and monitor the quality of inputs should be put in place.Keywords: agricultural productivity, agro-input dealers, maize farmers, sharp practices
Procedia PDF Downloads 19829791 A Basic Understanding of Viral Disease and Education Level Influences Disease Risk Perception, Disease Severity Perception, and Mask Wearing Behavior During the COVID-19 Pandemic
Authors: Ilse Kreme
Abstract:
To the best of this author’s knowledge, no studies have been identified on the connection between a refusal to engage in health-protective behaviors and a basic understanding of viral biology among community college students, faculty, and staff during the COVID-19 pandemic. Lack of scientific knowledge could prevent understanding of why these behaviors are important to prevent the community spread of COVID-19, even when they are not shown to offer much individual protection. In this study, a possible correlation was examined between a basic knowledge level of viral disease that comes from having taken a college biology course and disease perceptions of COVID-19. In particular, disease risk perception, disease severity percept and mask-wearing behaviors were examined as they correlated with having taken an undergraduate biology course. The effect of covariates of age, gender, and education level were investigated along with the main dependent variables. A representative sample of the population included students, faculty, and staff at Paradise Valley Community College (PVCC) in Phoenix, Arizona. Participants were recruited by an email sent to all students, faculty, and staff at PVCC using an all-college email distribution. Disease risk and severity perception were assessed with the Brief Illness Perception Questionnaire 5 (BIP-Q5), which was modified to include questions measuring participant age, education level, and whether they took or ever took a college biology course. Two additional questions measured compliance of willingness to wear a face mask. The results showed an effect of gender on mask-wearing behavior and a correlation between having taken a biology course and disease severity perception. No differences were seen in mask-wearing behavior and disease risk perception as a result of having taken a biology course. These findings suggest that taking an undergraduate biology course leads to a greater awareness of COVID-19 disease severity through an understanding of the basic biological principles of viral disease transmission. The results can be used to modify existing health education strategies. Further research is needed on how to best reach target audiences in all education brackets.Keywords: COVID-19, education, gender, mask wearing, disease risk perception, disease severity perception
Procedia PDF Downloads 10529790 Robust Control of a Dynamic Model of an F-16 Aircraft with Improved Damping through Linear Matrix Inequalities
Authors: J. P. P. Andrade, V. A. F. Campos
Abstract:
This work presents an application of Linear Matrix Inequalities (LMI) for the robust control of an F-16 aircraft through an algorithm ensuring the damping factor to the closed loop system. The results show that the zero and gain settings are sufficient to ensure robust performance and stability with respect to various operating points. The technique used is the pole placement, which aims to put the system in closed loop poles in a specific region of the complex plane. Test results using a dynamic model of the F-16 aircraft are presented and discussed.Keywords: F-16 aircraft, linear matrix inequalities, pole placement, robust control
Procedia PDF Downloads 30629789 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa
Authors: Lethola Tshikose, Munyaradzi Katurura
Abstract:
Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.Keywords: E-health, EHR, security, confidentiality, healthcare
Procedia PDF Downloads 5829788 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 38229787 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 22729786 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey
Authors: Maleh Yassine, Ezzati Abdellah
Abstract:
Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS
Procedia PDF Downloads 38529785 Fostering Student Interest in Senior Secondary Two Biology Using Prior Knowledge of Behavioural Objectives and Assertive Questioning Strategies in Benue State, Nigeria
Authors: John Odo Ogah
Abstract:
The study investigated ways of fostering students’ interest in senior secondary two Biology, using prior knowledge of behavioural objectives and assertive questioning strategies in Benue State of Nigeria. A quasi-experimental research design was adopted; the population comprised 8,571 senior Secondary two students. The sample consisted of 265 SSII biology students selected from six government schools in the study area using a multi-staged sampling technique. Data was generated using the Biology Interest Inventory (BII). The instrument was validated and subjected to reliability analysis using Cronbach’s Alpha formula, which yielded a coefficient of 0.73. Three research questions guided the study, while three hypotheses were formulated and tested. Data collected were analyzed using means, bar graphs, and standard deviations to answer the research questions, while analysis of covariance (ANCOVA) was employed in testing the hypotheses at 0.05 level of significance. The finding revealed that there is a significant difference in the mean interest ratings of students taught cellular respiration and excretory system using assertive questioning strategy, prior knowledge of behavioural objectives strategy and lecture method (p=0.000˂0.05). There is no significant difference in the mean interest ratings of male and female students taught cellular respiration and excretory systems using an assertive questioning strategy (p=0.790>0.05). There is significant difference in the mean interest ratings of male and female students taught cellular respiration and execratory system using prior knowledge of behavioural objectives strategy (p=0.028˂0.05). It was recommended, among others, that teachers should endeavor to utilize prior knowledge of behavioral objectives strategy in teaching biology in order to harness its benefits as it enhances students’ interest.Keywords: interest, assertive, questioning, prior, knowledge
Procedia PDF Downloads 5429784 Community Policing: Exploring the Police and Community Participation for Crime Control in Bia West of Ghana
Authors: Bertha Korang Gyimah, Obed Asamoah, Kenross, T. Asamoah
Abstract:
In every human community, crimes or offenses cannot be eliminated, but as crimes are expected, there should be bodies that will control and prevent the crimes. There has been an increasing rate of crime, such as armed robbery, kidnapping, murder, and other forms of violence in the country. Community participation in crime control cannot be left out in Ghana. Several works have been conducted to deal with the importance of community participation in policing, but the causes of communities not fully participating in community policing have been left out. The main aim of the research was to assess the impact of community policing and why the communities are reluctant to partake in community policing to help control crime in Bia West. There have been perceptions about Police that, they expose informant after they give the police tip-off which put the whistleblower life in danger. This has made the community not to get involved in security issues in the community they live in. This situation has posed a serious threat to the Ghana Police Service and its ability to position itself strategically in order to carry out a perfect investigation to bring the perpetrators into custody and to protect their lives and property, as well as the maintenance of law and order. Due to less data on community participation in the Ghana Police Service, the research adopted an interpretative framework to assess the meaning connoted to community policing from the perspectives of the stakeholders themselves. The qualitative research method was used. There was an engagement of the police and community where focus group discussions and individual in-depth interviews were organized in the randomly selected communities in the district. Key informant interviews were used to solicit views of the people why they are reluctant to give information to the police to help them take the perpetrators to book. In the data collected, it was observed that most of the people have been under threats of offenders after they come back from the prisons, it was also observed that some of the unprofessional police personnel’s expose the whistleblowers who put their lives in danger. The data obtained were analyzed using simple Analytical tool SPSS and Excel. Based on the analysis, it was observed that a high number of people in the communities contacted had not made their mind to participate in any security issues. Based on the views of the community, there should be a high level of professionalism in the recruitment system of the Ghana police service to come out with professional police officers who can abide by the rules and regulations governing the profession.Keywords: community, bia west, Ghana, participation, police
Procedia PDF Downloads 14229783 Аnalysis of the Perception of Medical Professionalism by Specialists of Family Medicine in Kazakhstan
Authors: Nurgul A. Abenova, Gaukhar S. Dilmagambetova, Lazzat M. Zhamaliyeva
Abstract:
Professionalism is a core competency that all medical students must achieve throughout their studies. Clinical knowledge, good communication skills and an understanding of ethics form the basis of professionalism. Patients, medical societies and accrediting organizations expect future specialists to be professionals in their field, which in turn leads to the best clinical results. Currently, there are no studies devoted to the study of medical professionalism in the Republic of Kazakhstan. As a result, medical education in the Kazakhstani system has a limited perception of the concept of professionalism compared to many Western medical schools. Thus, the primary purpose of this study is to analyze the perception of medical professionalism among residents and teachers of family medicine at the West Kazakhstan Marat Ospanov Medical University. А qualitative research method was used based on the content analysis methodology. A focus group discussion was held with 60 residents and 12 family medicine teachers to gather participants' views and experiences in the field of medical professionalism. The received information was processed using the MAXQDA-2020 software package. Respondents were selected for the study based on their age, gender, and educational level. The results of the conducted survey confirmed the respondents’ acknowledgment of the basic attributes of professionalism, such as medical knowledge and skills (more than 40% of the answers), personal and moral qualities of the doctor (more than 25% of the answers), respect for the interests of the patient (15% of the answers), the relationship between the doctor and the patient and among professionals themselves (15% of responses). Another important discovery of the survey was that residents are five times more likely to define the relationship between a doctor and a patient in a model “respect for the interests of the patient” in comparison with teachers of family medicine, who primarily reported responsibility and collegiality to be the basis for the development of professionalism and traditionally view doctor-patient relationship to be formed on the basis of paternalism defined by a high degree of control over patients. This significant difference demonstrates a rift among specialists in the field of family medicine, which causes a lot of problems. For example, nowadays, professional family doctors regularly face burnout problem due to many reasons and factors that force them to abandon their jobs. In addition to that, elements of professionalism such as reflective skills, time management and feedback collection were presented to the least extent (less than 1%) by both groups, which differs from the perception of the Western medical school and is a significant issue that needs to be solved. The qualitative nature of our study provides a detailed understanding of medical professionalism in the context of the Central Asian healthcare system, revealing many aspects that are inferior to the Western medical school counterparts and provides a solution, which is to teach the attributes and skills required for medical professionalism at all stages of medical education of family doctors.Keywords: family medicine, family doctors, medical professionalism, medical education
Procedia PDF Downloads 14129782 The Perspective of Waria Transgenders in Singaraja on Their Reproduction Health
Authors: Made Kurnia Widiastuti Giri, Nyoman Kanca, Arie Swastini, Bambang Purwanto
Abstract:
Aim: Waria transgenders are a phenomenon whose existence is undeniable. The sexual behaviours of waria transgenders belong to the groups of high-risk STDs infections, especially HIV/AIDS. The present study was aimed at finding out the general idea of the existence of waria transgenders in Singaraja, their sexual transactions, their sexual behaviours, and at exploring the factors affecting their sexual behaviours along with their participation in regular reproduction health control. Methods: The subjects of the present research were male-to-female transgenders living in the town of Singaraja. The research applied a qualitative approach. Data collection in this research was conducted through in-depth interview and observation. Results: The results of the study exposed 1) the existence of waria transgender community in Singaraja observed from their active participation in social events such as taking the roles of counsellors in the campaign of prevention and control of HIV/AIDS with the Local Commission of AIDS Control and other foundations; 2) the sexual services provided by waria transgenders which were performed in squeeze method, oral and anal sex which could be categorized as HIV/AIDS high-risk sexual behaviours, while the consistency in doing safe sex among the trangenders in Singaraja showed that most of the waria transgenders (80%) were aware of the urgency of using condoms during sexual intercourse; and 3) the low participation of the waria transgenders in Singaraja in regular reproduction health check up at the local Centre of Public Health Service was caused by their negative perception about being examined by female doctors. Conclucions: Waria in singaraja categorized as HIV/AIDS high-risk sexual behaviours but they do have consistency in doing safe sex by using condoms. They have a negative psychological perception about being examined by female doctors.Keywords: waria transgenders, sexual behaviours, reproduction health, hiv/aids
Procedia PDF Downloads 33529781 Hand Motion and Gesture Control of Laboratory Test Equipment Using the Leap Motion Controller
Authors: Ian A. Grout
Abstract:
In this paper, the design and development of a system to provide hand motion and gesture control of laboratory test equipment is considered and discussed. The Leap Motion controller is used to provide an input to control a laboratory power supply as part of an electronic circuit experiment. By suitable hand motions and gestures, control of the power supply is provided remotely and without the need to physically touch the equipment used. As such, it provides an alternative manner in which to control electronic equipment via a PC and is considered here within the field of human computer interaction (HCI).Keywords: control, hand gesture, human computer interaction, test equipment
Procedia PDF Downloads 31529780 Security System for Safe Transmission of Medical Image
Authors: Mohammed Jamal Al-Mansor, Kok Beng Gan
Abstract:
This paper develops an optimized embedding of payload in medical image by using genetic optimization. The goal is to preserve region of interest from being distorted because of the watermark. By using this developed system there is no need of manual defining of region of interest through experts as the system will apply the genetic optimization to select the parts of image that can carry the watermark with guaranteeing less distortion. The experimental results assure that genetic based optimization is useful for performing steganography with less mean square error percentage.Keywords: AES, DWT, genetic algorithm, watermarking
Procedia PDF Downloads 41129779 Investigating Safe Operation Condition for Iterative Learning Control under Load Disturbances Effect in Singular Values
Authors: Muhammad A. Alsubaie
Abstract:
An iterative learning control framework designed in state feedback structure suffers a lack in investigating load disturbance considerations. The presented work discusses the controller previously designed, highlights the disturbance problem, finds new conditions using singular value principle to assure safe operation conditions with error convergence and reference tracking under the influence of load disturbance. It is known that periodic disturbances can be represented by a delay model in a positive feedback loop acting on the system input. This model can be manipulated by isolating the delay model and finding a controller for the overall system around the delay model to remedy the periodic disturbances using the small signal theorem. The overall system is the base for control design and load disturbance investigation. The major finding of this work is the load disturbance condition found which clearly sets safe operation condition under the influence of load disturbances such that the error tends to nearly zero as the system keeps operating trial after trial.Keywords: iterative learning control, singular values, state feedback, load disturbance
Procedia PDF Downloads 15829778 Level of Application of Integrated Talent Management According To IBM Institute for Business Value Case Study Palestinian Governmental Agencies in Gaza Strip
Authors: Iyad A. A. Abusahloub
Abstract:
This research aimed to measure the level of perception and application of Integrated Talent Management according to IBM standards, by the upper and middle categories in Palestinian government institutions in Gaza, using a descriptive-analytical method. Using a questionnaire based on the standards of the IBM Institute for Business Value, the researcher added a second section to measure the perception of integrated talent management, the sample was 248 managers. The SPSS package was used for statistical analysis. The results showed that government institutions in Gaza apply Integrated Talent Management according to IBM standards at a medium degree did not exceed 59.8%, there is weakness in the perception of integrated talent management at the level of 53.6%, and there is a strong correlation between (Integrated Talent Management) and (the perception of the integrated talent management) amounted to 92.9%, and 88.9% of the change in the perception of the integrated talent management is by (motivate and develop, deploy and manage, connect and enable, and transform and sustain) talents, and 11.1% is by other factors. Conclusion: This study concluded that the integrated talent management model presented by IBM with its six dimensions is an effective model to reach your awareness and understanding of talent management, especially that it must rely on at least four basic dimensions out of the six dimensions: 1- Stimulating and developing talent. 2- Organizing and managing talent. 3- Connecting with talent and empowering it. 4- Succession and sustainability of talent. Therefore, this study recommends the adoption of the integrated talent management model provided by IBM to any organization across the world, regardless of its specialization or size, to reach talent sustainability.Keywords: HR, talent, talent management, IBM
Procedia PDF Downloads 8429777 The Effect of Metacognitive Think-Aloud Strategy on Form 1 Pupils’ Reading Comprehension Skills via DELIMa Platform
Authors: Fatin Khairani Khairul 'Azam
Abstract:
Reading comprehension requires the formation of an articulate mental representation of the information in a text. It involves three interdepended elements—the reader, the text, and the activity, all situated into an extensive sociocultural context. Incorporating metacognitive think-aloud strategy into teaching reading comprehension would improve learners’ reading comprehension skills as it helps to monitor their thinking as they read. Furthermore, by integrating Digital Educational Learning Initiative Malaysia (DELIMa) platform in teaching reading comprehension, it can make the process interactive and fun. A quasi-experimental one-group pre-test post-test design was used to identify the effectiveness of using metacognitive think-aloud strategy via DELIMa platform in improving pupils’ reading comprehension performance and their perceptions towards reading comprehension. The participants of the study comprised 82 of form 1 pupils from a secondary school in Pasir Gudang, Johor, Malaysia. All participants were required to sit for pre-and post-tests to track their reading comprehension performance and perceptions. The findings revealed that incorporating metacognitive think-aloud strategy is an effective strategy in teaching reading comprehension as the performance of pupils in reading comprehension and their perceptions towards reading comprehension were improved during the post tests. It is hoped that the findings of the study would be useful to the teachers incorporating the same strategy in teaching to improve pupils' reading skills. It is suggested that future study should involve the motivation factor of the participants on incorporating think-aloud strategy into teaching reading comprehension as well.Keywords: DELIMa Platform, ESL Learners, Metacognitive Strategy, Pupils' Perceptions, Reading Comprehension, Think-Aloud Strategy
Procedia PDF Downloads 21029776 National Strategy for Swedish Wildlife Management
Authors: Maria Hornell, Marcus Ohman
Abstract:
Nature, and the society it is a part of, is under constant change. The landscape, climate and game populations vary over time, as well as society's priorities and the way it uses the land where wildlife may proliferate. Sweden currently has historically large wildlife populations which are a resource for the benefit and joy of many people. Wildlife may also be seen as a problem as it may cause damage in contradiction to other human interests. The Swedish Environmental Protection Agency introduces a new long-term strategy for national wildlife management. The strategy envisions a wildlife management in balance. It focuses on wildlife values in a broad sense including outdoor recreation and tourism as well as conservation of biodiversity. It is fundamental that these values should be open and accessible for the major part of the population. For that to be possible new ways to manage, mitigate and prevent damages and other problems that wildlife causes need to be developed. The strategy describes a roadmap for the development and strengthening of Sweden's wildlife management until 2020. It aims at being applicable for those authorities and stakeholders with interest in wildlife management being a guide for their own strategies, goals, and activities.Keywords: wildlife management, strategy, Sweden, SEPA
Procedia PDF Downloads 21729775 Risk Management in Islamic Micro Finance Credit System for Poverty Alleviation from Qualitative Perspective
Authors: Liyu Adhi Kasari Sulung
Abstract:
Poverty has been a major problem in Indonesia. Islamic micro finance (IMF) named Baitul Maal Wat Tamwil (Bmt) plays a prominent role to eradicate this. Indonesia as the biggest muslim country has many successful applied products such as worldwide adopt group-based lending approach, flexible financing for farmers, and gold pawning. The Problems related to these models are operation risk management and internal control system (ICS). A proper ICS will help an organization in preventing the occurrence of bad financing through detecting error and irregularities in its operation. This study aims to seek a proper risk management scheme of credit system in Bmt and internal control system’s rank for every stage. Risk management variables are obtained at the first In-Depth Interview (IDI) and Focus Group Discussion (FGD) with Shariah supervisory boards, boards of directors, and operational managers. Survey was conducted covering nationwide data; West Java, South Sulawesi, and West Nusa Tenggara. Moreover, Content analysis is employed to build the relationship among these variables. Research Findings shows that risk management Characteristics in Indonesia involves ex ante, credit process, and ex post strategies to deal with risk in credit system. Ex-ante control consists of Shariah compliance, survey, group leader reference, and islamic forming orientation. Then, credit process involves saving, collateral, joint liability, loan repayment, and credit installment controlling. Finally, ex-post control includes shariah evaluation, credit evaluation, grace period and low installment provisions. In addition, internal control order sort three stages by its priority; Credit process as first rank, then ex-post control as second, and ex ante control as the last rank.Keywords: internal control system, islamic micro finance, poverty, risk management
Procedia PDF Downloads 40929774 The Operation Strategy and Public Relations Trend for Public Relations Strategies Development in Thailand
Authors: Kanyapat U. Tapao
Abstract:
The purpose of this study is to analyze the operation strategy strategies and public relations trend for public relations strategies development in public television station in Thailand. This study is a qualitative approach by indent interview from the 6 key informants that are managers of Voice TV and Thairath TV Channel. The results showed that both TV stations have to do research before making a release on the operation strategy policy such as a slogan, segmentation, integrated marketing communication and PR activity and also in term of Public Relations trend are including online media, online content and online training before opening the station and start promoting. By the way, we found the PR strategy for both TV station should be including application on mobile, online content, CRM activity, online banner, special event, and brand ambassador in order to bring a very reliable way.Keywords: online banner, operation strategy, public relations trend, public relations strategies development
Procedia PDF Downloads 31829773 Perception of People with a Physical Disability towards Those with a Different Kind of Disability
Authors: Monika Skura
Abstract:
People with physical disabilities, as with other people with differences in appearance or style of functioning come under negative social mechanisms. Therefore, it is worth asking what the relationship of the group is, who experience psychosocial effects because of their physical disability, towards people with intellectual disabilities, hearing impairments, visual impairments, mental illnesses, and their own physically disabled group. To analyse the perception of people with a physical disability, the study explores three areas: the acceptance or rejection of society’s stigmatization towards persons with disabilities; the importance of their own experience regarding their disability, in relation to another kind of disability; their level of acceptance to social interactions, in relation to various types of disabilities. The research sample consisted of 90 people with physical disabilities, who suffer from damage to the locomotor system. The data was collected using a questionnaire and the Adjective Check List by H. B. Gough and A. B. Heilbrun. This study utilized focus interviews to develop survey items for the questionnaire. The findings highlight that the response from those who were physically disabled agreed with the opinions of general society, not only with the issue of promoting integrated solutions and offering assistance but also having the same preferences and opinions about specific types of disability. However, their perception regarding their own group was noticeably different from that of general society. In the light of the study, for people with physical disabilities, just as for able-bodied people, it can be challenging to develop a meaningful relationship with people who have disabilities. All forms of disability suffer from negative attitudes and opinions that exist in society. The majority of those who were researched were focused primarily on their own problems, this inevitably hinders the integrity of the entire group, making it more difficult for it to find a cohesive voice, in which to promote their place within society.Keywords: general society’s opinions about disability, people with different kinds of disability, perception, physical disability
Procedia PDF Downloads 250