Search results for: school security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5822

Search results for: school security

4712 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 32
4711 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 143
4710 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 106
4709 The Effect of Al Andalus Improvement Model on the Teachers Performance and Their High School Students' Skills Acquiring

Authors: Sobhy Fathy A. Hashesh

Abstract:

The study was carried out in the High School Classes of Andalus Private Schools, boys section, using control and experimental groups that were randomly assigned. The study investigated the effect of Al-Andalus Improvement Model (AIM) on the development of students’ skills acquiring. The society of the study composed of Al-Andalus Private Schools, high school students, boys Section (N=700), while the sample of the study composed of four randomly assigned groups two groups of teachers (N=16) and two groups of students (N=42) with one experimental group and one control group for teachers and their students respectively. The study followed the quantitative and qualitative approaches in collecting and analyzing data to investigate the study hypotheses. Results of the study revealed that there were significant statistical differences in teachers’ performances and students' skills acquiring for the favor of the experimental groups and there was a strong correlation between the teachers performances and the students skills acquiring. The study recommended the implementation of the AIM model for the sake of teachers performances and students’ learning outcomes.

Keywords: AIM, improvement model, Classera, Al-Andalus Improvement Model.

Procedia PDF Downloads 157
4708 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 314
4707 Effects of School Facilities’ Mechanical and Plumbing Characteristics and Conditions on Student Attendance, Academic Performance and Health

Authors: Erica Cochran Hameen, Bobuchi Ken-Opurum, Shalini Priyadarshini, Berangere Lartigue, Sadhana Anath-Pisipati

Abstract:

School districts throughout the United States are constantly seeking measures to improve test scores, reduce school absenteeism and improve indoor environmental quality. It is imperative to identify key building investments which will provide the largest benefits to schools in terms of improving the aforementioned factors. This study uses Analysis of Variance (ANOVA) tests to statistically evaluate the impact of a school building’s mechanical and plumbing characteristics on a child’s educational performance. The educational performance is measured via three indicators, i.e. test scores, suspensions, and absenteeism. The study investigated 125 New York City school facilities to determine the potential correlations between 50 mechanical and plumbing variables and the performance indicators. Key findings from the tests revealed that elementary schools with pneumatic systems in “good” condition have 48.8% lower percentages of students scoring at the minimum English Language Arts (ELA) competency level compared with those with no pneumatic system. Additionally, elementary schools with “unit heaters/cabinet heaters” in “good to fair” conditions have 1.1% higher attendance rates compared to schools with no “unit heaters/cabinet heaters” or those in inferior condition. Furthermore, elementary schools with air conditioning have 0.6% higher attendance rates compared to schools with no air conditioning, and those with interior floor drains in “good” condition have 1.8% higher attendance rates compared to schools with interior drains in inferior condition.

Keywords: academic attendance and performance, mechanical and plumbing systems, schools, student health

Procedia PDF Downloads 112
4706 A Randomized Control Trial Intervention to Combat Childhood Obesity in Negeri Sembilan: The Hebat! Program

Authors: Siti Sabariah Buhari, Ruzita Abdul Talib, Poh Bee Koon

Abstract:

This study aims to develop and evaluate an intervention to improve eating habits, active lifestyle and weight status of overweight and obese children in Negeri Sembilan. The H.E.B.A.T! Program involved children, parents, and school and focused on behaviour and environment modification to achieve its goal. The intervention consists of H.E.B.A.T! Camp, parent’s workshop and school-based activities. A total of 21 children from intervention school and 22 children from control school who had BMI for age Z-score ≥ +1SD participated in the study. Mean age of subjects was 10.8 ± 0.3 years old. Four phases were included in the development of the intervention. Evaluation of intervention was conducted through process, impact and outcome evaluation. Process evaluation found that intervention program was implemented successfully with minimal modification and without having any technical problems. Impact and outcome evaluation was assessed based on dietary intake, average step counts, BMI for age z-score, body fat percentage and waist circumference at pre-intervention (T0), post-intervention 1 (T1) and post-intervention 2 (T2). There was significant reduction in energy (14.8%) and fat (21.9%) intakes (at p < 0.05) at post-intervention 1 (T1) in intervention group. By controlling for sex as covariate, there was significant intervention effect for average step counts, BMI for age z-score and waist circumference (p < 0.05). In conclusion, the intervention made an impact on positive behavioural intentions and improves weight status of the children. It is expected that the HEBAT! Program could be adopted and implemented by the government and private sector as well as policy-makers in formulating childhood obesity intervention.

Keywords: childhood obesity, diet, obesity intervention, physical activity

Procedia PDF Downloads 286
4705 Preschool Teachers' Teaching Performance in Relation to Their Technology and 21st Century Skills

Authors: Vida Dones-Jimenez

Abstract:

The main purpose of this study is to determine the preschool teachers’ technology and 21st-century skills and its relation to teachers’ performance. The participants were 94 preschool teachers and 59 school administrators from the CDAPS member schools. The data were collected by using 21st Century Skill, developed by ISSA (2009), Technology Skills of Teachers Survey (2013) and Teacher Performance Evaluation Criteria and Descriptors (200) was modified by the current researcher to suit the needs of her study and was administered personally by her. The surveys were designed to measure the participants’ 21st-century skills, technology skills and teaching performance. The result of the study indicates that the majority of the preschool teachers are the college graduate. Most of them are in the teaching profession for 0 to 10 years. It also indicated that the majority of the school administrators are masters’ degree holder. The preschool teachers are outstanding in their teaching performance as rated by the school administrators. The preschool teachers are skillful in using technology, and they are very skillful in executing the 21st-century skills in teaching. It was further determined that no significant difference between preschool teachers 21st-century skill in regards to educational attainment same as with the number of years in teaching, likewise with their technology skills. Furthermore, the study has shown that there is a very weak relationship between technology and 21st-century skills of preschool teachers, a weak relationship between technology skills and teaching performance and a very weak relationship between 21st-century skills and teaching performance were also established. The study recommends that the preschool teachers should be encouraged to enroll in master degree programs. School administrators should support the implementation of newly adopted technologies and support faculty members at various levels of use and experience. It is also recommended that regular review of the professional development plan be undertaken to upgrade 21st-century teaching and learning skills of preschool teachers.

Keywords: preschool teacher, teaching performance, technology, 21st century skills

Procedia PDF Downloads 391
4704 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 130
4703 Impact of a Professional Learning Community on the Continuous Professional Development of Teacher Educators in Myanmar

Authors: Moet Moet Myint lay

Abstract:

Professional learning communities provide ongoing professional development for teachers, where they become learning leaders and actively participate in school improvement. The development of professional knowledge requires a significant focus on professional competence in the work of teachers, and a solid foundation of professional knowledge and skills is necessary for members of society to become intelligent members. Continuing professional development (CPD) plays a vital role in improving educational outcomes, as its importance has been proven over the years. This article explores the need for CPD for teachers in Myanmar and the utility of professional learning communities in improving teacher quality. This study aims to explore a comprehensive understanding of professional learning communities to support the continuing professional development of teacher educators in improving the quality of education. The research questions are: (1) How do teacher educators in Myanmar understand the concept of professional learning communities for continuing professional development? (2) What CPD training is required for all teachers in teachers' colleges? Quantitative research methods were used in this study. Survey data were collected from 50 participants (teacher trainers) from five educational institutions. The analysis shows that professional learning communities when done well, can have a lasting impact on teacher quality. Furthermore, the creation of professional learning communities is the best indicator of professional development in existing education systems. Some research suggests that teacher professional development is closely related to teacher professional skills and school improvement. As a result of the collective learning process, teachers gain a deeper understanding of the subject matter, increase their knowledge, and develop their professional teaching skills. This will help improve student performance and school quality in the future. The lack of clear understanding and knowledge about PLC among school leaders and leads teachers to believe that PLC activities are not beneficial. Lack of time, teacher accountability, leadership skills, and negative attitudes of participating teachers were the most frequently cited challenges in implementing PLCs. As a result of these findings, educators and stakeholders can use them to implement professional learning communities.

Keywords: professional learning communities, continuing professional development, teacher education, competence, school improvement

Procedia PDF Downloads 44
4702 The New Approach to Airport Emergency Plans

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system

Procedia PDF Downloads 498
4701 How Manufacturing Firm Manages Information Security: Need Pull and Technology Push Perspective

Authors: Geuna Kim, Sanghyun Kim

Abstract:

This study investigates various factors that may influence the ISM process, including the organization’s internal needs and external pressure, and examines the role of regulatory pressure in ISM development and performance. The 105 sets of data collected in a survey were tested against the research model using SEM. The results indicate that NP and TP had positive effects on the ISM process, except for perceived benefits. Regulatory pressure had a positive effect on the relationship between ISM awareness and ISM development and performance.

Keywords: information security management, need pull, technology push, regulatory pressure

Procedia PDF Downloads 282
4700 Influence of Rational Emotive Therapy on Substance Abuse Among Secondary School Students in Benue State

Authors: Justina I. Reamen

Abstract:

The study examined the influence of rational emotive therapy on the treatment of substance abuse among Senior Secondary School Students in Makurdi metropolis Benue State Nigeria. This research adopted youth self report scale which was distributed to 1,690 SSS Students drawn from Government day Secondary School Makurdi and Government Model College Makurdi. Afterwards, 200 who were identified to indulge in substance abuse were selected for the study, 100 each from the two schools. 100 were taken as the control group and 100 as the experimental group, (50 of each group from each school). The Rational Emotive Behavior Therapy (REBT) intervention program was presented to the experimental group for seven (7) weeks. The students were taught how to apply REBT’s cognitive, Emotive and Behavioral techniques on their problems. After which post test was conducted to find out the impact of REBT on the treatment of adolescent students with substance abuse problem. GLM repeated measures of ANOVA were used to analyze the data from the study. The study reveals that REBT has positive impact on the treatment of adolescent students that abuse substances in the study area. Between pretest to post-test scores, a significant difference was observed (F=26.939; P=000) in substance abuse where a decrease of 1.12 (pre-10.91, post-9.79) scores was noticed irrespective of the groups. However, when the decrease in substance abuse were analyzed group wise, (experimental control) again significant F value (F=38.782; P=000) was obtained. From the mean scores it is evident that experimental group decreased it means by 2.56 (Pre-10.04 - Post-8.83) scores compared to control group, which changed its scores by only 0.32 scores (pre 11.04 - Post 11.36). Recommendations were made based on the findings of the research.

Keywords: abuse, influence, substance, therapy, treatment

Procedia PDF Downloads 225
4699 Life Locked Up in Immigration Detention: An Exploratory Study of Education in Australian Refugee Prisons

Authors: Carly Hawkins

Abstract:

Forced migration is at unprecedented levels globally, and many countries have implemented harsh policies regarding people seeking asylum. Australia legislates one of the harshest and most controversial responses in the world, sending any asylum seeker arriving by boat to indefinite offshore immigration detention. This includes children, families and unaccompanied minors. Asylum seekers and refugees are detained indefinitely by the Australian government in the Pacific Island countries of Papua New Guinea and Nauru. Global research on the impact of immigration detention has primarily focused on mental health and psychological concerns for both adults and children. Research into Australian immigration detention has largely overlooked the schooling and education of children detained in Nauru, despite refugee children spending more than five years in detention, a significant portion of a child’s life. This research focused on the experience of education for children detained offshore in Nauru from 2013-2019. 21 qualitative interviews were conducted with children, parents and service providers between 2021-2022. Interviews explored experiences of schooling, power structures, and barriers and support to education. Findings show that a lack of belonging and lack of agency negatively affected school engagement. A sense of hopelessness and uncertainty also affected their motivation to attend school, with many children missing school for months and years. The research indicates that Australia’s current policy of offshore detention has been detrimental to children’s educational experiences.

Keywords: asylum seeker, children, education, immigration detention, policy, refugee, school

Procedia PDF Downloads 70
4698 Changing the Dynamics of the Regional Water Security in the Mekong River Basin: An Explorative Study Understanding the Cooperation and Conflict from Critical Hydropolitical Perspective

Authors: Richard Grünwald, Wenling Wang, Yan Feng

Abstract:

The presented paper explores the changing dynamics of regional water security in the Mekong River Basin and examines the contemporary water-related challenges from a critical hydropolitical perspective. By drawing on the Lancang-Mekong Cooperation and Conflict Database (LMCCD) recording more than 3000 water-related events within the basin in the last 30 years, we identified several trends changing the dynamics of the regional water security in the Mekong River Basin. Firstly, there is growing politicization of water that is no longer interpreted as abundant. While some scientists blame the rapid basin development, particularly in upstream countries, other researchers consider climate change and cumulative environmental impacts of various water projects as the main culprit for changing the water flow. Secondly, there is an increasing securitization of large-scale hydropower dams with questionable outcomes. Despite hydropower dams raise many controversies, many riparian states push the development at all cost. Such water security dilemma can be especially traced to Laos and Cambodia, which highly invest in the hydropower sector even at the expense of the local environment and good relations with neighbouring countries situated lower on the river. Thirdly, there is a lack of accountable transboundary water governance that will effectively face a looming water crisis. To date, most of the existing cooperation mechanisms are undermined by the geopolitical interests of foreign donors and increasing mistrust to scientific approaches dealing with water insecurity. Our findings are beneficial for the policy-makers and other water experts who want to grasp the broader hydropolitical context in the Mekong River Basin and better understand the new water security threats, including misinterpretation of the hydrological data and legitimization of the pro-development narratives.

Keywords: critical hydropolitics, mekong river, politicization of science, water governance, water security

Procedia PDF Downloads 203
4697 Aggressive Behaviour and Its Association with Substance Use Disorder among Senior Secondary School Students in Ilesha, Nigeria

Authors: Famurewa Olumide Joseph, Akinsulore Adesanmi

Abstract:

The current study investigated aggressive behaviour and its association with substance use disorder among senior secondary school students in Ilesha, Nigeria. Participants were three hundred and seventy-five (375) comprising (212) females and (163) males of senior secondary school students in Ilesa East and Ilesa West; who were randomly selected among the population of students from the schools. The mean age of the respondents was 14.61 years (S.D = 1.16), with 311 (82.9%) between 14 – 16 years. Female respondents were 212 (56.5%), while male respondents were 163 (43.5%). A cross sectional design was adopted. Three instruments were used for data collection. Buss Perry Aggression Questionnaire, Alcohol Use Disorder Identification Test (AUDIT) and Drug Abuse Screening Test (DAST). It was hypothesized that aggressive behaviour will be associated with substance use disorder among senior secondary school students in Ilesa East and Ilesa West. The result indicated that the overall prevalence of substance use disorder was 16.0%. Chi-Square test exploring the association between aggressive behaviour and substance use disorder shows that there is a significant association between aggressive behaviour and substance use disorder (χ2 =8.55, p =0.014). Results also showed that emotional problem (χ2 (2) =13.0; p = 0.001) was statistically significant while current medications intake (χ2 (2) =2.03; p =0.362) and overall wellbeing (χ2 (4) =2.49; p =0.646) were not statistically significant. There is an inverse association between prosocial behaviour and aggressive behaviour (r= -0.037, p>0.05). This indicates that as the level of prosocial behaviour increases, the level of aggressive behaviour among respondents decreases. However, alcohol use had no correlation with aggressive behaviour (r=0.070, p>0.05). Among the implications stated is that factors such as emotional symptoms, conduct problems, hyperactivity, peer problem and drug use contributed to the prevalence of aggressive behaviour among students. Suggestions for further studies were equally made.

Keywords: aggressive behaviour, alcohol, prevalence, students, substance use disorder (SUD)

Procedia PDF Downloads 74
4696 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 176
4695 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 211
4694 Promotion of Healthy Food Choices in School Children through Nutrition Education

Authors: Vinti Davar

Abstract:

Introduction: Childhood overweight increases the risk for certain medical and psychological conditions. Millions of school-age children worldwide are affected by serious yet easily treatable and preventable illnesses that inhibit their ability to learn. Healthier children stay in school longer, attend more regularly, learn more and become healthier and more productive adults. Schools are an important setting for nutrition education because one can reach most children, teachers and parents. These years offer a key window for shaping their lifetime habits, which have an impact on their health throughout life. Against this background, an attempt was made to impart nutrition education to school children in Haryana state of India to promote healthy food choices and assess the effectiveness of this program. Methodology: This study was completed in two phases. During the first phase, pre-intervention anthropometric and dietary survey was conducted; the teaching materials for nutrition intervention program were developed and tested; and the questionnaire was validated. In the second phase, an intervention was implemented in two schools of Kurukshetra, Haryana for six months by personal visits once a week. A total of 350 children in the age group of 6-12 years were selected. Out of these, 279 children, 153 boys and 126 girls completed the study. The subjects were divided into four groups namely: underweight, normal, overweight and obese based on body mass index-for-age categories. A power point colorful presentation to improve the quality of tiffin, snacks and meals emphasizing inclusion of all food groups especially vegetables every day and fruits at least 3-4 days per week was used. An extra 20 minutes of aerobic exercise daily was likewise organized and a healthy school environment created. Provision of clean drinking water by school authorities was ensured. Selling of soft drinks and energy-dense snacks in the school canteen as well as advertisements about soft drink and snacks on the school walls were banned. Post intervention, anthropometric indices and food selections were reassessed. Results: The results of this study reiterate the critical role of nutrition education and promotion in improving the healthier food choices by school children. It was observed that normal, overweight and obese children participating in nutrition education intervention program significantly (p≤0.05) increased their daily seasonal fruit and vegetable consumption. Fat and oil consumption was significantly reduced by overweight and obese subjects. Fast food intake was controlled by obese children. The nutrition knowledge of school children significantly improved (p≤0.05) from pre to post intervention. A highly significant increase (p≤0.00) was noted in the nutrition attitude score after intervention in all four groups. Conclusion: This study has shown that a well-planned nutrition education program could improve nutrition knowledge and promote positive changes in healthy food choices. A nutrition program inculcates wholesome eating and active life style habits in children and adolescents that could not only prevent them from chronic diseases and early death but also reduce healthcare cost and enhance the quality of life of citizens and thereby nations.

Keywords: children, eating habits healthy food, obesity, school going, fast foods

Procedia PDF Downloads 199
4693 The Influence of Mathematic Learning Outcomes towards Physics Ability in Senior High School through Authentic Assessment System

Authors: Aida Nurul Safitri, Rosita Sari

Abstract:

Physics is science, which in its learning there are some product such as theory, fact, concept, law and formula. So that to understand physics lesson students not only need a theory or concept but also mathematical calculation to solve physics problem through formula or equation. This is can be taken from mathematics lesson which obtained by students. This research is to know the influence of mathematics learning outcomes towards physics ability in Senior High School through authentic assessment system. Based on the researches have been discussed, is obtained that mathematic lesson have an important role in physics learning but it according to one aspect only, namely cognitive aspect. In Indonesia, curriculum of 2013 reinforces displacement in the assessment, from assessment through test (measuring the competence of knowledge based on the result) toward authentic assessment (measuring the competence of attitudes, skills, and knowledge based on the process and results). In other researches are mentioned that authentic assessment system give positive responses for students to improve their motivation and increase the physics learning in the school.

Keywords: authentic assessment, curriculum of 2013, mathematic, physics

Procedia PDF Downloads 239
4692 Developing Gifted Students’ STEM Career Interest

Authors: Wing Mui Winnie So, Tian Luo, Zeyu Han

Abstract:

To fully explore and develop the potentials of gifted students systematically and strategically by providing them with opportunities to receive education at appropriate levels, schools in Hong Kong are encouraged to adopt the "Three-Tier Implementation Model" to plan and implement the school-based gifted education, with Level Three refers to the provision of learning opportunities for the exceptionally gifted students in the form of specialist training outside the school setting by post-secondary institutions, non-government organisations, professional bodies and technology enterprises. Due to the growing concern worldwide about low interest among students in pursuing STEM (Science, Technology, Engineering, and Mathematics) careers, cultivating and boosting STEM career interest has been an emerging research focus worldwide. Although numerous studies have explored its critical contributors, little research has examined the effectiveness of comprehensive interventions such as “Studying with STEM professional”. This study aims to examine the effect on gifted students’ career interest during their participation in an off-school support programme designed and supervised by a team of STEM educators and STEM professionals from a university. Gifted students were provided opportunities and tasks to experience STEM career topics that are not included in the school syllabus, and to experience how to think and work like a STEM professional in their learning. Participants involved 40 primary school students joining the intervention programme outside the normal school setting. Research methods included adopting the STEM career interest survey and drawing tasks supplemented with writing before and after the programme, as well as interviews before the end of the programme. The semi-structured interviews focused on students’ views regarding STEM professionals; what’s it like to learn with a STEM professional; what’s it like to work and think like a STEM professional; and students’ STEM identity and career interest. The changes in gifted students’ STEM career interest and its well-recognised significant contributors, for example, STEM stereotypes, self-efficacy for STEM activities, and STEM outcome expectation, were collectively examined from the pre- and post-survey using T-test. Thematic analysis was conducted for the interview records to explore how studying with STEM professional intervention can help students understand STEM careers; build STEM identity; as well as how to think and work like a STEM professional. Results indicated a significant difference in STEM career interest before and after the intervention. The influencing mechanism was also identified from the measurement of the related contributors and the analysis of drawings and interviews. The potential of off-school support programme supervised by STEM educators and professionals to develop gifted students’ STEM career interest is argued to be further unleashed in future research and practice.

Keywords: gifted students, STEM career, STEM education, STEM professionals

Procedia PDF Downloads 64
4691 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 159
4690 Artificial Intelligence for All: Artificial Intelligence Education for K-12

Authors: Yiqiao Yin

Abstract:

Many scholars and educators have dedicated their lives in K12 education system and there has been an exploding amount of attention to implement technical foundations for Artificial Intelligence Education for high school and precollege level students. This paper focuses on the development and use of resources to support K-12 education in Artificial Intelligence (AI). The author and his team have more than three years of experience coaching students from pre-college level age from 15 to 18. This paper is a culmination of the experience and proposed online tools, software demos, and structured activities for high school students. The paper also addresses a portfolio of AI concepts as well as the expected learning outcomes. All resources are provided with online videos and Github repositories for immediate use.

Keywords: K12 education, AI4ALL, pre-college education, pre-college AI

Procedia PDF Downloads 123
4689 Early Adolescents Motivation and Engagement Levels in Learning in Low Socio-Economic Districts in Sri Lanka (Based on T-Tests Results)

Authors: Ruwandika Perera

Abstract:

Even though the Sri Lankan government provides a reasonable level of support for students at all levels of the school system, for example, free education, textbooks, school uniforms, subsidized public transportation, and school meals, low participation in learning among secondary students is an issue warranting investigation, particularly in low socio-economic districts. This study attempted to determine the levels of motivation and engagement amongst students in a number of schools in two low socio-economic districts of Sri Lanka. This study employed quantitative research design in an attempt to determine levels of motivation and engagement amongst Sri Lankan secondary school students. Motivation and Engagement Scale-Junior School (MES-JS) was administered among 100 Sinhala-medium and 100 Tamil-medium eighth-grade students (50 students from each gender). The mean age of the students was 12.8 years. Schools were represented by type 2 government schools located in Monaragala and Nuwara Eliya districts in Sri Lanka. Confirmatory factor analysis (CFA) was conducted to measure the construct validity of the scale. Since this did not provide a robust solution, exploratory factor analysis (EFA) was conducted. Four factors were identified; Failure Avoidance and Anxiety (FAA), Positive Motivation (PM), Uncertain Control (UC), and Positive Engagement (PE). An independent-samples t-test was conducted to compare PM, PE, FAA, and UC in gender and ethnic groups. There was no significant difference identified for PE, FAA, and UC scales based upon gender. These results indicate that for the participants in this study, there were no significant differences based on gender in the levels of failure avoidance and anxiety, uncertain control, and positive engagement in the school experience. But, the result for the PM scale was close to significant, indicating there may be differences based on gender for positive motivation. A significant difference exists for all scales based on ethnicity, with the mean result for the Tamil students being significantly higher than that for the Sinhala students. These results indicate those Sinhala-medium students’ levels of positive motivation and positive engagement in learning was lower than Tamil-medium students. Also, these results indicate those Tamil-medium students’ levels of failure avoidance, anxiety, and uncertain control was higher than Sinhala-medium students. It could be concluded that male students levels of PM were significantly lower than female students. Also, Sinhala-medium students’ levels of PM and PE was lower than Tamil-medium students, and Tamil-medium students levels of FAA and UC was significantly higher than Sinhala-medium students. Thus, there might be particular school-related conditions affecting this situation, which are related to early adolescents’ motivation and engagement in learning.

Keywords: early adolescents, engagement, low socio-economic districts, motivation

Procedia PDF Downloads 150
4688 Philosophical Foundations of Education at the Kazakh Languages by Aiding Communicative Methods

Authors: Duisenova Marzhan

Abstract:

This paper considers the looking from a philosophical point of view the interactive technology and tiered developing Kazakh language teaching primary school pupils through the method of linguistic communication, content and teaching methods formed in the education system. The values determined by the formation of new practical ways that could lead to a novel qualitative level and solving the problem. In the formation of the communicative competence of elementary school students would be to pay attention to other competencies. It helps to understand the motives and needs socialization of students, the development of their cognitive abilities and participate in language relations arising from different situations. Communicative competence is the potential of its own in pupils creative language activity. In this article, the Kazakh language teaching in primary school communicative method is presented. The purpose of learning communicative method, personal development, effective psychological development of the child, himself-education, expansion and growth of language skills and vocabulary, socialization of children, the adoption of the laws of life in the social environment, analyzed the development of vocabulary richness of the language that forms the erudition to ensure continued improvement of education of the child.

Keywords: communicative, culture, training, process, method, primary, competence

Procedia PDF Downloads 326
4687 Catering for Children with Autism in the Regular Classroom: Challenges and the Way Forward

Authors: Beatrice Tayo Ajayi, Dzever Linus Terry

Abstract:

Pupils with autism in the general classroom have dare need to be adequately catered for in social and academic activities for successful attainment in school work and future life. However, adequate catering for autistic children by teachers that basically received no training in content related to inclusive education and lack the ability to use inclusive strategies during classroom instruction appears to be a mirage. This paper intends to examine the current classroom environment in relation to the level to which autistic primary school pupils are catered for in the regular classroom. The study also seeks to identify the challenges teachers experience in the course of catering to the needs of children with autism and the way out. The sample consists of thirty (30) primary school teachers of Ondo West Local Government Area, Ondo State, Nigeria (10 male, 15 female), age grades between twenty five (25) to sixty (60). Data collection will be a survey using the researcher developed 18 statements Four Point- Likert Scale type to assess the level to which participants agree or disagree with the statement about catering for pupils with autism. Results are to be evaluated using descriptive statistical methods of mean scores and t-test.

Keywords: autism, catering, general classroom, way forward

Procedia PDF Downloads 102
4686 Analyzing the Relationship between Physical Fitness and Academic Achievement in Chinese High School Students

Authors: Juan Li, Hui Tian, Min Wang

Abstract:

In China, under the considerable pressure of 'Gaokao' –the highly competitive college entrance examination, high school teachers and parents often worry that doing physical activity would take away the students’ precious study time and may have a negative impact on the academic grades. There was a tendency to achieve high academic scores at the cost of physical exercise. Therefore, the purpose of this study was to examine the relationship between the physical fitness and academic achievement of Chinese high school students. The participants were 968 grade one (N=457) and grade two students (N=511) with an average age of 16 years from three high schools of different levels in Beijing, China. 479 were boys, and 489 were girls. One of the schools is a top high school in China, another is a key high school in Beijing, and the other is an ordinary high school. All analyses were weighted using SAS 9.4 to ensure the representatives of the sample. The weights were based on 12 strata of schools, sex, and grades. Physical fitness data were collected using the scores of the National Physical Fitness Test, which is an annual official test administered by the Ministry of Education in China. It includes 50m run, sits and reach test, standing long jump, 1000m run (for boys), 800m run (for girls), pull-ups for 1 minute (for boys), and bent-knee sit-ups for 1 minute (for girls). The test is an overall evaluation of the students’ physical health on the major indexes of strength, endurance, flexibility, and cardiorespiratory function. Academic scores were obtained from the three schools with the students’ consent. The statistical analysis was conducted with SPSS 24. Independent-Samples T-test was used to examine the gender group differences. Spearman’s Rho bivariate correlation was adopted to test for associations between physical test results and academic performance. Statistical significance was set at p<.05. The study found that girls obtained higher fitness scores than boys (p=.000). The girls’ physical fitness test scores were positively associated with the total academic grades (rs=.103, p=.029), English (rs=.096, p=.042), physics (rs=.202, p=.000) and chemistry scores (rs=.131, p=.009). No significant relationship was observed in boys. Cardiorespiratory fitness had a positive association with physics (rs=.196, p=.000) and biology scores (rs=.168, p=.023) in girls, and with English score in boys (rs=.104, p=.029). A possible explanation for the greater association between physical fitness and academic achievement in girls rather than boys was that girls showed stronger motivation in achieving high scores in whether academic tests or fitness tests. More driven by the test results, girls probably tended to invest more time and energy in training for the fitness test. Higher fitness levels were associated with an academic benefit among girls generally in Chinese high schools. Therefore, physical fitness needs to be given greater emphasis among Chinese adolescents and gender differences need to be taken into consideration.

Keywords: physical fitness; adolescents; academic achievement; high school

Procedia PDF Downloads 122
4685 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security

Authors: Katie Wood

Abstract:

Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.

Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity

Procedia PDF Downloads 233
4684 A Qualitative Study of Children's Growth in Creative Dance: An Example of Cloud Gate Dance School in Taiwan

Authors: Chingwen Yeh, Yu Ru Chen

Abstract:

This paper aims to explore the growth and development of children in the creative dance class of Cloud Gate Dance School in Taichung Taiwan. Professor Chingwen Yeh’s qualitative research method was applied in this study. First of all, application of Dalcroze Eurhythmic teaching materials such as music, teaching aids, speaking language through classroom situation was collected and exam. Second, the in-class observation on the participation of the young children's learning situation was recorded both by words and on video screen as the research data. Finally, data analysis was categorized into the following aspects: children's body movement coordination, children’s mind concentration and imagination and children’s verbal expression. Through the in-depth interviews with the in-class teachers, parents of participating children and other in class observers were conducted from time to time; this research found the children's body rhythm, language skills, and social learning growth were improved in certain degree through the creative dance training. These authors hope the study can contribute as the further research reference on the related topic.

Keywords: Cloud Gate Dance School, creative dance, Dalcroze, Eurhythmic

Procedia PDF Downloads 290
4683 The Fadama Initiative: Implications for Human Security and Sustainable Development in Nigeria

Authors: Albert T. Akume, Yahya M. Abdullahi

Abstract:

The impact of poverty on individual and society is grave, hence the efforts by the government to eradicate or alleviate. In Nigeria the various efforts to reduce rural poverty by empowering them and making the process of their development self-sustaining have ended dismally. That notwithstanding, government determination to conquer poverty has not diminish as in the early 1990s the government with financial collaboration from the World Bank and African Development Bank introduced the fadama project. It is against this backdrop that this paper uses the documentary and analytical research methods to examine the implication the fadama development project has for community capacity development and human security in Nigeria. From the analysis it was discovered the fadama project improved household income of fadama farmers, community empowerment, participatory development planning and support for demand driven productive investment in farm and non-farm activities including community infrastructures. Despite this impressive result the fadama project is challenged by conflict especially in northern Nigeria and late delivery of necessary farm consumables that aid improved productivity. It was therefore recommended that the government should strengthen her various state security institutions to proactively mitigate conflicts and to ensure that farm consumables and other support services reach farmers timely.

Keywords: capacity development, empowerment, fadama, human security, poverty reduction, theory of change, sustainable development

Procedia PDF Downloads 478