Search results for: security program
5402 Security in Resource Constraints: Network Energy Efficient Encryption
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC
Procedia PDF Downloads 1475401 Nurses’ Perception of Pain and Skin Tearing during Dressing Change
Authors: Jung Yoon Kim
Abstract:
Introduction: Wounds inevitably cause patients to experience discomfort, distress, and consequentially reduced quality of life due to entailed pain, maceration, and foul odor. The dressing has been a universal wound care method in which wounds are covered and protected, and an optimum environment for healing is provided. This study aimed to investigate Korean nurses’ level of awareness of pain and skin tearing in wound beds and/or peri-wound skin at dressing change. Methods: A descriptive study was performed. Convenience sampling was employed, and registered nurses were recruited from attendees of continuing education program. A total of 399 participants (RN) completed the questionnaire. Data were collected from September to November 2022. Results: Many of them perceived skin tearing and wound-related pain associated with dressing changes, but most of them did not assess and record pain and skin tearing at dressing change. More than half of the respondents reported that they did not provide nursing intervention to prevent pain and skin tearing. Many of them reported that a systematic educational program for preventing pain and skin tearing at dressing changes was needed. Discussion: Many of the respondents were aware of pain and skin tearing at dressing change but did not take any further necessary measures, including nursing intervention, for the most appropriate, systematic pain and skin tearing management. Therefore, this study suggested that a systematic and comprehensive educational program for Korean healthcare professionals needs to be developed and implemented in Korea’s hospital settings.Keywords: skin tearing, pain, dressing change, nurses
Procedia PDF Downloads 1055400 Online Faculty Professional Development: An Approach to the Design Process
Authors: Marie Bountrogianni, Leonora Zefi, Krystle Phirangee, Naza Djafarova
Abstract:
Faculty development is critical for any institution as it impacts students’ learning experiences and faculty performance with regards to course delivery. With that in mind, The Chang School at Ryerson University embarked on an initiative to develop a comprehensive, relevant faculty development program for online faculty and instructors. Teaching Adult Learners Online (TALO) is a professional development program designed to build capacity among online teaching faculty to enhance communication/facilitation skills for online instruction and establish a Community of Practice to allow for opportunities for online faculty to network and exchange ideas and experiences. TALO is comprised of four online modules and each module provides three hours of learning materials. The topics focus on online teaching and learning experience, principles and practices, opportunities and challenges in online assessments as well as course design and development. TALO offers a unique experience for online instructors who are placed in the role of a student and an instructor through interactivities involving discussions, hands-on assignments, peer mentoring while experimenting with technological tools available for their online teaching. Through exchanges and informal peer mentoring, a small interdisciplinary community of practice has started to take shape. Successful participants have to meet four requirements for completion: i) participate actively in online discussions and activities, ii) develop a communication plan for the course they are teaching, iii) design one learning activity/or media component, iv) design one online learning module. This study adopted a mixed methods exploratory sequential design. For the qualitative phase of this study, a thorough literature review was conducted on what constitutes effective faculty development programs. Based on that review, the design team identified desired competencies for online teaching/facilitation and course design. Once the competencies were identified, a focus group interview with The Chang School teaching community was conducted as a needs assessment and to validate the competencies. In the quantitative phase, questionnaires were distributed to instructors and faculty after the program was launched to continue ongoing evaluation and revisions, in hopes of further improving the program to meet the teaching community’s needs. Four faculty members participated in a one-hour focus group interview. Major findings from the focus group interview revealed that for the training program, faculty wanted i) to better engage students online, ii) to enhance their online teaching with specific strategies, iii) to explore different ways to assess students online. 91 faculty members completed the questionnaire in which findings indicated that: i) the majority of faculty stated that they gained the necessary skills to demonstrate instructor presence through communication and use of technological tools provided, ii) increased faculty confidence with course management strategies, iii) learning from peers is most effective – the Community of Practice is strengthened and valued even more as program alumni become facilitators. Although this professional development program is not mandatory for online instructors, since its launch in Fall 2014, over 152 online instructors have successfully completed the program. A Community of Practice emerged as a result of the program and participants continue to exchange thoughts and ideas about online teaching and learning.Keywords: community of practice, customized, faculty development, inclusive design
Procedia PDF Downloads 1795399 The Effective of Training Program Using Neuro- Linguistic Programming (NLP) to Reduce the Test Anxiety through the Use of Biological Feedback
Authors: Mohammed Fakehy, Mohammed Haggag
Abstract:
The problem of test anxiety considered as one of the most important and most complex psychological problems faced by students of King Saud University, where university students in a need to bring their reassurance and psychological comfort, relieves feeling pain and difficulties of the study. Recently, there are programs and science that help human to change, including the science Linguistic Programming this neural science stems from not just the tips of the need to make the effort or continue to work, but provides the keys in which one can be controlled in the internal environment. Even human potential energy is extracted seeking to achieve success and happiness and excellence. Through the work of the researchers as members of the teaching staff at King Saud University and specialists in the field of psychology noticed the suffering of some students of King Saud University, test anxiety. In an attempt by the researchers to mitigate as much as possible of the unity of this concern, students will have a training program in Neuro Linguistic Programming. The main Question of this study is What is the effectiveness of the impact of a training program using NLP to reduce test anxiety by using a biological feedback. Therefore, the results of this study might serve as a good announcement about the usefulness of NLP programs which influence future research to significant effect of NLP on test anxiety.Keywords: neuro linguistic programming, test anxiety, biological feedback, king saud
Procedia PDF Downloads 5305398 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 235397 The Impact of Corporate Social Responsibility and Knowledge Management Factors on Students’ Job Performance: A Case Study of Silpakorn University’s Internship Program
Authors: Naritphol Boonjyakiat
Abstract:
This research attempts to investigate the effects of corporate social responsibility and knowledge management factors on students’ job performance of the Silpakorn University’s internship program within various organizations. The goal of this study is to fill the literature gap by gaining an understanding of corporate social responsibility and the knowledge management factors that fundamentally relate to students’ job performance within the organizations. Thus, this study will focus on the outcomes that were derived from a set of secondary data that were obtained using a Silpakorn university’s data base of 200 students and selected employer assessment and evaluation forms from the companies. The results represent the perceptions of students towards the corporate social responsibility aspects and knowledge management factors within the university and their job performance evaluation from the employers in various organizations. The findings indicate that corporate social responsibility and knowledge management have significant effects on students’ job performance. This study may assist us in gaining a better understanding of the integrated aspects of university and workplace environments to discover how to optimally allocate university’s resources and management approaches to gain benefits from corporate social responsibility and knowledge management practices toward students’ job performance within an organizational experience settings. Therefore, there is a sufficient reason to believe that the findings can contribute to research in the area of CSR, KM, and job performance as essential aspect of involved stakeholder.Keywords: corporate social responsibility, knowledge management, job performance, internship program
Procedia PDF Downloads 3365396 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 1275395 Cyber Security and Risk Assessment of the e-Banking Services
Authors: Aisha F. Bushager
Abstract:
Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.Keywords: cyber security, e-banking, risk assessment, threats identification
Procedia PDF Downloads 3555394 Factors that Contribute to the Improvement of the Sense of Self-Efficacy of Special Educators in Inclusive Settings in Greece
Authors: Sotiria Tzivinikou, Dimitra Kagkara
Abstract:
Teacher’s sense of self-efficacy can affect significantly both teacher’s and student’s performance. More specific, self-efficacy is associated with the learning outcomes as well as student’s motivation and self-efficacy. For example, teachers with high sense of self-efficacy are more open to innovations and invest more effort in teaching. In addition to this, effective inclusive education is associated with higher levels of teacher’s self-efficacy. Pre-service teachers with high levels of self-efficacy could handle student’s behavior better and more effectively assist students with special educational needs. Teacher preparation programs are also important, because teacher’s efficacy beliefs are shaped early in learning, as a result the quality of teacher’s education programs can affect the sense of self-efficacy of pre-service teachers. Usually, a number of pre-service teachers do not consider themselves well prepared to work with students with special educational needs and do not have the appropriate sense of self-efficacy. This study aims to investigate the factors that contribute to the improvement of the sense of self-efficacy of pre-service special educators by using an academic practicum training program. The sample of this study is 159 pre-service special educators, who also participated in the academic practicum training program. For the purpose of this study were used quantitative methods for data collection and analysis. Teacher’s self-efficacy was assessed by the teachers themselves with the completion of a questionnaire which was based on the scale of Teacher’s Sense of Efficacy Scale. Pre and post measurements of teacher’s self-efficacy were taken. The results of the survey are consistent with those of the international literature. The results indicate that a significant number of pre-service special educators do not hold the appropriate sense of self-efficacy regarding teaching students with special educational needs. Moreover, a quality academic training program constitutes a crucial factor for the improvement of the sense of self-efficacy of pre-service special educators, as additional for the provision of high quality inclusive education.Keywords: inclusive education, pre-service, self-efficacy, training program
Procedia PDF Downloads 2555393 Efficacy of Educational Program on the Performance of Internship Nursing Students Regarding Electronic Fetal Monitoring
Authors: Aida Abd El-Razek, Alyaa Salman Madian, Gamila Gaber Ayoub
Abstract:
Background: Electronic fetal monitoring is an obstetric technology that helps to record any changes in fetal heart rate and uterine activity. The aim of this study was to determine the efficacy of educational programs on the performance of internship nursing students regarding electronic fetal monitoring in obstetrics and gynecology departments. Design: A quasi-experimental research design (pre- and post-test) was used. Sample: A convenient sample of all internship nursing students (180 internship nursing students) from the Faculty of Nursing at Menoufia University during the academic year 2022-2023). The instruments of this study were a structured, self-administered interview questionnaire consisting of two parts: the socio-demographic characteristics of the study participants and an assessment of internship nursing students’ knowledge regarding electronic fetal monitoring (pre- and post-test). Observational checklist to assess internship nursing students’ performance regarding EFM. Results: There were highly statistically significant differences between the internship nurses' students’ knowledge and performance on the pretest and posttest. Conclusion: An educational program on electronic fetal monitoring carries a vital value for enhancing internship nursing students’ knowledge and performance, which ultimately leads to improved maternal and fetal outcomes. Recommendation: Regular educational programs and workshops about electronic fetal monitoring should be encouraged for all maternity nurses and internship nursing students.Keywords: educational program, internship nursing students, performance, efficacy
Procedia PDF Downloads 565392 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4085391 Effectiveness of Impairment Specified Muscle Strengthening Programme in a Group of Disabled Athletes
Authors: A. L. I. Prasanna, E. Liyanage, S. A. Rajaratne, K. P. A. P. Kariyawasam, A. A. J. Rajaratne
Abstract:
Maintaining or improving the muscle strength of the injured body part is essential to optimize performance among disabled athletes. General conditioning and strengthening exercises might be ineffective if not sufficiently intense enough or targeted for each participant’s specific impairment. Specific strengthening programme, targeted to the affected body part, are essential to improve the strength of impaired muscles and increase in strength will help reducing the impact of disability. Methods: The muscle strength of hip, knee and ankle joints was assessed in a group of randomly selected disabled athletes, using the Medical Research Council (MRC) grading. Those having muscle strength of grade 4 or less were selected for this study (24 in number) and were given and a custom made exercise program designed to strengthen their hip, knee or ankle joint musculature, according to the muscle or group of muscles affected. Effectiveness of the strengthening program was assessed after a period of 3 months. Results: Statistical analysis was done using the Minitab 16 statistical software. A Mann-Whitney U test was used to compare the strength of muscle group before and after exercise programme. A significant difference was observed after the three month strengthening program for knee flexors (Left and Right) (P =0.0889, 0.0312) hip flexors (left and right) (P=0.0312, 0.0466), hip extensors (Left and Right) (P=0.0478, 0.0513), ankle plantar flexors (Left and Right) (P=0.0466, 0.0423) and right ankle dorsiflexors (P= 0.0337). No significant difference of strength was observed after the strengthening program in the knee extensors (left and right), hip abductors (left and right) and left ankle dorsiflexors. Conclusion: Impairment specific exercise programme appear to be beneficial for disabled athletes to significantly improve the muscle strength of the affected joints.Keywords: muscle strengthening programme, disabled athletes, physiotherapy, rehabilitation sciences
Procedia PDF Downloads 3625390 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems
Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy
Abstract:
The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.Keywords: smart grids, blockchain, fiber optic sensor, security
Procedia PDF Downloads 1265389 Effect of Labisia pumila var. alata with a Structured Exercise Program in Women with Polycystic Ovarian Syndrome
Authors: D. Maryama AG. Daud, Zuliana Bacho, Stephanie Chok, DG. Mashitah PG. Baharuddin, Mohd Hatta Tarmizi, Nathira Abdul Majeed, Helen Lasimbang
Abstract:
Lifestyle, physical activity, food intake, genetics and medication are contributing factors for people getting obese. Which in some of the obese people were a low or non-responder to exercise. And obesity is very common clinical feature in women affected by Polycystic Ovarian Syndrome (PCOS). Labisia pumila var. alata (LP) is a local herb which had been widely used by Malay women in treating menstrual irregularities, painful menstruation and postpartum well-being. Therefore, this study was carried out to investigate the effect of LP with a structured exercise program on anthropometric, body composition and physical fitness performance of PCOS patients. By using a single blind and parallel study design, where by subjects were assigned into a 16-wk structured exercise program (3 times a week) interventions; (LP and exercise; LPE, and exercise only; E). All subjects in the LPE group were prescribed 200mg LP; once a day, for 16 weeks. The training heart rate (HR) was monitored based on a percentage of the maximum HR (HRmax) achieved during submaximal exercise test that was conducted at wk-0 and wk-8. The progression of aerobic exercise intensity from 25–30 min at 60 – 65% HRmax during the first week to 45 min at 75–80% HRmax by the end of this study. Anthropometric (body weight, Wt; waist circumference, WC; and hip circumference, HC), body composition (fat mass, FM; percentage body fat, %BF; Fat Free Mass, FFM) and physical fitness performance (push up to failure, PU; 1-minute Sit Up, SU; and aerobic step test, PVO2max) were measured at wk-0, wk-4, wk-8, wk-12, and wk-16. This study found that LP does not have a significant effect on body composition, anthropometric and physical fitness performance of PCOS patients underwent a structured exercise program. It means LP does not improve exercise responses of PCOS patients towards anthropometric, body composition and physical fitness performance. The overall data shows exercise responses of PCOS patients is by increasing their aerobic endurance and muscle endurance performances, there is a significant reduction in FM, PBF, HC, and Wt significantly. Therefore, exercise program for PCOS patients have to focus on aerobic fitness, and muscle endurance.Keywords: polycystic ovarian syndrome, Labisia pumila var. alata, body composition, aerobic endurance, muscle endurance, anthropometric
Procedia PDF Downloads 2095388 Flow Links Curiosity and Creativity: The Mediating Role of Flow
Authors: Nicola S. Schutte, John M. Malouff
Abstract:
Introduction: Curiosity is a positive emotion and motivational state that consists of the desire to know. Curiosity consists of several related dimensions, including a desire for exploration, deprivation sensitivity, and stress tolerance. Creativity involves generating novel and valuable ideas or products. How curiosity may prompt greater creativity remains to be investigated. The phenomena of flow may link curiosity and creativity. Flow is characterized by intense concentration and absorption and gives rise to optimal performance. Objective of Study: The objective of the present study was to investigate whether the phenomenon of flow may link curiosity with creativity. Methods and Design: Fifty-seven individuals from Australia (45 women and 12 men, mean age of 35.33, SD=9.4) participated. Participants were asked to design a program encouraging residents in a local community to conserve water and to record the elements of their program in writing. Participants were then asked to rate their experience as they developed and wrote about their program. Participants rated their experience on the Dimensional Curiosity Measure sub-scales assessing the exploration, deprivation sensitivity, and stress tolerance facets of curiosity, and the Flow Short Scale. Reliability of the measures as assessed by Cronbach's alpha was as follows: Exploration Curiosity =.92, Deprivation Sensitivity Curiosity =.66, Stress Tolerance Curiosity =.93, and Flow=.96. Two raters independently coded each participant’s water conservation program description on creativity. The mixed-model intraclass correlation coefficient for the two sets of ratings was .73. The mean of the two ratings produced the final creativity score for each participant. Results: During the experience of designing the program, all three types of curiosity were significantly associated with the flow. Pearson r correlations were as follows: Exploration Curiosity and flow, r =.68 (higher Exploration Curiosity was associated with more flow); Deprivation Sensitivity Curiosity and flow, r =.39 (higher Deprivation Sensitivity Curiosity was associated with more flow); and Stress Tolerance Curiosity and flow, r = .44 (more stress tolerance in relation to novelty and exploration was associated with more flow). Greater experience of flow was significantly associated with greater creativity in designing the water conservation program, r =.39. The associations between dimensions of curiosity and creativity did not reach significance. Even though the direct relationships between dimensions of curiosity and creativity were not significant, indirect relationships through the mediating effect of the experience of flow between dimensions of curiosity and creativity were significant. Mediation analysis using PROCESS showed that flow linked Exploration Curiosity with creativity, standardized beta=.23, 95%CI [.02,.25] for the indirect effect; Deprivation Sensitivity Curiosity with creativity, standardized beta=.14, 95%CI [.04,.29] for the indirect effect; and Stress Tolerance Curiosity with creativity, standardized beta=.13, 95%CI [.02,.27] for the indirect effect. Conclusions: When engaging in an activity, higher levels of curiosity are associated with greater flow. More flow is associated with higher levels of creativity. Programs intended to increase flow or creativity might build on these findings and also explore causal relationships.Keywords: creativity, curiosity, flow, motivation
Procedia PDF Downloads 1885387 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies
Authors: Arun Prabhakar
Abstract:
Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling
Procedia PDF Downloads 1435386 Supplier Selection by Bi-Objectives Mixed Integer Program Approach
Authors: K.-H. Yang
Abstract:
In the past, there was a lot of excellent research studies conducted on topics related to supplier selection. Because the considered factors of supplier selection are complicated and difficult to be quantified, most researchers deal supplier selection issues by qualitative approaches. Compared to qualitative approaches, quantitative approaches are less applicable in the real world. This study tried to apply the quantitative approach to study a supplier selection problem with considering operation cost and delivery reliability. By those factors, this study applies Normalized Normal Constraint Method to solve the dual objectives mixed integer program of the supplier selection problem.Keywords: bi-objectives MIP, normalized normal constraint method, supplier selection, quantitative approach
Procedia PDF Downloads 4205385 Female Sex Workers and Their Association with Self-Help Groups in Thane, Maharashtra, India: A Comparative Analysis in the Context of HIV Program Outcome
Authors: Awdhesh Yadav, P. S. Saravanamurthy, Shaikh Tayyaba, Uma Shah, Ashok Agarwal
Abstract:
Objectives: HIV interventions in India has leveraged Self-Help Group (SHG) as one of the key strategies under structural intervention to empower female sex workers (FSW) to reduce their risk exposure and vulnerability to STI/HIV. Understanding the role of SHGs in light of the evolving dynamics of sex work needs to be delved into to strategize HIV interventions among FSWs in India. This paper aims to study the HIV program outcome among the FSWs associated with SHGs and FSWs not associated with SHGs in Thane, Maharashtra. Study Design: This cross-sectional study, was undertaken from the Behavioral Tracking Survey (BTS) conducted among 503 FSWs in Thane in 2015. Two-stage probability based conventional sampling was done for selection of brothel and bar based FSWs, while Time Location Cluster (TLC) sampling was done for home, lodge and street-based sex workers. Methods: Bivariate and multivariate logistic regression were performed to compare and contrast between FSWs associated with SHG and those not associated with SHG with respect to the utilization of HIV related services by them. ‘Condom use’, ‘consistent condom use’, ‘contact with peer-educators’, ‘counseling sessions’ and ‘HIV testing’ were chosen as indicators on HIV service utilization. Results: 8% (38) of FSWs are registered with SHG; 92% aged ≥ 25 years, 47% illiterate, and 71% are currently married. The likelihood of utilizing HIV services including, knowledge on HIV/AIDS and its mode of transmission (OR:5.54; CI: 1.87-16.60; p < 0.05),accessed drop-in Centre (OR: 6.53; CI: 2.15-19.88; p < 0.10), heard about joint health camps (OR: 4.71; CI:2.12-10.46); p < 0.05), negotiated or stood up against police/broker/local goonda/clients (OR: 2.26; CI: 1.08-4.73; p < 0.05), turned away clients when they refused to use condom during sex (OR: 3.76; CI: 1.27-11.15; p < 0.05) and heard of ART (OR; 4.55; CI: 2.18-9.48; p < 0.01) were higher among FSWs associated with SHG in comparison to FSWs not associated with SHG. Conclusions: Considering the improved HIV program outcomes among FSWs associated with SHG; HIV interventions among FSWs could consider facilitating the formation of SHGs with FSWs as one of the key strategies to empower the community for ensuring better program outcomes.Keywords: empowerment, female sex workers, HIV, Thane, self-help group
Procedia PDF Downloads 2415384 A Coordinated School Health Program Effect on Cardiorespiratory Fitness in Preschool Children
Authors: Zasha Romero, Roberto Trevino, Lin Wang, Elizabeth Alanis, Jesus Cuellar
Abstract:
Background: There is a strong relationship between low cardiorespiratory fitness (CRF) and high adiposity levels. The purpose of this study was to assess the effects of the Bienestar/Neema Coordinated School Health Program (BN CSHP) on the CRF of preschool children. Methods: This is a randomized cluster trial conducted in preschools of two school districts located along the Texas-Mexico border. Of 48 eligible schools, 28 were randomly selected (intervention, n=14; control, n=14). Family demographics and household health characteristics were collected from parents. CRF, as measured by the Progressive Anaerobic Capacity Endurance Run (PACER) fitness test, was collected from the children. A generalized linear mixed model (GLMM) was used to analyze the data. Results: Family demographics, household health characteristics, and children’s weight, obesity prevalence, and sedentary activity were similar among both treatment groups. After adjusting for covariates, the number of laps run by children in the control group increased by 23% (CI: -5% to 60%) per each data collection period compared with 53% (CI: 7% to 119%) in the intervention group. Conclusions: Children in the BN CSHP, compared to those in the control group, had a significantly higher increase in their CRF. This finding is important because of the health benefits of CRF in children.Keywords: coordinated school health program, cardiorespiratory fitness, obesity, border health, preschool, physical education, movement
Procedia PDF Downloads 895383 Successes on in vitro Isolated Microspores Embryogenesis
Authors: Zelikha Labbani
Abstract:
The In Vitro isolated micro spore culture is the most powerful androgenic pathway to produce doubled haploid plants in the short time. To deviate a micro spore toward embryogenesis, a number of factors, different for each species, must concur at the same time and place. Once induced, the micro spore undergoes numerous changes at different levels, from overall morphology to gene expression. Induction of micro spore embryogenesis not only implies the expression of an embryogenic program, but also a stress-related cellular response and a repression of the gametophytic program to revert the microspore to a totipotent status. As haploid single cells, micro spore became a strategy to achieve various objectives particularly in genetic engineering. In this study we would show the most recent advances in the producing haploid embryos via In Vitro isolated micro spore culture.Keywords: haploid cells, In Vitro isolated microspore culture, success
Procedia PDF Downloads 6185382 Bioinformatics Identification of Rare Codon Clusters in Proteins Structure of HBV
Authors: Abdorrasoul Malekpour, Mohammad Ghorbani Mojtaba Mortazavi, Mohammadreza Fattahi, Mohammad Hassan Meshkibaf, Ali Fakhrzad, Saeid Salehi, Saeideh Zahedi, Amir Ahmadimoghaddam, Parviz Farzadnia Dr., Mohammadreza Hajyani Asl Bs
Abstract:
Hepatitis B as an infectious disease has eight main genotypes (A–H). The aim of this study is to Bioinformatically identify Rare Codon Clusters (RCC) in proteins structure of HBV. For detection of protein family accession numbers (Pfam) of HBV proteins; used of uni-prot database and Pfam search tool were used. Obtained Pfam IDs were analyzed in Sherlocc program and RCCs in HBV proteins were detected. In further, the structures of TrEMBL entries proteins studied in PDB database and 3D structures of the HBV proteins and locations of RCCs were visualized and studied using Swiss PDB Viewer software. Pfam search tool have found nine significant hits and 0 insignificant hits in 3 frames. Results of Pfams studied in the Sherlocc program show this program not identified RCCs in the external core antigen (PF08290) and truncated HBeAg protein (PF08290). By contrast the RCCs become identified in Hepatitis core antigen (PF00906) Large envelope protein S (PF00695), X protein (PF00739), DNA polymerase (viral) N-terminal domain (PF00242) and Protein P (Pf00336). In HBV genome, seven RCC identified that found in hepatitis core antigen, large envelope protein S and DNA polymerase proteins and proteins structures of TrEMBL entries sequences that reported in Sherlocc program outputs are not complete. Based on situation of RCC in structure of HBV proteins, it suggested those RCCs are important in HBV life cycle. We hoped that this study provide a new and deep perspective in protein research and drug design for treatment of HBV.Keywords: rare codon clusters, hepatitis B virus, bioinformatic study, infectious disease
Procedia PDF Downloads 4925381 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices
Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman
Abstract:
The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.Keywords: hospital, light fidelity, Li-Fi, medical devices, security
Procedia PDF Downloads 1055380 Pueblos Mágicos in Mexico: The Loss of Intangible Cultural Heritage and Cultural Tourism
Authors: Claudia Rodriguez-Espinosa, Erika Elizabeth Pérez Múzquiz
Abstract:
Since the creation of the “Pueblos Mágicos” program in 2001, a series of social and cultural events had directly affected the heritage conservation of the 121 registered localities until 2018, when the federal government terminated the program. Many studies have been carried out that seek to analyze from different perspectives and disciplines the consequences that these appointments have generated in the “Pueblos Mágicos.” Multidisciplinary groups such as the one headed by Carmen Valverde and Liliana López Levi, have brought together specialists from all over the Mexican Republic to create a set of diagnoses of most of these settlements, and although each one has unique specificities, there is a constant in most of them that has to do with the loss of cultural heritage and that is related to transculturality. There are several factors identified that have fostered a cultural loss, as a direct reflection of the economic crisis that prevails in Mexico. It is important to remember that the origin of this program had as its main objective to promote the growth and development of local economies since one of the conditions for entering the program is that they have less than 20,000 inhabitants. With this goal in mind, one of the first actions that many “Pueblos Mágicos” carried out was to improve or create an infrastructure to receive both national and foreign tourists since this was practically non-existent. Creating hotels, restaurants, cafes, training certified tour guides, among other actions, have led to one of the great problems they face: globalization. Although by itself it is not bad, its impact in many cases has been negative for heritage conservation. The entry into and contact with new cultures has led to the undervaluation of cultural traditions, their transformation and even their total loss. This work seeks to present specific cases of transformation and loss of cultural heritage, as well as to reflect on the problem and propose scenarios in which the negative effects can be reversed. For this text, 36 “Pueblos Mágicos” have been selected for study, based on those settlements that are cited in volumes I and IV (the first and last of the collection) of the series produced by the multidisciplinary group led by Carmen Valverde and Liliana López Levi (researchers from UNAM and UAM Xochimilco respectively) in the project supported by CONACyT entitled “Pueblos Mágicos. An interdisciplinary vision”, of which we are part. This sample is considered representative since it forms 30% of the total of 121 “Pueblos Mágicos” existing at that moment. With this information, the elements of its intangible heritage loss or transformation have been identified in every chapter based on the texts written by the participants of that project. Finally, this text shows an analysis of the effects that this federal program, as a public policy applied to 132 populations, has had on the conservation or transformation of the intangible cultural heritage of the “Pueblos Mágicos.” Transculturality, globalization, the creation of identities and the desire to increase the flow of tourists have impacted the changes that traditions (main intangible cultural heritage) have had in the 18 years that the federal program lasted.Keywords: public policies, cultural tourism, heritage preservation, pueblos mágicos program
Procedia PDF Downloads 1945379 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 3535378 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 2295377 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment
Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref
Abstract:
In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment
Procedia PDF Downloads 1885376 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security
Authors: Carmen J. Savelli, Romy Conzade
Abstract:
Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.Keywords: food safety, food security, nutrition, policy
Procedia PDF Downloads 4285375 Extracorporeal Shock Wave Therapy versus Functional Electrical Stimulation on Spasticity, Function and Gait Parameters in Hemiplegic Cerebral Palsy
Authors: Mohamed A. Eid, Sobhy M. Aly
Abstract:
Background: About 75% of children with spastic hemiplegic cerebral palsy walk independently, but most still show abnormal gait patterns because of contractures across the joints and muscle spasticity. Objective: The purpose of this study was to investigate and compare the effects of extracorporeal shock wave therapy (ESWT) versus functional electrical stimulation (FES) on spasticity, function, and gait parameters in children with hemiplegic cerebral palsy (CP). Methods: A randomized controlled trail was conducted for 45 children with hemiplegic CP ranging in age from 6 to 9 years. They were assigned randomly using opaque envelopes into three groups. Physical Therapy (PT) group consisted of 15 children and received the conventional physical therapy program (CPTP) in addition to ankle foot orthosis (AFO). ESWT group consisted of 15 children and received the CPTP, AFO in addition to ESWT. FES group also consisted of 15 children and received the CPTP, AFO in addition to FES. All groups received the program of treatment 3 days/week for 12 weeks. Evaluation of spasticity by using the Modified Ashworth Scale (MAS), function by using the Pediatric Evaluation Disability Inventory (PEDI) and gait parameters by using the 3-D gait analysis was conducted at baseline and after 12 weeks of the treatment program. Results: Within groups, significant improvements in spasticity, function, and gait (P = 0.05) were observed in both ESWT and FES groups after treatment. While between groups, ESWT group showed significant improvements in all measured variables compared with FES and PT groups (P ˂ 0.05) after treatment. Conclusion: ESWT induced significant improvement than FES in decreasing spasticity and improving function and gait in children with hemiplegic CP. Therefore, ESWT should be included as an adjunctive therapy in the rehabilitation program of these children.Keywords: cerebral palsy, extracorporeal shock wave therapy, functional electrical stimulation, function, gait, spasticity
Procedia PDF Downloads 1335374 Feasibility and Acceptability of Modified Mindfulness-Based Stress Reduction for Health Care Workers in Acute Stress during the COVID-19 Pandemic
Authors: Susan Evans, Janna Gordon-Elliott, Katarzyna Wyka, Virginia Mutch
Abstract:
During the rise of the COVID-19 pandemic, healthcare workers needed an intervention that could address their profound acute stress. Mindfulness-based stress reduction (MBSR) is a program that has long established effectiveness for mental and physical health outcomes. In recent years, MBSR has been modified such that the duration of both class time and number of sessions has been abbreviated, and its delivery has been adapted for online dissemination, thus increasing the likelihood that individuals who could most benefit from the program would do so. We sought to investigate whether a brief, online version of MBSR could be feasible and acceptable for health care workers (HCW) in acute stress in response to the COVID-19 pandemic. Participants were recruited via an email sent to all hospital employees, which spans residents, physicians, nurses, housekeeping, lab technicians, administrators, and others. Participating HCW were asked about their previous experience with mindfulness and asked to commit to a minimum of 3 sessions. They were then provided with four weekly 1-hour sessions online that included the major mindfulness exercises taught during traditional MBSR programs (i.e., body scan, sitting meditation, mindful eating, and yoga). Participants were provided with supporting slides, videos, demonstrations and asked to track their practice. Hospital staff enrolled in the program; by the end of the first day of recruitment, 40 had applied; by the start date, about 100 were enrolled, and n attended a minimum of 3 sessions, supporting feasibility. Hospital staff also participated and practiced the mindfulness exercises (n=42), thus supporting acceptability. Participants reported that the program was logical, successful, and worth recommending both before starting the program and after completing it (M= 22.02 and M=21.76, respectively, possible range 0-27). There was a slight decline in the belief in improvement in health and well-being due to the program (ES=.37, p=.021). Secondary hypotheses regarding participants’ self-reported stress and levels of mindfulness were also supported, such that participants reported improvements in perceived stress (ES=.45, p=.006), compassion satisfaction, burnout, and secondary traumatic stress (ES=.41, ES=.31, ES=.35, respectively, p<.05). Participants reported significant improvements in the describing facet of mindfulness (ES=.49, p=.004), while all other facets (observing, acting with awareness, nonjudging of inner experience, nonreactivity to inner experience) remained unchanged pre- to post-program. Results from this study suggest that an abridged, online version of MBSR is feasible and accessible to health care workers in acute stress and provides benefits expected from traditional MBSR programs. The lack of a randomized control group limits generalizability. We intend to provide a structure, framework, and lessons learned to hospital administrators and clinical staff seeking to support their employees in acute stress.Keywords: acute stress, health care workers, mindfulness, online interventions
Procedia PDF Downloads 1345373 The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues
Authors: Akram Waheb Nasef Alzordoky
Abstract:
The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 28