Search results for: security program
5311 Developing a Staff Education Program on Subglottic Suction Endotracheal Tubes
Authors: Emily Toon
Abstract:
Nurses play a critical role in the prevention of ventilator-associated pneumonia through the maintenance of endotracheal tubes and use of subglottic secretion drainage via subglottic suctioning endotracheal tubes. The purpose of this evidence based practice project is to develop a staff education program on subglottic suctioning endotracheal tubes for critical care nurses at Middlesex Health with the aim of determining and documenting increased knowledge and/or practice change. The setting included registered nurses within Middlesex Health’s critical care unit who were recruited to complete a pre-test (n=14), view a presentation, and complete a post-test (n=10). Average pre-test scores were compared to average post-test scores to determine an increase in knowledge and/or practice change. The overall mean pre-test score was 59.7 percent, compared with the mean post-test score of 88.1 percent. Pre- and post-test scores were unmatched, so statistical significance could not be determined. The hypothesis that a staff education program on subglottic suctioning endotracheal tubes would demonstrate an increase in knowledge was supported, but not statistically. By integrating a pre-test/post-test design into educational presentations to evaluate increased knowledge, data generated may be used to improve methods and practices of delivering education and enhance staff learning.Keywords: endotracheal tubes, staff education, subglottic secretion drainage, ventilator-associated pneumonia
Procedia PDF Downloads 1185310 Structural Inequality and Precarious Workforce: The Role of Labor Laws in Destabilizing the Labor Force in Iran
Authors: Iman Shabanzadeh
Abstract:
Over the last three decades, the main demands of the Iranian workforce have been focused on three areas: "The right to a decent wage", "The right to organize" and "The right to job security". In order to investigate and analyze this situation, the present study focuses on the component of job security. The purpose of the study is to figure out what mechanisms in Iran's Labor Law have led to the destabilization and undermining of workers' job security. The research method is descriptive-analytical. To collect information, library and document sources in the field of laws related to labor rights in Iran and, semi-structured interviews with experts have been used. In the data analysis stage, the qualitative content analysis method was also used. The trend analysis of the statistics related to the labor force situation in Iran in the last three decades shows that the employment structure has been facing an increase in the active population, but in the last decade, a large part of this population has been mainly active in the service sector, and contract-free enterprises, so a smaller share of this employment has insurance coverage and a larger share has underemployment. In this regard, the results of this study show that four contexts have been proposed as the main legal and executive mechanisms of labor instability in Iran, which are: 1) temporaryization of the labor force by providing different interpretations of labor law, 2) adjustment labor in the public sector and the emergence of manpower contracting companies, 3) the cessation of labor law protection of workers in small workshops and 4) the existence of numerous restrictions on the effective organization of workers. The theoretical conclusion of this article is that the main root of the challenges of the labor society and the destabilized workforce in Iran is the existence of structural inequalities in the field of labor security, whose traces can be seen in the legal provisions and executive regulations of this field.Keywords: inequality, precariat, temporaryization, labor force, labor law
Procedia PDF Downloads 675309 Effect of Manual Progressive Ischemic Pressure versus Post Isometric Facilitation in the Treatment of Latent Myofascial Trigger Points in Mechanical Neck Pain
Authors: Mohamed M. Diab, Fahmy E. Mohamed, Alaa Balbaa
Abstract:
Background: Myofascial pain syndrome a common type of non-articular musculoskeletal pain, is a condition associated with regional pain and muscle tenderness characterized by the presence of hypersensitive nodules. Objectives: the purpose of this study is to compare between the effects of manual progressive ischemic pressure versus the effect of post isometric facilitation in the treatment of Rhomboid latent myofascial trigger points. Methods: six patients had participated in this study. Patients divided into two groups. Group A treated by manual progressive ischemic pressure and traditional physical therapy program. Group B treated by post isometric facilitation and traditional physical therapy program. Treatment program was for 6 sessions over two week’s period. Result: Statistical analysis revealed that there is no significant difference in post treatment from pretreatment in pain severity (VAS) in myofascial trigger points with Rhomboid muscles) and Pain pressure threshold (PPT) for tenderness at both groups (A,B). Conclusion: ischemic pressure technique appear to be no more effective than post isometric facilitation in treatment of rhomboids latent myofacial trigger point.Keywords: Rhmoiboid trigger point, myofacila trigger point, ischemic pressure, post isometric facilitation
Procedia PDF Downloads 3165308 Structural Performance Evaluation of Power Boiler for the Pressure Release Valve in Consideration of the Thermal Expansion
Authors: Young-Hun Lee, Tae-Gwan Kim, Jong-Kyu Kim, Young-Chul Park
Abstract:
In this study, Spring safety valve Heat - structure coupled analysis was carried out. Full analysis procedure and performing thermal analysis at a maximum temperature, them to the results obtained through to give an additional load and the pressure on the valve interior, and Disc holder Heat-Coupled structure Analysis was carried out. Modeled using a 3D design program Solidworks, For the modeling of the safety valve was used 3D finite element analysis program ANSYS. The final result to be obtained through the Analysis examined the stability of the maximum displacement and the maximum stress to the valve internal components occurring in the high-pressure conditions.Keywords: finite element method, spring safety valve, gap, stress, strain, deformation
Procedia PDF Downloads 3735307 Evaluating the Water Balance of Sokoto Basement Complex to Address Water Security Challenges
Authors: Murtala Gada Abubakar, Aliyu T. Umar
Abstract:
A substantial part of Nigeria is part of semi-arid areas of the world, underlain by basement complex (hard) rocks which are very poor in both transmission and storage of appreciable quantity of water. Recently, a growing attention is being paid on the need to develop water resources in these areas largely due to concerns about increasing droughts and the need to maintain water security challenges. While there is ample body of knowledge that captures the hydrological behaviours of the sedimentary part, reported research which unambiguously illustrates water distribution in the basement complex of the Sokoto basin remains sparse. Considering the growing need to meet the water requirements of those living in this region necessitated the call for accurate water balance estimations that can inform a sustainable planning and development to address water security challenges for the area. To meet this task, a one-dimensional soil water balance model was developed and utilised to assess the state of water distribution within the Sokoto basin basement complex using measured meteorological variables and information about different landscapes within the complex. The model simulated the soil water storage and rates of input and output of water in response to climate and irrigation where applicable using data from 2001 to 2010 inclusive. The results revealed areas within the Sokoto basin basement complex that are rich and deficient in groundwater resource. The high potential areas identified includes the fadama, the fractured rocks and the cultivated lands, while the low potential areas are the sealed surfaces and non-fractured rocks. This study concludes that the modelling approach is a useful tool for assessing the hydrological behaviour and for better understanding the water resource availability within a basement complex.Keywords: basement complex, hydrological processes, Sokoto Basin, water security
Procedia PDF Downloads 3235306 A Review of Ultralightweight Mutual Authentication Protocols
Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran
Abstract:
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.Keywords: RFID, Ultralightweight, UMAP, SASI
Procedia PDF Downloads 1595305 A Vaccination Program to Control an Outbreak of Acute Hepatitis A among MSM in Taiwan, 2016
Authors: Ying-Jung Hsieh, Angela S. Huang, Chu-Ming Chiu, Yu-Min Chou, Chin-Hui Yang
Abstract:
Background and Objectives: Hepatitis A is primarily acquired by the fecal-oral route through person-to-person contact or ingestion of contaminated food or water. During 2010 to 2014, an average of 83 cases of locally-acquired disease was reported to Taiwan’s notifiable disease system. Taiwan Centers for Disease Control (TCDC) identified an outbreak of acute hepatitis A which began in June 2015. Of the 126 cases reported in 2015, 103 (82%) cases were reported during June–December and 95 cases (92%) of them were male. The average age of all male cases was 31 years (median, 29 years; range, 15–76 years). Among the 95 male cases, 49 (52%) were also infected with HIV, and all reported to have had sex with other men. To control this outbreak, TCDC launched a free hepatitis A vaccination program in January 2016 for close contacts of confirmed hepatitis A cases, including family members, sexual partners, and household contacts. Effect of the vaccination program was evaluated. Methods: All cases of hepatitis A reported to the National Notifiable Disease Surveillance System were included. A case of hepatitis A was defined as a locally-acquired disease in a person who had acute clinical symptoms include fever, malaise, loss of appetite, nausea or abdominal discomfort compatible with hepatitis, and tested positive for anti-HAV IgM during June 2015 to June 2016 in Taiwan. The rate of case accumulation was calculated using a simple regression model. Results: During January–June 2016, there were 466 cases of hepatitis A reported; of the 243 (52%) who were also infected with HIV, 232 (95%) had a history of having sex with men. Of the 346 cases that were followed up, 259 (75%) provided information on contacts but only 14 (5%) of them provided the name of their sexual partners. Among the 602 contacts reported, 349 (58%) were family members, 14 (2%) were sexual partners, and 239 (40%) were other household contacts. Among the 602 contacts eligible for free hepatitis A vaccination, 440 (73%) received the vaccine. There were 87 (25%) cases that refused to disclose their close contacts. The average case accumulation rate during January–June 2016 was 21.7 cases per month, which was 6.8 times compared to the average case accumulation rate during June–December 2015 of 3.2 cases per month. Conclusions: Despite vaccination program aimed to provide free hepatitis A vaccine to close contacts of hepatitis A patients, the outbreak continued and even gained momentum in transmission. Refusal by hepatitis A patients to provide names of their close contacts and rejection of contacts to take the hepatitis A vaccine may have contributed to the poor effect of the program. Targeted vaccination efforts of all MSM may be needed to control the outbreak among this population in the short term. In the long term, universal vaccination program is needed to prevent the infection of hepatitis A.Keywords: hepatitis A, HIV, men who have sex with men, vaccination
Procedia PDF Downloads 2565304 Methods for Restricting Unwanted Access on the Networks Using Firewall
Authors: Bhagwant Singh, Sikander Singh Cheema
Abstract:
This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques
Procedia PDF Downloads 1075303 The Announcer Trainee Satisfaction by National Broadcasting and Telecommunications Commission of Thailand
Authors: Nareenad Panbun
Abstract:
The objective is to study the knowledge utilization from the participants of the announcer training program by National Broadcasting and Telecommunications Commission (NBTC). This study is a quantitative research based on surveys and self-answering questionnaires. The population of this study is 100 participants randomly chosen by non-probability sampling method. The results have shown that most of the participants were satisfied with the topics of general knowledge about the broadcasting and television business for 37 people representing 37%, followed by the topics of broadcasting techniques. The legal issues, consumer rights, television business ethics, and credibility of the media are, in addition to the media's role and responsibilities in society, the use of language for successful communication. Therefore, the communication language skills are the most important for all of the trainees and will also build up the image of the broadcasting center.Keywords: announcer training program, participant, requirements announced, theory of utilization
Procedia PDF Downloads 2245302 The Benefits of Full Day Kindergarten versus Half Day Kindergarten: Review of Literature
Authors: Majedah Fawzy Abu Alrub
Abstract:
The purpose of this study was to assess the benefits of full-day vs. half-day kindergarten. Research suggests that there is a common trend among full-day kindergarten programs. Academic, social, and emotional benefits are evident, as well as preferential trends among the parents and teachers. The review began by identifying 20 references of literature on full-day kindergarten published in the last two decades (1997-2017). Of these, 20 passed an initial screening designed to identify research reports that examined academic, social, and emotional outcomes of full-day kindergarten programs as compared with half-day programs. Studies indicated that children who attend full-day kindergarten are positively related to high performance through their schools. There is much evidence to support a full-day program for children. Results indicated that full-day programs have obvious benefits for children; however, they may not be the best program for all children.Keywords: preschool, full-day kindergarten, academic benefits, social and emotional benefits
Procedia PDF Downloads 1735301 Transitioning Classroom Students to Working Learners: Lived Experiences of Senior High School Work Immersion Students
Authors: Rico Herrero
Abstract:
The study looked into the different lived experiences of senior high school to work immersion and how they were able to cope up in the transition stage from being classroom students into immersion students in work immersion site. The participants of the study were the ten senior high school students from Punta Integrated School. Using interview guide questions, the researchers motivated the participants to reveal their thoughts, feelings, and experiences in the interviews via video recording. The researchers utilized the qualitative research design, but the approach used was grounded theory. The findings revealed the participants’ lived experiences on how to cope or overcome the transition stage during the work immersion program. They unanimously responded to the interview questions. And based on the themes that emerged from the testimonies of the Senior High School students, the classroom learners benefited a lot from authentic learning opportunity of immersion program. Work immersion provides the students the opportunity to learn and develop their skills/ competencies related to the field of specialization. The hands-on training provides them simulation of work. They realized that theoretical learning in school is not enough to be equipped to work. Immersion program also provides venue for values and standard transformation. Senior High School students felt a high demand of self-confidence at the beginning of their race. Good thing, self-esteem of an individual helps bring out one’s potential at its best. Students find it challenging to get along with people in all ages. But, the endeavour absolutely helps them to grow maturely. Participants also realized that it’s not easy to deal with time pressure. Hence, the immersion program taught them to learn about time management. Part of the best training is to expose the learners to the harsh reality. Despite of the things that the school had taught them, still, students realized that they are not yet ready to deal with the demands of work. Furthermore, they also found out that they need to develop an interpersonal skill to improve their human relationships.Keywords: grounded theory, lived experiences, senior high school, work immersion
Procedia PDF Downloads 1455300 Response of Insulin Resistance Indicators to Aerobic Exercise at Different Intensities in Obese College Students
Authors: Long-Shan Wu, Ming-Chen Ko, Chien-Chang Ho, Po-Fu Lee, Li-Yun Chen, Ching-Yu Tseng
Abstract:
The purpose of this study was to determine whether progressive aerobic exercise intensity effects the changes in insulin resistance indicators among obese college students in Taiwan. Forty-eight obese subjects [body mass index (BMI) ≧ 27 kg/m2, aged 18-26 years old] were randomized into four equal groups (n = 12): light-intensity training group (LITG): 40-50% of their heart rate reserve (HRR); middle-intensity training group (MITG): 50-70% of their HRR; high-intensity training group (HITG): 70-80% of their HRR, and control group (CG). The aerobic exercise training program was performed 60 minutes per day on a treadmill three days/week in a training period of 12 weeks. All subjects’ anthropometric data, blood biochemical parameters, and health-related physical fitness components were measured at baseline and after 12 weeks. At baseline, all insulin resistance indicators did not differ significantly among the four groups (p > 0.05). After 12-week exercise intervention, the HITG had significantly more changes in insulin level than the MITG, LITG, and CG. Our findings suggested that a short-term aerobic exercise program can play an important role in improving insulin resistance indicators; either middle-intensity training significantly increases the insulin level, but the high-intensity exercise training program effectively improves obese college students’ insulin resistance.Keywords: aerobic training, exercise intensity, insulin resistance, obesity
Procedia PDF Downloads 2995299 A Sustainable Training and Feedback Model for Developing the Teaching Capabilities of Sessional Academic Staff
Authors: Nirmani Wijenayake, Louise Lutze-Mann, Lucy Jo, John Wilson, Vivian Yeung, Dean Lovett, Kim Snepvangers
Abstract:
Sessional academic staff at universities have the most influence and impact on student learning, engagement, and experience as they have the most direct contact with undergraduate students. A blended technology-enhanced program was created for the development and support of sessional staff to ensure adequate training is provided to deliver quality educational outcomes for the students. This program combines innovative mixed media educational modules, a peer-driven support forum, and face-to-face workshops to provide a comprehensive training and support package for staff. Additionally, the program encourages the development of learning communities and peer mentoring among the sessional staff to enhance their support system. In 2018, the program was piloted on 100 sessional staff in the School of Biotechnology and Biomolecular Sciences to evaluate the effectiveness of this model. As part of the program, rotoscope animations were developed to showcase ‘typical’ interactions between staff and students. These were designed around communication, confidence building, consistency in grading, feedback, diversity awareness, and mental health and wellbeing. When surveyed, 86% of sessional staff found these animations to be helpful in their teaching. An online platform (Moodle) was set up to disseminate educational resources and teaching tips, to host a discussion forum for peer-to-peer communication and to increase critical thinking and problem-solving skills through scenario-based lessons. The learning analytics from these lessons were essential in identifying difficulties faced by sessional staff to further develop supporting workshops to improve outcomes related to teaching. The face-to-face professional development workshops were run by expert guest speakers on topics such as cultural diversity, stress and anxiety, LGBTIQ and student engagement. All the attendees of the workshops found them to be useful and 88% said they felt these workshops increase interaction with their peers and built a sense of community. The final component of the program was to use an adaptive e-learning platform to gather feedback from the students on sessional staff teaching twice during the semester. The initial feedback provides sessional staff with enough time to reflect on their teaching and adjust their performance if necessary, to improve the student experience. The feedback from students and the sessional staff on this model has been extremely positive. The training equips the sessional staff with knowledge and insights which can provide students with an exceptional learning environment. This program is designed in a flexible and scalable manner so that other faculties or institutions could adapt components for their own training. It is anticipated that the training and support would help to build the next generation of educators who will directly impact the educational experience of students.Keywords: designing effective instruction, enhancing student learning, implementing effective strategies, professional development
Procedia PDF Downloads 1315298 Outcomes of Pain Management for Patients in Srinagarind Hospital: Acute Pain Indicator
Authors: Chalermsri Sorasit, Siriporn Mongkhonthawornchai, Darawan Augsornwan, Sudthanom Kamollirt
Abstract:
Background: Although knowledge of pain and pain management is improving, they are still inadequate to patients. The Nursing Division of Srinagarind Hospital is responsible for setting the pain management system, including work instruction development and pain management indicators. We have developed an information technology program for monitoring pain quality indicators, which was implemented to all nursing departments in April 2013. Objective: To study outcomes of acute pain management in process and outcome indicators. Method: This is a retrospective descriptive study. The sample population was patients who had acute pain 24-48 hours after receiving a procedure, while admitted to Srinagarind Hospital in 2014. Data were collected from the information technology program. 2709 patients with acute pain from 10 Nursing Departments were recruited in the study. The research tools in this study were 1) the demographic questionnaire 2) the pain management questionnaire for process indicators, and 3) the pain management questionnaire for outcome indicators. Data were analyzed and presented by percentages and means. Results: The process indicators show that nurses used pain assessment tool and recorded 99.19%. The pain reassessment after the intervention was 96.09%. The 80.15% of the patients received opioid for pain medication and the most frequency of non-pharmacological intervention used was positioning (76.72%). For the outcome indicators, nearly half of them (49.90%) had moderate–severe pain, mean scores of worst pain was 6.48 and overall pain was 4.08. Patient satisfaction level with pain management was good (49.17%) and very good (46.62%). Conclusion: Nurses used pain assessment tools and pain documents which met the goal of the pain management process. Patient satisfaction with pain management was at high level. However the patients had still moderate to severe pain. Nurses should adhere more strictly to the guidelines of pain management, by using acute pain guidelines especially when pain intensity is particularly moderate-high. Nurses should also develop and practice a non-pharmacological pain management program to continually improve the quality of pain management. The information technology program should have more details about non-pharmacological pain techniques.Keywords: outcome, pain management, acute pain, Srinagarind Hospital
Procedia PDF Downloads 2375297 Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens
Authors: Michelle D. Hand, Michelle L. Kaiser
Abstract:
African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.Keywords: community kitchen gardens, food insecurity, refugees, Somali Bantu
Procedia PDF Downloads 2785296 Implementing Community Policing in Nigeria: Problems and Prospects
Authors: Mohammed Jamilu Haruna, Kawu Adamu Sule
Abstract:
This paper examines the evolution of modern policing in Nigeria to the present day, with a focus on the newly introduced community policing, which seeks to cement the operational vacuum created by the repressive and oppressive approach of the Nigeria Police Force (NPF), which renders the police incapable of addressing the twin problems of crime and disorder. Thus, the primary purpose for the implementation of community policing was to use it as a mechanism for building the lost trust between the police and the public, perhaps due to the long history of antagonistic and repressive relationships between them. If properly implemented, community policing has the prospect of empowering Nigerian citizens with the skills to protect themselves against invaders of their private security so that crimes can be prevented before anyone is victimized. Other prospects include, but are not limited to, (i) a favorable public view of the police, (ii) building of mutual trust, (iii) increased information flow through effective communication between the police and the public, and above all, (iv) increased police accountability. Unfortunately, problems such as aged suspicious and distrustful relationships, inadequate funding, poor training of officers, poor monitoring and evaluation of the community policing project, lack of public awareness of the benefits of the program, and sabotage by some of the personnel of the police who benefits from the status quo, were some of the reasons that troubled the implementation of community policing.Keywords: community, policing, problems, prospects, problem solving
Procedia PDF Downloads 835295 Post Covid-19 Scenario and Contemporary International Security Challenges
Authors: Rubina Waseem
Abstract:
The research focuses on the major crises and major effects, largely unforeseen, to counter international security concerns. At the close of 2019, the Covid-19 pandemic broke out in the city of Wuhan in Hubei province, China. The coronavirus was initially seen as an inchoate danger, aimed at striking people randomly. Owing to the extraordinary transmissibility of the virus and the highly knitted nature of the international political world, the Covid-19 soon became a formidable global challenge. The once hustling and bustling avenues, city centers, and market places became deserted. Lockdown, self-isolation, hygiene and safety, social-distancing, and job losses became a new norm. The national economies gradually plunged into crisis. The pandemic has so far caused over 33 million cases and one million deaths. The virus continues to devastate social life, as there is yet no therapeutic available. While the world was preoccupied addressing the human and social toll, the pandemic has exacerbated despair, mistrust, and friction in international relations, diplomacy, and strategy. The research will discuss how the coronavirus has accelerated the trends of transition in the postwar security order constructed by the United States. China, Russia, European Union, and other lesser regional players are now increasingly changing their security orientations to undermine the United States standing and authority in world politics. The systemic level analyses will be adopted as a methodology to broaden the lens of the study, and the research will analyze the prevalent global power distribution, whether vulnerable or exposed. The trends of parochial nationalism and isolationism are increasingly replacing multilateralism and collectivism. Yet worse, military posturing is assuming a greater role in international interactions. Taken together, the pandemic has worsened the prospects of international peace and stability by mounting equal pressure across the channels of international relations, diplomacy, and strategy. It is yet unclear which country or collectivity will face the real brunt. Despite this jaded and pessimistic view, the lingering pandemic has the potential to reinforce cooperation, multilateralism, and collectivism in the realm of international politics. There is a renewed momentum for global efforts against the pandemic. States and societies are coming closer to act as a whole. Equally important, the world leaders are feeling tempted to revisit the traditional conception of national security. In this regard, they are exploring the possibility of according preference to non-traditional security issues. In essence, the research concludes that Covid-19 has put the international political system under a great trial.Keywords: covid-19, global challenges, international politics, international security
Procedia PDF Downloads 1695294 'You’re Not Alone': Peer Feedback Practices for Cross-Cultural Writing Classrooms and Centers
Authors: Cassandra Branham, Danielle Farrar
Abstract:
As writing instructors and writing center administrators at a large research university with a significant population of English language learners (ELLs), we are interested in how peer feedback pedagogy can be effectively translated for writing center purposes, as well as how various modes of peer feedback can enrich the learning experiences of L1 and L2 writers in these spaces. Although peer feedback is widely used in classrooms and centers, instructor, student, and researcher opinions vary in respect to its effectiveness. We argue that peer feedback - traditional and digital, synchronous and asynchronous - is an indispensable element for both classrooms and centers and emphasize that it should occur with both L1 and L2 students to further develop an array of reading and writing skills. We also believe that further understanding of the best practices of peer feedback in such cross-cultural spaces, like the classroom and center, can optimize the benefits of peer feedback. After a critical review of the literature, we implemented an embedded tutoring program in our university’s writing center in collaboration with its First-Year Composition (FYC) program and Language Institute. The embedded tutoring program matches a graduate writing consultant with L1 and L2 writers enrolled in controlled-matriculation composition courses where ELLs make up at least 50% of each class. Furthermore, this program is informed by what we argue to be some best practices of peer feedback for both classroom and center purposes, including expectation-based training through rubrics, modeling effective feedback, hybridizing traditional and digital modes of feedback, recognizing the significance the body in composition (what we call writer embodiment), and maximizing digital technologies to exploit extended cognition. After conducting surveys and follow-up interviews with students, instructors, and writing consultants in the embedded tutoring program, we found that not only did students see an increased value in peer feedback, but also instructors saw an improvement in both writing style and critical thinking skills. Our L2 participants noted improvements in language acquisition while our L1 students recognized a broadening of their worldviews. We believe that both L1 and L2 students developed self-efficacy and agency in their identities as writers because they gained confidence in their abilities to offer feedback, as well as in the legitimacy of feedback they received from peers. We also argue that these best practices situate novice writers as experts, as writers become a valued and integral part of the revision process with their own and their peers’ papers. Finally, the use of iPads in embedded tutoring recovered the importance of the body and its senses in writing; the highly sensory feedback from these multi-modal sessions that offer audio and visual input underscores the significant role both the body and mind play in compositional practices. After beginning with a brief review of the literature that sparked this research, this paper will discuss the embedded tutoring program in detail, report on the results of the pilot program, and will conclude with a discussion of the pedagogical implications that arise from this research for both classroom and center.Keywords: English language learners, peer feedback, writing center, writing classroom
Procedia PDF Downloads 4035293 Student Learning and Motivation in an Interculturally Inclusive Classroom
Authors: Jonathan H. Westover, Jacque P. Westover, Maureen S. Andrade
Abstract:
Though learning theories vary in complexity and usefulness, a thorough understanding of foundational learning theories is a necessity in today’s educational environment. Additionally, learning theories lead to approaches in instruction that can affect student motivation and learning. The combination of a learning theory and elements to enhance student motivation can create a learning context where the student can thrive in their educational pursuits. This paper will provide an overview of three main learning theories: (1) Behavioral Theory, (2) Cognitive Theory, and (3) Constructivist Theory and explore their connection to elements of student learning motivation. Finally, we apply these learning theories and elements of student motivation to the following two context: (1) The FastStart Program at the Community College of Denver, and (2) An Online Academic English Language Course. We discussed potential of the program and course to have success in increasing student success outcomes.Keywords: learning theory, student motivation, inclusive pedagogy, developmental education
Procedia PDF Downloads 2625292 Accessibility Centres in Higher Education Institutions: Inclusiveness and Peer Tutoring Programmes
Authors: Vassilis Argyropoulos, Magda Nikolaraizi, Maria Papazafiri
Abstract:
A growing number of students with disabilities attend institutions of higher education, and according to evidenced-based data, it seems that they face many obstacles regarding their academic access and inclusion. The fact that more and more students decide to actively participate in higher education, on the one hand, empowers and strengthens inclusiveness in tertiary education, but on the other hand, it brings new challenges to their access to scientific content as well as to their interactions with other students and faculty members. For this, accessibility centres have come to the fore in many higher education institutions, in order to respond to the needs of students with disabilities. In this paper, we present a study regarding the peer tutoring program, which is a service delivered by the Accessibility Centre at the University of Thessaly in Greece. Specifically, the current paper aims to describe the experiences of tutees and tutors regarding their relationships developed throughout the peer tutoring program. Twelve tutors and eight tutees with disabilities participated in the study, whose experiences were explored through interviews and were analyzed in a qualitative way. In our study, all tutees and most of the tutors described their relationship as friendly, while a few tutors preferred a more formal relationship. Also, both tutors and tutees described some of the challenges, such as setting limits or arranging an appointment. Finally, peer tutoring programs seem very promising, but in order to be effective, there is a need for training and supporting students regarding their role as well as monitoring the progress of the peer tutoring program, ensuring its smooth operation and success for both tutors and tutees.Keywords: disability, higher education institutions, interviews, peer tutoring, inclusiveness
Procedia PDF Downloads 585291 Determination of Complexity Level in Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 3485290 A User Interface for Easiest Way Image Encryption with Chaos
Authors: D. López-Mancilla, J. M. Roblero-Villa
Abstract:
Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.Keywords: image encryption, chaos, secure communications, user interface
Procedia PDF Downloads 4965289 Smuggling of Migrants as an Influential Factor on National Security, Economic and Social Life
Authors: Jordan Georgiev Deliversky
Abstract:
Human trafficking and smuggling of migrants are criminal activities, which are on the rise over recent years. The number of legal migrants arrived in Europe from outside the European Union are far less than those who want to come and settle in Europe. The objective of this paper is to present the impact on economic and social life of significant measures influencing the smuggling of migrants. The analysis is focused on various complex factors which have multiple origins and are highly influential as regard to the process of migration and the smuggling of migrants. The smuggling of migrants is a criminal activity, directly related to migration. The main results show that often the routes chosen for smuggling of migrants are circuitous, as smugglers carefully avoid strictly controlled roads, checkpoints, and countries or jurisdictions where there is efficiency of justice, with particular emphasis on the law on trafficking of persons and smuggling of migrants.Keywords: corruption, migration, security, smuggling
Procedia PDF Downloads 2695288 Patients in Opioid Maintenance Programs: Psychological Features that Predict Abstinence
Authors: Janaina Pereira, Barbara Gonzalez, Valentina Chitas, Teresa Molina
Abstract:
Intro: The positive impact of opioid maintenance programs on the health of heroin addicts, and on public health in general, has been widely recognized, namely on the prevalence reduction of infectious diseases as HIV, and on the social reintegration of this population. Nevertheless, a part of patients in these programs cannot remain heroin abstinent, or has relapses, during the treatment. Method: Thus, this cross-sectional research aims at analyzing the relation between a set of psychological and psychosocial variables, which have been associated with the onset of heroin use, and assess if they are also associated with absence of abstinence in participants in an opioid maintenance program. A total of 62 patients, aged between 26 and 58 years old (M= 40.87, DP= 7.39) with a time in opioid maintenance program between 1 and 10 years (M= 5.42, DP= 3.05), 77.4% male and 22.6% female, participated in this research. To assess the criterion variable (heroin use) we used the mean value of positive results in urine tests during the participation in the program, weighted according to the number of months in program. The predictor variables were the coping strategies, the dispositional sensation seeking, and the existence of Posttraumatic stress disorder (PTSD). Results: The results showed that only 33.87% of the patients were totally abstinent of heroin use since the beginning of the program, and the absence of abstinence, as the number of positive heroin tests, was primarily predicted by less proactive coping, and secondarily by a higher level of sensation seeking. 16.13% of the sample fulfilled diagnosis criteria for PTSD, and 67.74 % had at least one traumatic experience throughout their lives. The total of PTSD symptoms had a positive correlation with the number of physical health problems, and with the lack of professional occupation. These results have several implications for the clinical practice in this field, and we suggest the promotion of proactive coping strategies should integrate these opioid maintenance programs, as they represent the tendency to face future events as challenges and opportunities, being positively related to positive results on several fields. The early identification of PTSD in the participants, before entering the opioid maintenance programs, would be important as it is related to negative features that hinder social reintegration, Finally, to identify individuals with a sensation seeking profile would be relevant, not only because they face a higher risk of relapse, but also because the therapeutical approaches should not ignore this dispositional feature in the alternatives they propose to the patients.Keywords: opioid maintenance programs, proactive coping, PTSD, sensation seeking
Procedia PDF Downloads 1335287 Challenges of Implementing Participatory Irrigation Management for Food Security in Semi Arid Areas of Tanzania
Authors: Pilly Joseph Kagosi
Abstract:
The study aims at assessing challenges observed during the implementation of participatory irrigation management (PIM) approach for food security in semi-arid areas of Tanzania. Data were collected through questionnaire, PRA tools, key informants discussion, Focus Group Discussion (FGD), participant observation, and literature review. Data collected from the questionnaire was analysed using SPSS while PRA data was analysed with the help of local communities during PRA exercise. Data from other methods were analysed using content analysis. The study revealed that PIM approach has a contribution in improved food security at household level due to the involvement of communities in water management activities and decision making which enhanced the availability of water for irrigation and increased crop production. However, there were challenges observed during the implementation of the approach including; minimum participation of beneficiaries in decision-making during planning and designing stages, meaning inadequate devolution of power among scheme owners. Inadequate and lack of transparency on income expenditure in Water Utilization Associations’ (WUAs), water conflict among WUAs members, conflict between farmers and livestock keepers and conflict between WUAs leaders and village government regarding training opportunities and status; WUAs rules and regulation are not legally recognized by the National court and few farmers involved in planting trees around water sources. However, it was realized that some of the mentioned challenges were rectified by farmers themselves facilitated by government officials. The study recommends that the identified challenges need to be rectified for farmers to realize impotence of PIM approach as it was realized by other Asian countries.Keywords: challenges, participatory approach, irrigation management, food security, semi arid areas
Procedia PDF Downloads 3325286 Educational Leadership Preparation Program Review of Employer Satisfaction
Authors: Glenn Koonce
Abstract:
There is a need to address the improvement of university educational leadership preparation programs through the processes of accreditation and continuous improvement. The program faculty in a university in the eastern part of the United States has incorporated an employer satisfaction focus group to address their national accreditation standard so that employers are satisfied with completers' preparation for the position of principal or assistant principal. Using the Council for the Accreditation of Educator Preparation (CAEP) required proficiencies, the following research questions are investigated: 1) what proficiencies do completers perform the strongest? 2) what proficiencies need to be strengthened? 3) what other strengths beyond the required proficiencies do completers demonstrate? 4) what other areas of responsibility beyond the required proficiencies do completers demonstrate? and 5) how can the program improve in preparing candidates for their positions? This study focuses on employers of one public school district that has a large number of educational leadership completers employed as principals and assistant principals. Central office directors who evaluate principals and principals who evaluate assistant principals are focus group participants. Construction of the focus group questions is a result of recommendations from an accreditation regulatory specialist, reviewed by an expert panel, and piloted by an experienced focus group leader. The focus group session was audio recorded, transcribed, and analyzed using the NVivo Version 14 software. After constructing folders in NVivo, the focus group transcript was loaded and skimmed by diagnosing significant statements and assessing core ideas for developing primary themes. These themes were aligned to address the research questions. From the transcript, codes were assigned to the themes and NVivo provided a coding hierarchy chart or graphical illustration for framing the coding. A final report of the coding process was designed using the primary themes and pertinent codes that were supported in excerpts from the transcript. The outcome of this study is to identify themes that can provide evidence that the educational leadership program is meeting its mission to improve PreK-12 student achievement through well-prepared completers who have achieved the position of principal or assistant principal. The considerations will be used to derive a composite profile of employers' satisfaction with program completers with the capacity to serve, influence, and thrive as educational leaders. Analysis of the idealized themes will result in identifying issues that may challenge university educational leadership programs to improve. Results, conclusions, and recommendations are used for continuous improvement, which is another national accreditation standard required for the program.Keywords: educational leadership preparation, CAEP accreditation, principal & assistant principal evaluations, continuous improvement
Procedia PDF Downloads 335285 Government Payments to Minority American Producers
Authors: Anil K. Giri, Dipak Subedi, Kathleen Kassel, Ashok Mishra
Abstract:
The United States Department of Agriculture’s programs has been accused of being discriminatory in the past based on the race of the farmer, especially African-American producers. This study examines if there was racial discrimination in payments from the most recent new USDA programs, including those made in response to the pandemic. This study uses the Analysis of Variance (ANOVA) to examine the payments after normalizing them relative to cash receipts to test if discrimination in the number of payments received exists. Three programs investigated in this study are: i) the Coronavirus Food Assistance Program (CFAP), ii) the Market Facilitation Program (MFP), and (iii) the Paycheck Protection Program (PPP). The PPP program was administered by the Small Business Administration, whereas the other two were designed and implemented by the USDA. The PPP made forgivable loans to small businesses and, initially, was heavily criticized for not reaching minority businesses (in general). The Small Business Administration then initiated a second draw of PPP loans, prioritizing minority-owned businesses. This study compares attributes of PPP loans made to African-American farming businesses and other farming businesses in the two draws of the PPP. We find that the number of African-American farming businesses participating in the second draw of PPP loans decreased significantly from the first draw. However, the average amount of PPP loans to African-American farming businesses increased in the second draw. In the first draw, the average cost of jobs reported per loan was higher for African-American farming businesses than for other producers. In the second draw, the average cost of jobs reported per loan was significantly higher for other farming businesses than for African-American businesses. The share of PPP loans forgiven for African-American farming businesses is significantly below the national rate of 89 percent. The rate of forgiveness for PPP loans made to African-American producers is unlikely to increase significantly without policy changes. This can increase financial burdens in the future to farm operations operated by African- Americans. Finally, we conclude that the initial goal of increasing minority participation in PPP loans in the second draw, at least among African-Americans in the agricultural sector, did not meet. CFAP made almost $600 million in direct payments to minority producers, including Black producers. Black or African American producers received more than $52 million in CFAP payments. CFAP payments were proportional to the value of agricultural commodities sold for most minority producers. The 2017 Census of Agriculture showed that the majority of minority producers, including African American producers but excluding Asian producers, raised livestock. CFAP made the highest payments to livestock minority producers.Keywords: United States department of agriculture (USDA), coronavirus food assistance program (CFAP), paycheck protection program (PPP), African-American producers, minority American producers
Procedia PDF Downloads 985284 Development of an Systematic Design in Evaluating Force-On-Force Security Exercise at Nuclear Power Plants
Authors: Seungsik Yu, Minho Kang
Abstract:
As the threat of terrorism to nuclear facilities is increasing globally after the attacks of September 11, we are striving to recognize the physical protection system and strengthen the emergency response system. Since 2015, Korea has implemented physical protection security exercise for nuclear facilities. The exercise should be carried out with full cooperation between the operator and response forces. Performance testing of the physical protection system should include appropriate exercises, for example, force-on-force exercises, to determine if the response forces can provide an effective and timely response to prevent sabotage. Significant deficiencies and actions taken should be reported as stipulated by the competent authority. The IAEA(International Atomic Energy Agency) is also preparing force-on-force exercise program documents to support exercise of member states. Currently, ROK(Republic of Korea) is implementing exercise on the force-on-force exercise evaluation system which is developed by itself for the nuclear power plant, and it is necessary to establish the exercise procedure considering the use of the force-on-force exercise evaluation system. The purpose of this study is to establish the work procedures of the three major organizations related to the force-on-force exercise of nuclear power plants in ROK, which conduct exercise using force-on-force exercise evaluation system. The three major organizations are composed of licensee, KINAC (Korea Institute of Nuclear Nonproliferation and Control), and the NSSC(Nuclear Safety and Security Commission). Major activities are as follows. First, the licensee establishes and conducts an exercise plan, and when recommendations are derived from the result of the exercise, it prepares and carries out a force-on-force result report including a plan for implementation of the recommendations. Other detailed tasks include consultation with surrounding units for adversary, interviews with exercise participants, support for document evaluation, and self-training to improve the familiarity of the MILES (Multiple Integrated Laser Engagement System). Second, KINAC establishes a force-on-force exercise plan review report and reviews the force-on-force exercise plan report established by licensee. KINAC evaluate force-on-force exercise using exercise evaluation system and prepare training evaluation report. Other detailed tasks include MILES training, adversary consultation, management of exercise evaluation systems, and analysis of exercise evaluation results. Finally, the NSSC decides whether or not to approve the force-on-force exercise and makes a correction request to the nuclear facility based on the exercise results. The most important part of ROK's force-on-force exercise system is the analysis through the exercise evaluation system implemented by KINAC after the exercise. The analytical method proceeds in the order of collecting data from the exercise evaluation system and analyzing the collected data. The exercise application process of the exercise evaluation system introduced in ROK in 2016 will be concretely set up, and a system will be established to provide objective and consistent conclusions between exercise sessions. Based on the conclusions drawn up, the ultimate goal is to complement the physical protection system of licensee so that the system makes licensee respond effectively and timely against sabotage or unauthorized removal of nuclear materials.Keywords: Force-on-Force exercise, nuclear power plant, physical protection, sabotage, unauthorized removal
Procedia PDF Downloads 1445283 Cryptographic Protocol for Secure Cloud Storage
Authors: Luvisa Kusuma, Panji Yudha Prakasa
Abstract:
Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.Keywords: cloud storage, security, cryptographic protocol, artificial intelligence
Procedia PDF Downloads 3615282 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime
Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya
Abstract:
Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident
Procedia PDF Downloads 154