Search results for: physical security
7179 A Qualitative Study to Explore the Social Perception and Stigma around Disability, and Its Impact on the Caring Experiences of Mothers of Children with Physical Disability in Bangladesh
Authors: Farjina Malek, Julie King, Niki Edwards
Abstract:
Across the globe more than a billion people live with a disability and a further billion people, mostly carers, are indirectly impacted. While prevalence data is problematic, it is estimated that more than 15% of the population in Bangladesh live with a disability. Disability service infrastructure in Bangladesh is under-developed; and consequently, the onus of care falls on family, especially on mothers. Within the caring role, mothers encounter many challenging experiences which are not only due to the lack of support delivered through the Bangladeshi health care system but also related to the existence of stigma and perception around disability in the Bangladeshi society. Within this perception, the causes of disability are mostly associated with 'God’s will'; 'possession of ghosts on the disabled person'; and 'karma or the result of past sins of the family members especially the mothers'. These beliefs are likely to have a significant impact on the well-being of mothers and their caring experience of children with disability. This is an ongoing qualitative study which is conducting in-depth interviews with 30 mothers from five districts (Dhaka, Mymensingh, Manikganj, Tangail, and Gazipur) of Bangladesh with the aim to explore the impact of social perception and stigma around physical disability on the caring role of the mothers of children with physical disability. The major findings of this study show that the social perception around disability and the social expectation from a mother regarding her caring role have a huge impact on the well-being of mothers. Mothers are mostly expected to take their child on their lap to prove that they are ‘good mother’. These practices of lifting their children with physical disability and keeping them on the lap for a long time often cause chronic back pain of the mothers. Existing social beliefs consider disability as a ‘curse’ and punishment for the ‘sins’ of the family members, most often by the mother. Mothers are blamed if they give birth to ‘abnormal’ children. This social construction creates stigma, and thus, the caring responsibility of mothers become more challenging. It also encourages the family and mothers to hide their children from the society and to avoid seeking accessible disability services. The mothers also compromise their careers and social interaction as they have to stay with their children at home, and that has a significant impact on personal wellbeing, income, and empowerment of the mothers. The research is informed by intersectional theory and employed an interpretive phenomenological methodology to explore mothers’ experience of caring their children with physical disability, and the contribution and impact of key relationships within the family and the intersection with community and services.Keywords: mother, family carer, physical disability, children, social stigma, key relationship
Procedia PDF Downloads 2417178 Mathematical Modelling of Human Cardiovascular-Respiratory System Response to Exercise in Rwanda
Authors: Jean Marie Ntaganda, Froduald Minani, Wellars Banzi, Lydie Mpinganzima, Japhet Niyobuhungiro, Jean Bosco Gahutu, Vincent Dusabejambo, Immaculate Kambutse
Abstract:
In this paper, we present a nonlinear dynamic model for the interactive mechanism of the cardiovascular and respiratory system. The model is designed and analyzed for human during physical exercises. In order to verify the adequacy of the designed model, data collected in Rwanda are used for validation. We have simulated the impact of heart rate and alveolar ventilation as controls of cardiovascular and respiratory system respectively to steady state response of the main cardiovascular hemodynamic quantities i.e., systemic arterial and venous blood pressures, arterial oxygen partial pressure and arterial carbon dioxide partial pressure, to the stabilised values of controls. We used data collected in Rwanda for both male and female during physical activities. We obtained a good agreement with physiological data in the literature. The model may represent an important tool to improve the understanding of exercise physiology.Keywords: exercise, cardiovascular/respiratory, hemodynamic quantities, numerical simulation, physical activity, sportsmen in Rwanda, system
Procedia PDF Downloads 2447177 Correlation between Physical Fitness and Performance and Grade of Table Tennis of Middle School Students
Authors: Yisong Cong, Mingming Guo, Xiaozan Wang, Yizhi Zhang, Qingqing Yuan
Abstract:
This study is to test the correlation between the Physical Fitness (PF) of middle school students and their performance and sports grade of table tennis. Methods: 398 middle school students from Shanghai Tongji No.2 Middle School participated in the study, including 232 boys and 166 girls. Each participant participated in the Chinese Students’ Physical Fitness Test (CSPFT), including BMI, 50-meter running, vital capacity, sitting body flexion, standing long jump, 800-meter running, 1000-meter running, pull-ups, and sit-ups. Test scores were converted to a percentage score according to the CSPFT guidelines. In addition, each student participated in the Nation Junior Table Tennis grade test, and completed the table tennis sports grade assessment of 1-9. Results: There is a significant positive correlation between the scores of multiple PF tests and the total scores of table tennis, such as BMI (r = 0.15, p < 0.01), standing long jump (r = 0.15, p < 0.05), 800-meter run (r = 0.02, p <0.01); The scores of multiple PF are positively correlated with table tennis grade, such as vital capacity (r = 0.1, p < 0.01) and 50-meter running (r = 0.18, p < 0.05). At the same time, the sit-ups performance showed a significant negative correlation with the table tennis performance (r = -0.08, p < 0.01); There is no significant correlation between the other PF indicators and the performance and grade of table tennis. Conclusions: This study shows that there is a corresponding relationship between some PF indicators of middle school students and their table tennis performance and table tennis grade,but the specific form and reason of the relationship need to be further explored.Keywords: middle school students, physical fitness, table tennis grade, table tennis performance
Procedia PDF Downloads 1607176 The Role of Physical Activities in Improving the Psychological State, Reducing Stress and Anxiety Resulting from the Corona (Covid-19) Pandemic
Authors: Saidia Houari
Abstract:
The current coronavirus pandemic (COVID-19) is a special and unusual reality. It can affect people physically, but also psychologically. Indeed, in such a context, many people will experience reactions of stress, anxiety and depression, and Sports is known to be a great in improving the effectiveness of the nervous system and mental health. Professor Ango Frubuze“many studies proved that sports play an important role in fighting psychological tension and some other psychological problems, such as depression and sleep difficulties, but on condition of practicing them properly,choosing the kind that generates comfort and happiness for man “ .The sports university professor in the German city of Cologne added that the effort exerted during the exercise works on restoring balance to the stress hormones like cortisol.The case report provides an insight into the COVID-19 current situation and represents a picture of the current state of mental health and an overview of novel coronavirus (Covid-19) outbreaks in some countries of the world. Some procedures taken to combat the coronavirus. We proposed the practice of physical activities during the quarantine period, and we showed their importance and their positive effects.Keywords: COVID-19, psycholiqical impacts, stress, physical activities
Procedia PDF Downloads 757175 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks
Authors: Afnan Al-Romi, Iman Al-Momani
Abstract:
The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN
Procedia PDF Downloads 3227174 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration
Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu
Abstract:
This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.Keywords: migration, border, security, memory effect
Procedia PDF Downloads 927173 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 2507172 Physical Activity and Cognitive Functioning Relationship in Children
Authors: Comfort Mokgothu
Abstract:
This study investigated the relation between processing information and fitness level of active (fit) and sedentary (unfit) children drawn from rural and urban areas in Botswana. It was hypothesized that fit children would display faster simple reaction time (SRT), choice reaction times (CRT) and movement times (SMT). 60, third grade children (7.0 – 9.0 years) were initially selected and based upon fitness testing, 45 participated in the study (15 each of fit urban, unfit urban, fit rural). All children completed anthropometric measures, skinfold testing and submaximal cycle ergometer testing. The cognitive testing included SRT, CRT, SMT and Choice Movement Time (CMT) and memory sequence length. Results indicated that the rural fit group exhibited faster SMT than the urban fit and unfit groups. For CRT, both fit groups were faster than the unfit group. Collectively, the study shows that the relationship that exists between physical fitness and cognitive function amongst the elderly can tentatively be extended to the pediatric population. Physical fitness could be a factor in the speed at which we process information, including decision making, even in children.Keywords: decision making, fitness, information processing, reaction time, cognition movement time
Procedia PDF Downloads 1457171 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 3287170 The Effects of Different Parameters of Wood Floating Debris on Scour Rate Around Bridge Piers
Authors: Muhanad Al-Jubouri
Abstract:
A local scour is the most important of the several scours impacting bridge performance and security. Even though scour is widespread in bridges, especially during flood seasons, the experimental tests could not be applied to many standard highway bridges. A computational fluid dynamics numerical model was used to solve the problem of calculating local scouring and deposition for non-cohesive silt and clear water conditions near single and double cylindrical piers with the effect of floating debris. When FLOW-3D software is employed with the Rang turbulence model, the Nilsson bed-load transfer equation and fine mesh size are considered. The numerical findings of single cylindrical piers correspond pretty well with the physical model's results. Furthermore, after parameter effectiveness investigates the range of outcomes based on predicted user inputs such as the bed-load equation, mesh cell size, and turbulence model, the final numerical predictions are compared to experimental data. When the findings are compared, the error rate for the deepest point of the scour is equivalent to 3.8% for the single pier example.Keywords: local scouring, non-cohesive, clear water, computational fluid dynamics, turbulence model, bed-load equation, debris
Procedia PDF Downloads 697169 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System
Authors: Stephen Wheat
Abstract:
Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.Keywords: mobile app management, governance, distribution, information security
Procedia PDF Downloads 2997168 Cardiometabolic Risk Factors Responses to Supplemental High Intensity Exercise in Middle School Children
Authors: R. M. Chandler, A. J. Stringer
Abstract:
In adults, short bursts of high-intensity exercise (intensities between 80-95% of maximum heart rates) increase cardiovascular and metabolic function without the time investment of traditional aerobic training. Similar improvements in various health indices are also becoming increasingly evident in children in countries other than the United States. In the United States, physical education programs have become shorter in length and fewer in frequency. With this in the background, it is imperative that health and physical educators delivered well-organized and focused fitness programs that can be tolerated across many different somatotypes. Perhaps the least effective lag-time in a US physical education (PE) class is the first 10 minutes, a time during which children warm up. Replacing a traditional PE warmup with a 10 min high-intensity excise protocol is a time-efficient method to impact health, leaving as much time for other PE material such as skill development, motor behavior development as possible. This supplemented 10 min high-intensity exercise increases cardiovascular function as well as induces favorable body composition changes in as little as six weeks with further enhancement throughout a semester of activity. The supplemental high-intensity exercise did not detract from the PE lesson outcomes.Keywords: cardiovascular fitness, high intensity interval training, high intensity exercise, pediatric
Procedia PDF Downloads 1367167 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius
Abstract:
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal
Procedia PDF Downloads 4877166 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 1477165 Factors Affecting Citizens’ Behavioural Intention to Use E-voter Registration and Verification System Towards the Electoral Process in Nigeria
Authors: Aishatu Shuaibu
Abstract:
It is expected that electronic voter registration and verification in Nigeria will enhance the integrity of elections, which is vital for democratic development; it is also expected to enhance efficiency, transparency, and security. However, the reasons for citizens' intentions with respect to behavioral use of such platforms have not been studied in the literature much. This paper, therefore, intends to look into significant characteristics affecting the acceptance and use of e-voter technology among Nigerian residents. Data will be collected using a structured questionnaire from several local government areas (LGAs) around Nigeria to evaluate the influence of demographic characteristics, technology usability, security perceptions, and governmental education on the intention to implement e-voter systems. The results will offer vital insights into the barriers and drivers of voter technology acceptance, aiding in policy suggestions to enhance voter registration and verification processes within Nigeria's electoral framework. This study is designed to aid electoral stakeholders in devising successful strategies for encouraging the broad deployment of e-voter systems in Nigeria.Keywords: e-governance, e-voting, e-democracy, INEC, Nigeria
Procedia PDF Downloads 197164 Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians
Authors: Sultan Aldaihani, Eiman Al-Fadhli
Abstract:
Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology.Keywords: academic libraries, internet of things, information resources, information services
Procedia PDF Downloads 1537163 Physical and Rheological Properties of Asphalt Modified with Cellulose Date Palm Fibers
Authors: Howaidi M. Al-Otaibi, Abdulrahman S. Al-Suhaibani, Hamad A. Alsoliman
Abstract:
Fibers are extensively used in civil engineering applications for many years. In this study, empty fruit bunch of date palm trees were used to produce cellulose fiber that were used as additives in the asphalt binder. Two sizes (coarse and fine) of cellulose fibers were pre-blended in PG64-22 binder with various contents of 1.5%, 3%, 4.5%, 6%, and 7.5% by weight of asphalt binder. The physical and rheological properties of fiber modified asphalt binders were tested by using conventional tests such as penetration, softening point and viscosity; and SHRP test such as dynamic shear rheometer. The results indicated that the fiber modified asphalt binders were higher in softening point, viscosity, and complex shear modulus, and lower in penetration compared to pure asphalt. The fiber modified binders showed an improvement in rheological properties since it was possible to raise the control binder (pure asphalt) PG from 64 to 70 by adding 6% (by weight) of either fine or coarse fibers. Such improvement in stiffness of fiber modified binder is expected to improve pavement resistance to rutting.Keywords: cellulose date palm fiber, fiber modified asphalt, physical properties, rheological properties
Procedia PDF Downloads 3337162 Effectiveness of Myofascial Release Technique in Treatment of Sacroiliac Joint Hypo-Mobility in Postnatal Women
Authors: Ahmed A. Abd El Rahim, Mohamed M. M. Essa, Magdy M. A. Shabana, Said A. Mohamed, Mohamed Ibrahim Mabrouk
Abstract:
Background: Sacroiliac joint (SIJ) dysfunction is considered the main cause of pregnancy-related back pain, which may continue to persist postnatally. Myofascial release technique (MFR) is an application of low-intensity, prolonged stretch to myofascial structures to improve function by increasing the sliding properties of restricted myofascial tissues. Purpose: This study was designed to investigate the effect of MFR on postnatal SIJ hypo-mobility. Materials and Methods: Fifty postnatal women complaining of SIJ hypo-mobility participated in this study. Their ages ranged from 26 to 35 yrs., and their body mass index (BMI) didn`t exceed 30 kg/m2. They were randomly assigned to two equal groups, group A (Gr. A) and group B (Gr. B). Both groups received three sessions per week for eight successive weeks. Gr. A received a traditional physical therapy program, while Gr. B received a traditional physical therapy program in addition to MFR. Doppler imaging of vibration was utilized to measure SIJ mobility pre- and post-intervention, and an electronic digital goniometer was used to measure back flexion and extension Range of motion. Results: Findings revealed a statistical improvement in post-intervention values of SIJ mobility in addition to trunk flexion and extension ROM in Gr. B compared to Gr. A (P<0.001). Conclusion: Adding MFR to traditional physical therapy programs is highly recommended in the treatment of SIJ hypo-mobility in postnatal women.Keywords: sacroiliac hypo-mobility, sacroiliac dysfunction, myofascial release technique, traditional physical therapy, postnatal
Procedia PDF Downloads 1027161 Learning Performance of Sports Education Model Based on Self-Regulated Learning Approach
Authors: Yi-Hsiang Pan, Ching-Hsiang Chen, Wei-Ting Hsu
Abstract:
The purpose of this study was to compare the learning effects of the sports education model (SEM) to those of the traditional teaching model (TTM) in physical education classes in terms of students learning motivation, action control, learning strategies, and learning performance. A quasi-experimental design was utilized in this study, and participants included two physical educators and four classes with a total of 94 students in grades 5 and 6 of elementary schools. Two classes implemented the SEM (n=47, male=24, female=23; age=11.89, SD=0.78) and two classes implemented the TTM (n=47, male=25, female=22, age=11.77; SD=0.66). Data were collected from these participants using a self-report questionnaire (including a learning motivation scale, action control scale, and learning strategy scale) and a game performance assessment instrument, and multivariate analysis of covariance was used to conduct statistical analysis. The findings of the study revealed that the SEM was significantly better than the TTM in promoting students learning motivation, action control, learning strategies, and game performance. It was concluded that the SEM could promote the mechanics of students self-regulated learning process, and thereby improve students movement performance.Keywords: self-regulated learning theory, learning process, curriculum model, physical education
Procedia PDF Downloads 3427160 Physical Inactivity and Junk Food Consumption Consequent Obesity among University Girls: A Cross Sectional Study Unveils the Mayhem
Authors: Shahid Mahmood, Ghulam Mueen-Ud-Din, Farah Naz Akbar, Yousaf Quddoos, Syeda Mahvish Zahra, Wajiha Saeed, Tayyaba Sami Ullah
Abstract:
Obesity is an epidemic across the globe that affects all the segments of the population. Physical inactivity, passionate consumption of junk food, inadequate water intake and an unhealthy lifestyle are evident among university girls that are ruining their health gravely especially fat accumulation. The study was carried out to investigate the potential etiological factors of obesity development in university girls. The cross sectional study was carried out after approval of the Departmental Review Committee for Ethics (DRCE) as the par Declaration of Helsinki at Institute of Food Science and Nutrition (IFSN), University of Sargodha, Sargodha-Pakistan and Department of Food Science and Home Economics, G. C. Women University, Faisalabad-Pakistan. 400 girls were selected randomly from different departments of both universities. Nutritional status of the volunteers was assessed through approved protocols for demographics, anthropometrics, body composition, energetics, vital signs, clinical signs and symptoms, medical/family history, and dietary intake assessment (FFQ), water intake and physical activity level. The obesity was determined on body fat (%). Alarming and unheeded etiological factors for the development of obesity in girls were explored by the study. About 93 % girls had a sedentary level of physical activity, zealous consumption of junk food (5.31±1.23 servings), drank little water (1.09±0.26 L/day) that consequent high heaps of fat (35.06±3.02 %), measly body water (52.38±3.4 %), poor bone mass (05.14±0.31 Kg), and high BMI (26.68±1.14 Kg/m²) in 34% girls. The malnutrition also depicted by poor vital signs i.e. low body temperature (97.11±0.93 °F), slightly higher blood pressure (124.19±4.08 / 85.25±2.97 mmHg), rapid pulse rate (99.2 ± 6.85 beats/min), reduced blood O₂ saturation (96.53±0.96 %), scanty peak expiratory flow rate (297 ± 15.7 L /min). The outcomes of the research articulated that physical inactivity; extreme intakes of junk food, insufficient water consumption are etiological factors for obesity development among girls which are usually overlooked in Pakistan.Keywords: informed consent, junk food, obesity, physical inactivity
Procedia PDF Downloads 1897159 Magnetic Treatment of Irrigation Water and Its Effect on Water Salinity
Authors: Muhammad Waqar Ashraf
Abstract:
The influence of magnetic field on the structure of water and aqueous solutions are similar and can alter the physical and chemical properties of water-dispersed systems. With the application of magnetic field, hydration of salt ions and other impurities slides down and improve the possible technological characteristics of the water. Magnetic field can enhance the characteristic of water i.e. better salt solubility, kinetic changes in salt crystallization, accelerated coagulation, etc. Gulf countries are facing critical problem due to depletion of water resources and increasing food demands to cover the human needs; therefore water shortage is being increasingly accepted as a major limitation for increased agricultural production and food security. In arid and semi-arid regions sustainable agricultural development is influenced to a great extent by water quality that might be used economically and effectively in developing agriculture programs. In the present study, the possibility of using magnetized water to desalinate the soil is accounted for the enhanced dissolving capacity of the magnetized water. Magnetic field has been applied to treat brackish water. The study showed that the impact of magnetic field on saline water is sustained up to three hours (with and without shaking). These results suggest that even low magnetic field can decrease the electrical conductivity and total dissolved solids which are good for the removal of salinity from the irrigated land by using magnetized water.Keywords: magnetic treatment, saline water, hardness of water, removal of salinity
Procedia PDF Downloads 4977158 'It Is a Sin to Be in Love with a Disabled Woman': Stigma, Rejection and Intersections of Womanhood and Violence among Physically Disabled Women Living in South Africa
Authors: Ingrid Van Der Heijden, Naeemah Abrahams, Jane Harries
Abstract:
Background: Commonly, womanhood is defined as the qualities considered to be natural to or characteristic of a woman. However, womanhood is not a static concept; it is contextual and negotiable. For women with disabilities, gender roles or ‘qualities’ of womanhood are often overstated or contradicted because of assumptions of weakness, passivity, asexuality and infertility. Currently, little is known about how disability stigma intersects with notions of womanhood to make women with disabilities vulnerable to violence, or how women navigate this intersection to prevent or protect themselves from violence. Objective: To describe how the stigmatized constructions of womanhood and disability promote women with physical disabilities’ exposure to or protection from violence. Methods: Qualitative data for this paper comes from a doctoral study involving women with disabilities living in Cape Town, South Africa. It presents data from repeat in-depth interviews with 30 women with a range of physical impairments. Women attending protective workshops, rehabilitative centers and residential care facilities for people living with disabilities were invited to participate. Consent procedures and interviews were conducted by the first author (who is herself a woman living with a physical disability), and a female research assistant/translator who is a qualified occupational therapist. Reasonable accommodation is central to the methodology and the study as a whole. Findings: Descriptive and thematic analyses reveal how stigma and local constructions around womanhood, as well as women’s self-image and physical limitations, promotes women’s exposure to psychological, physical and sexual violence. It reveals how disabled women feel they are presumed incapable of living up to expectations of a ‘proper’ woman. This plays out as psychological violence, with women reporting that they feel ‘devalued,' ‘rejected’ and deprived of lasting intimate relationships. Furthermore, forms of psychological violence perpetuate physical and sexual violence. Women also discuss using strategies to prevent violence; by refusing to date, avoiding certain places or avoiding isolation, creating awareness, hiding their physical impairments, and exaggerating their ‘femininity.' Implications: Service providers need to be made aware of women’s violence experiences, and provide a range of accessible psychological and mental health services to women living with disabilities, as well as raising awareness around disability, and violence prevention, among caregivers, men, and women. Violence awareness and prevention interventions need to involve disability experts, researchers and people with disabilities.Keywords: disability, gender, stigma, violence awareness and prevention interventions
Procedia PDF Downloads 3527157 Digital Literacy Skills for Geologist in Public Sector
Authors: Angsumalin Puntho
Abstract:
Disruptive technology has had a great influence on our everyday lives and the existence of an organization. Geologists in the public sector need to keep up with digital technology and be able to work and collaborate in a more effective manner. The result from SWOT and 7S McKinsey analyses suggest that there are inadequate IT personnel, no individual digital literacy development plan, and a misunderstanding of management policies. The Office of Civil Service Commission develops digital literacy skills that civil servants and government officers should possess in order to work effectively; it consists of nine dimensions, including computer skills, internet skills, cyber security awareness, word processing, spreadsheets, presentation programs, online collaboration, graphics editors and cyber security practices; and six steps of digital literacy development including self-assessment, individual development plan, self-learning, certified test, learning reflection, and practices. Geologists can use digital literacy as a learning tool to develop themselves for better career opportunities.Keywords: disruptive technology, digital technology, digital literacy, computer skills
Procedia PDF Downloads 1167156 Indoor and Outdoor Forest Farming for Year-Round Food and Medicine Production, Carbon Sequestration, Soil-Building, and Climate Change Mitigation
Authors: Jerome Osentowski
Abstract:
The objective at Central Rocky Mountain Permaculture Institute has been to put in practice a sustainable way of life while growing food, medicine, and providing education. This has been done by applying methods of farming such as agroforestry, forest farming, and perennial polycultures. These methods have been found to be regenerative to the environment through carbon sequestration, soil-building, climate change mitigation, and the provision of food security. After 30 years of implementing carbon farming methods, the results are agro-diversity, self-sustaining systems, and a consistent provision of food and medicine. These results are exhibited through polyculture plantings in an outdoor forest garden spanning roughly an acre containing about 200 varieties of fruits, nuts, nitrogen-fixing trees, and medicinal herbs, and two indoor forest garden greenhouses (one Mediterranean and one Tropical) containing about 50 varieties of tropical fruits, beans, herbaceous plants and more. While the climate zone outside the greenhouse is 6, the tropical forest garden greenhouse retains an indoor climate zone of 11 with near-net-zero energy consumption through the use of a climate battery, allowing the greenhouse to serve as a year-round food producer. The effort to source food from the forest gardens is minimal compared to annual crop production. The findings at Central Rocky Mountain Permaculture Institute conclude that agroecological methods are not only beneficial but necessary in order to revive and regenerate the environment and food security.Keywords: agroecology, agroforestry, carbon farming, carbon sequestration, climate battery, food security, forest farming, forest garden, greenhouse, near-net-zero, perennial polycultures
Procedia PDF Downloads 4427155 Banking and Accounting Analysis Researches Effect on Environment
Authors: Marina Magdy Naguib Karas
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 507154 Expert System: Debugging Using MD5 Process Firewall
Authors: C. U. Om Kumar, S. Kishore, A. Geetha
Abstract:
An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization
Procedia PDF Downloads 4277153 The Television as an Affordable and Effective Way to Promote Healthy Diet and Physical Activity to Prevent or Treat Obesity
Authors: P. Gil Del Álamo, J. García Pereda, A. Castañeda De La Paz, D. Arazola Lopez, M. D. Cubiles De La Vega, A. Enguíx González, J. M. Muñoz Pichardo
Abstract:
In the last decades, obesity has more than doubled and is, with overweight, the second leading cause of preventable death. Despite multiple strategies against obesity, no country to date has reduced the number of obese people. To achieve World Health Organization’s target to reverse this tendency we need dramatic and different actions to engage the civil society in creating demand for a healthy style of life. The objective of this study is to demonstrate that a social media as the television can be used to convince the civil society that a healthy nutrition and physical activity are affordable, effective and necessary to prevent and to treat the obesity. Methodology: 61 individuals (34 women and 27 men) with obesity (mean BMI 45,51) were recruited to follow during 22 weeks an intensive lifestyle intervention in order to lose weight in a healthy manner. They were not isolated or moved from their usual environment. This program included endocrinological and nutritional assessment, promotion of physical activity and psychological support. BMI was measured every week. Time to leave obesity between men and women was analyzed with a survival analysis. Results: BMI decreased in all the cases. Analysing Time to leave obesity, around the week 30, 25% of men leave the obesity and around the week 39, 25% of women leave the obesity too. Conclusion: We demonstrate the audience that improving the quality of the diet and increasing the physical activity is a realistic way to lose weight. This evidence can encourage the people to act in their own self-interest changing their style of life in order to prevent or to reduce their overweight.Keywords: obesity epidemic, obesity prevention, obesity strategies, social media
Procedia PDF Downloads 2907152 Literature Review of Empirical Studies on the Psychological Processes of End-of-Life Cancer Patients
Authors: Kimiyo Shimomai, Mihoko Harada
Abstract:
This study is a literature review of the psychological reactions that occur in end-of-life cancer patients who are nearing death. It searched electronic databases and selected literature related to psychological studies of end-of-life patients. There was no limit on the search period, and the search was conducted until the second week of December 2021. The keywords were specified as “death and dying”, “terminal illness”, “end-of-life”, “palliative care”, “psycho-oncology” and “research”. These literatures referred to Holly (2017): Comprehensive Systematic Review for Advanced Practice Nursing, P268 Figure 10.3 to ensure quality. These literatures were selected with a dissertation score of 4 or 5. The review was conducted in two stages with reference to the procedure of George (2002). First, these references were searched for keywords in the database, and then relevant references were selected from the psychology and nursing studies of end-of-life patients. The number of literatures analyzed was 76 for overseas and 17 for domestic. As for the independent variables, "physical variable" was the most common in 36 literatures (66.7%), followed by "psychological variable" in 35 literatures (64.8%), "spiritual variable" in 21 literatures (38%), and "social variable" in 17 literatures. (31.5%), "Variables related to medical care / treatment" were 16 literatures (29.6%). To summarize the relationship between these independent variables and the dependent variable, when the dependent variable is "psychological variable", the independent variables are "psychological variable", "social variable", and "physical variable". Among the independent variables, the physical variables were the most common. The psychological responses that occur in end-stage cancer patients who are nearing death are mutually influenced by psychological, social, and physical variables. Therefore, it supported the "total pain" advocated by Cicely Saunders.Keywords: cancer patient, end-of-life, literature review, psychological process
Procedia PDF Downloads 1277151 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance
Authors: Kyle Phillips, Ndiko Ludidi
Abstract:
Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22
Procedia PDF Downloads 4647150 Food Insecurity Assessment, Consumption Pattern and Implications of Integrated Food Security Phase Classification: Evidence from Sudan
Authors: Ahmed A. A. Fadol, Guangji Tong, Wlaa Mohamed
Abstract:
This paper provides a comprehensive analysis of food insecurity in Sudan, focusing on consumption patterns and their implications, employing the Integrated Food Security Phase Classification (IPC) assessment framework. Years of conflict and economic instability have driven large segments of the population in Sudan into crisis levels of acute food insecurity according to the (IPC). A substantial number of people are estimated to currently face emergency conditions, with an additional sizeable portion categorized under less severe but still extreme hunger levels. In this study, we explore the multifaceted nature of food insecurity in Sudan, considering its historical, political, economic, and social dimensions. An analysis of consumption patterns and trends was conducted, taking into account cultural influences, dietary shifts, and demographic changes. Furthermore, we employ logistic regression and random forest analysis to identify significant independent variables influencing food security status in Sudan. Random forest clearly outperforms logistic regression in terms of area under curve (AUC), accuracy, precision and recall. Forward projections of the IPC for Sudan estimate that 15 million individuals are anticipated to face Crisis level (IPC Phase 3) or worse acute food insecurity conditions between October 2023 and February 2024. Of this, 60% are concentrated in Greater Darfur, Greater Kordofan, and Khartoum State, with Greater Darfur alone representing 29% of this total. These findings emphasize the urgent need for both short-term humanitarian aid and long-term strategies to address Sudan's deepening food insecurity crisis.Keywords: food insecurity, consumption patterns, logistic regression, random forest analysis
Procedia PDF Downloads 74