Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6006

Search results for: security service

4596 Investigating the Role and Position of Tuka Sabz Manufacturing Service Company in Supplying Human Resources to Mobarakeh Steel Company

Authors: Mohammad Abbas Nejad

Abstract:

Tuka Sabz service production company (private shares), with more than 30 years of history, is considered as one of the first holding companies of Tuka Foulad, which takes steps in the direction of increasing service quality and customer satisfaction. Manpower supply is one of the most important activities of Tuka Sabz company, in addition to car supply services; light and heavy transportation services; management of entertainment, sports, tourism and accommodation centers; design, creation and maintenance services of land space; preparing, cooking, distributing and serving all kinds of personal and ceremonial foods; design, construction, repair and reconstruction of non-industrial buildings; industrial laundry services; public and industrial cleaning services are also among other activities of Tuka Sabz. This company has a high capacity of specialized and committed human resources as the main pillar of its success and spent most of its years of activity in Mobarakeh steel company as one of the reliable contractors in the field of automotive service contracts, green space, industrial cleaning, management cultural, recreational and tourism places, consulting, maintenance and repair of buildings and facilities, industrial laundry, management of cooking centers and personnel transportation. The final result of this article states that Tuka Sabz company is trying to get the satisfaction of three main groups of stakeholders, i.e., employees, customers, and shareholders, for this purpose, by improving the competence and competence of employees, trying to establish a system of meritocracy and respecting the human status of employees. On the one hand, the implementation of quality management and assurance to employers with the timely and favorable implementation of contracts takes a step in this direction.

Keywords: Mubarakeh steel company, Tuka Sabz company, human resources, industrial laundry services

Procedia PDF Downloads 43
4595 Food Supply Chain Optimization: Achieving Cost Effectiveness Using Predictive Analytics

Authors: Jayant Kumar, Aarcha Jayachandran Sasikala, Barry Adrian Shepherd

Abstract:

Public Distribution System is a flagship welfare programme of the Government of India with both historical and political significance. Targeted at lower sections of society,it is one of the largest supply chain networks in the world. There has been several studies by academics and planning commission about the effectiveness of the system. Our study focuses on applying predictive analytics to aid the central body to keep track of the problem of breach of service level agreement between the two echelons of food supply chain. Each shop breach is leading to a potential additional inventory carrying cost. Thus, through this study, we aim to show that aided with such analytics, the network can be made more cost effective. The methods we illustrate in this study are applicable to other commercial supply chains as well.

Keywords: PDS, analytics, cost effectiveness, Karnataka, inventory cost, service level JEL classification: C53

Procedia PDF Downloads 507
4594 Wavelet Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. As encryption process is applied to the whole image in AES ,it is difficult to improve the efficiency. In this paper, wavelet decomposition is used to concentrate the main information of image to the low frequency part. Then, AES encryption is applied to the low frequency part. The high frequency parts are XORed with the encrypted low frequency part and a wavelet reconstruction is applied. Theoretical analysis and experimental results show that the proposed algorithm has high efficiency, and satisfied security suits for image data transmission.

Keywords: discrete wavelet transforms, AES, dynamic SBox

Procedia PDF Downloads 419
4593 Efficiency of Using E-Wallets as Payment Method in Marikina City During COVID-19 Pandemic

Authors: Noel Paolo Domingo, James Paul Menina, Laurente Ferrer

Abstract:

Most people were forced to stay at home and limit their physical contact during the COVID-19 pandemic. Due to the situation, strict implementation of government policies and safety protocols encouraged consumers to utilize cashless or digital transactions through e-wallets. In this study, the researchers aim to investigate the efficiency of using e-wallets as a payment method during the COVID-19 pandemic in Marikina City. The study examined the efficiency of e-wallets in terms of Usefulness, Convenience, and Safety and Security based on respondents’ assessment. Questionnaires developed by the researchers were distributed to a total of 400 e-wallet users in Marikina City aged 15 years old and above to gather data by using a purposive sampling technique. The data collected was processed using SPSS version 26. Frequency, percentage, and mean were utilized to describe the profile of respondents and their assessment of e-wallets in terms of the three constructs. ANOVA and t-tests were also employed to test the significant differences in the respondent’s assessment when the demographic profile was considered. The study revealed that when it comes to usefulness, e-wallet is efficient while in terms of convenience, and safety and security, e-wallet has been proven to be very efficient. During the COVID-19 pandemic, utilizing e-wallets has been embraced by most consumers. By enhancing its features, more people will be satisfied with using e-wallets.

Keywords: efficiency of e-wallets, usefulness, convenience, safety and security

Procedia PDF Downloads 100
4592 Customers' Attitudes towards Marketing Mix Affecting Purchasing Behavior of Starbucks Coffee (Thailand) Customers in Bangkok

Authors: Polamorn Tamprateep, Warapong Thakanun

Abstract:

This researchs' objectives are: 1. To study the customer demographics that affects the purchasing behavior; 2. To study the marketing mix that affects the purchasing behavior; 3. To study the relationship between purchasing behavior and customers’ perception of Brand Equity. Population of this research is Starbucks Coffee (Thailand) customers in Bangkok. The tool used in this study was questionnaire created from concepts, theories and related researches. The study showed that, of 400 respondents, overall opinion received high score (xˉ= 3.77). When each item is considered, it was found that ‘Staff are knowledgeable in providing service.’, ‘ Staff are friendly.’, ‘Staff possess good communication skill with customers.’, ‘Staff know all types of coffee well.’, and ‘Staff are enthusiastic in giving service.’, all these items received high score with a mean of 3.92, 3.87, 3.77, 3.71 and 3.63, respectively.

Keywords: mix attitude of the product, consumer, buying behavior, Starbucks

Procedia PDF Downloads 249
4591 Radio Based Location Detection

Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw

Abstract:

Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.

Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost

Procedia PDF Downloads 499
4590 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting

Authors: Yanmin Zhao, Siu Ming Yiu

Abstract:

To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.

Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures

Procedia PDF Downloads 110
4589 Development of an Indigenous Motorized Planter for the Sustainable Production of Grain Crops in Nigeria

Authors: Babatunde Oluwamayokun Soyoye

Abstract:

This technology, whose development revolves round culture, tradition, and prevailing needs of the people, is seen as a solution in promoting development in poor rural communities in many parts of Nigeria. The research was based on one of the food security agenda of the Federal Government of Nigeria by developing a motorized multi-grain crop planter suitable for planting operations in tropical soils. The ergonomic design is tailored towards the ease of planting operations for would-be users, improve crop yields and profitability by minimizing the cost of production. Some properties of the grain crops were determined and were used to develop and assemble the locally-made motorized planter. These properties were used in establishing the design criteria of various components of the planter. The geometric mean diameter of the maize, cowpea, groundnut, and soybean were 8.26 mm, 8.72 mm, 9.51 mm and 6.52 mm respectively, with respective groove depths of 8 mm, 7 mm, 9 mm and 6 mm. The results obtained from the evaluation of the planter confirmed that the planter has a uniform discharge and application rates. The field capacity of the planter was determined to be 0.187 ha/h. Also, the average performance efficiency of the planter was 95.5%, with the average discharge and application rates of 7.86 kg/h and 42.1 kg/ha, respectively. The motorized multi-grain planter can be used in increasing food production, reduce time, cost of production, and can become a major tool to fast-track the food security agenda of the government of Nigeria.

Keywords: design and fabrication, food security, grain crop, motorized planter

Procedia PDF Downloads 115
4588 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 268
4587 A Study of Student Affairs Services across Baghdad Universities: Exploring Best Practices and Impact on Student Success

Authors: Jelena Zivkovic, Haidar Mohammed, Elaf Saeed

Abstract:

Student affairs services play a critical role in contributing to the wholistic development and success of students as they progress through their academic careers. The study encompasses a multifaceted examination of student affairs service offerings amongst 10 private and 3 public Baghdad universities. Student affairs administrators (13) were surveyed along with over 300 students to determine university-sponsored services and student satisfaction and awareness. The student affairs service research findings varied significantly between private and public institutions and those that followed a national and international curriculum. Universities need to persist to adapt to changing demographics and technological advancements to enhance students' personal and academic successes, and student affairs services are key to preparing graduates to thrive in a diverse global world.

Keywords: student affairs, student success, higher education, Iraq, universities, Baghdad

Procedia PDF Downloads 76
4586 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 48
4585 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 427
4584 Carbon Pool Assessment in Two Community Forest in Nepal

Authors: Khemnath Kharel

Abstract:

Forest itself is a factory as well as product. It supplies tangible and intangible goods and services. It supplies timber, fuel wood, fodder, grass leaf litter as well as non timber edible goods and medicinal and aromatic products additionally provides environmental services. These environmental services are of local, national, or even global importance. In Nepal more than 19 thousands community forests are providing environmental service in less economic benefit than actual efficiency. There is a risk of cost of management of those forest exceeds benefits and forests get converted to open access resources in future. Most of the environmental goods and services don’t have markets which mean no prices at which they are available to the consumers therefore the valuation of these services goods and services establishment of paying mechanism for such services and insure the benefit to community is more relevant in local as well as global scale. There are few examples of carbon trading in domestic level to meet the country wide emission goal. In this contest the study aims to explore the public attitude towards carbon offsetting and their responsibility over service providers. This study helps in promotion of environment service awareness among general people and service provider; community forest. The research helps to unveil the carbon pool scenario in community forest and willingness to pay for carbon offsetting of people who are consuming more energy than general people and emitting relatively more carbon in atmosphere. The study has assessed the carbon pool status in two community forest. In the study in two community forests carbon pools were assessed following the guideline “Forest Carbon Inventory Guideline 2010” prescribed by Ministry of Forest and soil Conservation, Nepal. Final out comes of analysis in intensively managed area of Hokse CF recorded as 103.58 tons C /ha with 6173.30 tons carbon stock. Similarly in Hariyali CF carbon density was recorded 251.72 mg C /ha. The total carbon stock of intensively managed blocks in Hariyali CF is 35839.62 tons carbon.

Keywords: carbon, offsetting, sequestration, valuation

Procedia PDF Downloads 304
4583 Determinants of the Users Intention of Social-Local-Mobile Applications

Authors: Chia-Chen Chen, Mu-Yen Chen

Abstract:

In recent years, with the vigorous growth of hardware and software technologies of smart mobile devices coupling with the rapid increase of social network influence, mobile commerce also presents the commercial operation mode of the future mainstream. For the time being, SoLoMo has become one of the very popular commercial models, its full name and meaning mainly refer to that users can obtain three key service types through smart mobile devices (Mobile) and omnipresent network services, and then link to the social (Social) web site platform to obtain the information exchange, again collocating with position and situational awareness technology to get the service suitable for the location (Local), through anytime, anywhere and any personal use of different mobile devices to provide the service concept of seamless integration style, and more deriving infinite opportunities of the future. The study tries to explore the use intention of users with SoLoMo mobile application formula, proposing research model to integrate TAM, ISSM, IDT and network externality, and with questionnaires to collect data and analyze results to verify the hypothesis, results show that perceived ease-of-use (PEOU), perceived usefulness (PU), and network externality have significant impact on the use intention with SoLoMo mobile application formula, and the information quality, relative advantages and observability have impacts on the perceived usefulness, and further affecting the use intention.

Keywords: SoLoMo (social, local, and mobile), technology acceptance model, innovation diffusion theory, network externality

Procedia PDF Downloads 511
4582 Time Management in the Public Sector in Nigeria

Authors: Sunny Ewankhiwimen Aigbomian

Abstract:

Time, is a scarce resource and in everything we do, time is required to accomplish any given task. The need for this presentation is predicated on the way majority of Nigerian especially in the public sector operators see “Time Management”. Time as resources cannot be regained if lost or managed badly. As a significant aspect of human life it should be handled with diligence and utmost seriousness if the public sector is to function as a coordinated entity. In our homes, private life and offices, we schedule different things to ensure that some things do not go the unexpected. When it comes to service delivery on the part of government, it ought to be more serious because government is all about effect and efficient service delivery and “Time” is a significant variable necessary to successful accomplishment. The need for Nigerian government to re-examine time management in her public sector with a view of repositioning the sector to be able to compete well with other public sectors in the world. The peculiarity of Time management in Public Sector in Nigerian context as examined and some useful recommendations of immerse assistance proffered.

Keywords: Nigeria, public sector, time management, task

Procedia PDF Downloads 75
4581 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 343
4580 Microbial Resource Research Infrastructure: A Large-Scale Research Infrastructure for Microbiological Services

Authors: R. Hurtado-Ortiz, D. Clermont, M. Schüngel, C. Bizet, D. Smith, E. Stackebrandt

Abstract:

Microbiological resources and their derivatives are the essential raw material for the advancement of human health, agro-food, food security, biotechnology, research and development in all life sciences. Microbial resources, and their genetic and metabolic products, are utilised in many areas such as production of healthy and functional food, identification of new antimicrobials against emerging and resistant pathogens, fighting agricultural disease, identifying novel energy sources on the basis of microbial biomass and screening for new active molecules for the bio-industries. The complexity of public collections, distribution and use of living biological material (not only living but also DNA, services, training, consultation, etc.) and service offer, demands the coordination and sharing of policies, processes and procedures. The Microbial Resource Research Infrastructure (MIRRI) is an initiative within the European Strategy Forum Infrastructures (ESFRI), bring together 16 partners including 13 European public microbial culture collections and biological resource centres (BRCs), supported by several European and non-European associated partners. The objective of MIRRI is to support innovation in microbiology by provision of a one-stop shop for well-characterized microbial resources and high quality services on a not-for-profit basis for biotechnology in support of microbiological research. In addition, MIRRI contributes to the structuring of microbial resources capacity both at the national and European levels. This will facilitate access to microorganisms for biotechnology for the enhancement of the bio-economy in Europe. MIRRI will overcome the fragmentation of access to current resources and services, develop harmonised strategies for delivery of associated information, ensure bio-security and other regulatory conditions to bring access and promote the uptake of these resources into European research. Data mining of the landscape of current information is needed to discover potential and drive innovation, to ensure the uptake of high quality microbial resources into research. MIRRI is in its Preparatory Phase focusing on governance and structure including technical, legal governance and financial issues. MIRRI will help the Biological Resources Centres to work more closely with policy makers, stakeholders, funders and researchers, to deliver resources and services needed for innovation.

Keywords: culture collections, microbiology, infrastructure, microbial resources, biotechnology

Procedia PDF Downloads 424
4579 Evaluation of Food Services by the Patients in Hospitals of Athens in Greece

Authors: I. Mentziou, C. Delezos, A. Nestoridou, G. Boskou

Abstract:

Introduction: The system of production and distribution of meals can have a significant impact on the food intake of hospital patients who are likely to develop malnutrition. In hospitals, the consequences of food borne infections can range from annoying to life-threatening for a patient, since they can lead up to death in vulnerable groups. Aim: The aim of the present study was to evaluate the satisfaction of the patients from the food services in Greek hospitals. Methods: Eleven hospitals of the Attica region were chosen. The sample derived from 637 adult patients who were hospitalized in those hospitals, during the period September 2009 - April 2010. Tailor made questionnaires were used to interview patients upon their satisfaction from the current food service system as well as from the total quality management system of the hospital. The number of completed questionnaires was proportional to the hospital capacity. Results: The majority of the patients seem to be pleased from the quality and the variety of the meals; they judged positively the behaviour of the food service personnel and the hygiene of serving conditions. Patients made suggestions for more frequent meals, larger variety of choices and better presented meals served under proper hygiene conditions by the personnel. Conclusions: The results indicate that the patients are satisfied in regards to the meal choices and the serving methods. However, factors like temperature and hygiene conditions are not always perceived to be in a way that fulfills the necessary prerequisite requirements. A total quality management system as a driver for better patient satisfaction is Indispensable.

Keywords: evaluation, food service, HACCP, hospital, patients

Procedia PDF Downloads 500
4578 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 452
4577 Strengthening Service Delivery to Improving Cervical Cancer Screening in Southwestern Nigeria: A Pilot Project

Authors: Afolabi K. Esther, Kuye Tolulope, Babafemi, L. Olayemi, Omikunle Yemisi

Abstract:

Background: Cervical cancer is a potentially preventable disease of public significance. All sexually active women are at risk of cervical cancer; however, the uptake and coverage are low in low-middle resource countries. Hence, the programme explored the feasibility of demonstrating an innovative and low-cost system approach to cervical cancer screening service delivery among reproductive-aged women in low–resource settings in Southwestern Nigeria. This was to promote the uptake and quality improvement of cervical cancer screening services. Methods: This study was an intervention project in three senatorial districts in Osun State that have primary, secondary and tertiary health facilities. The project was in three phases; Pre-intervention, Intervention, and Post-intervention. The study utilised the existing infrastructure, facilities and staff in project settings. The study population was nurse-midwives, community health workers and reproductive-aged women (30-49 years). The intervention phase entailed using innovative, culturally appropriate strategies to create awareness of cervical cancer and preventive health-seeking behaviour among women in the reproductive-aged group (30-49) years. Also, the service providers (community health workers, Nurses, and Midwives) were trained on screening methods and treatment of pre-cancerous lesions, and there was the provision of essential equipment and supplies for cervical cancer screening services at health facilities. Besides, advocacy and engagement were made with relevant stakeholders to integrate the cervical cancer screening services into related reproductive health services and greater allocation of resources. The expected results compared the pre and post-intervention using the baseline and process indicators and the effect of the intervention phase on screening coverage using a plausibility assessment design. The project lasted 12 months; visual Inspection with Acetic acid (VIA) screening for the women for six months and follow-up in 6 months for women receiving treatment. Results: The pre-intervention phase assessed baseline service delivery statistics in the previous 12 months drawn from the retrospective data collected as part of the routine monitoring and reporting systems. The uptake of cervical cancer screening services was low as the number of women screened in the previous 12 months was 156. Service personnel's competency level was fair (54%), and limited availability of essential equipment and supplies for cervical cancer screening services. At the post-intervention phase, the level of uptake had increased as the number of women screened was 1586 within six months in the study settings. This showed about a 100-%increase in the uptake of cervical cancer screening services compared with the baseline assessment. Also, the post-intervention level of competency of service delivery personnel had increased to 86.3%, which indicates quality improvement of the cervical cancer screening service delivery. Conclusion: the findings from the study have shown an effective approach to strengthening and improving cervical cancer screening service delivery in Southwestern Nigeria. Hence, the intervention promoted a positive attitude and health-seeking behaviour among the target population, significantly influencing the uptake of cervical cancer screening services.

Keywords: cervical cancer, screening, nigeria, health system strengthening

Procedia PDF Downloads 79
4576 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 141
4575 Music Education is Languishing in Rural South African Schools as Revealed Through Education Students

Authors: E. N. Jansen van Vuuren

Abstract:

When visiting Foundation Phase (FP) students during their Teaching Practice at schools in rural Mpumalanga, the lack of music education is evident through the absence of musical sounds, with the exception of a limited repertoire of songs that are sung by all classes everywhere you go. The absence of music teaching resources such as posters and music instruments add to the perception that generalist teachers in the FP are not teaching music. Pre-service students also acknowledge that they have never seen a music class being taught during their teaching practice visits at schools. This lack of music mentoring impacts the quality of teachers who are about to enter the workforce and ultimately results in the perpetuation of no music education in many rural schools. The situation in more affluent schools present a contrasting picture with music education being given a high priority and generalist teachers often being supported by music specialists, paid for by the parents. When student teachers start their music course, they have limited knowledge to use as a foundation for their studies. The aim of the study was to ascertain the music knowledge that students gained throughout their school careers so that the curriculum could be adapted to suit their needs. By knowing exactly what pre-service teachers know about music, the limited tuition time at tertiary level can be used in the most suitable manner and concentrate on filling the knowledge gaps. Many scholars write about the decline of music education in South African schools and mention reasons, but the exact music knowledge void amongst students does not feature in the studies. Knowing the parameters of students’ music knowledge will empower lecturers to restructure their curricula to meet the needs of pre-service students. The research question asks, “what is the extent of the music void amongst rural pre-service teachers in a B.Ed. FP course at an African university?” This action research was done using a pragmatic paradigm and mixed methodology. First year students in the cohort studying for a B.Ed. in FP were requested to complete an online baseline assessment to determine the status quo. This assessment was compiled using the CAPS music content for Grade R to 9. The data was sorted using the elements of music as a framework. Findings indicate that students do not have a suitable foundation in music education despite supposedly having had music tuition from grade R to grade 9. Knowing the content required to fill the lack of knowledge provides academics with valuable information to amend their curricula and to ensure that future teachers will be able to provide rural learners with the same foundations in music as those received by learners in more affluent schools. It is only then that the rich music culture of the African continent will thrive.

Keywords: generalist educators, music education, music curriculum, pre-service teachers

Procedia PDF Downloads 50
4574 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks

Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos

Abstract:

Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.

Keywords: in-house networks, fiber optics, security risk, money

Procedia PDF Downloads 404
4573 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon

Authors: Forbah Julius Ajamah

Abstract:

The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.

Keywords: justice, security, human rights abuses, conflicts, crisis

Procedia PDF Downloads 68
4572 Optimal Portfolio of Multi-service Provision based on Stochastic Model Predictive Control

Authors: Yifu Ding, Vijay Avinash, Malcolm McCulloch

Abstract:

As the proliferation of decentralized energy systems, the UK power system allows small-scale entities such as microgrids (MGs) to tender multiple energy services including energy arbitrage and frequency responses (FRs). However, its operation requires the balance between the uncertain renewable generations and loads in real-time and has to fulfill their provision requirements of contract services continuously during the time window agreed, otherwise it will be penalized for the under-delivered provision. To hedge against risks due to uncertainties and maximize the economic benefits, we propose a stochastic model predictive control (SMPC) framework to optimize its operation for the multi-service provision. Distinguished from previous works, we include a detailed economic-degradation model of the lithium-ion battery to quantify the costs of different service provisions, as well as accurately describe the changing dynamics of the battery. Considering a branch of load and generation scenarios and the battery aging, we formulate a risk-averse cost function using conditional value at risk (CVaR). It aims to achieve the maximum expected net revenue and avoids severe losses. The framework will be performed on a case study of a PV-battery grid-tied microgrid in the UK with real-life data. To highlight its performance, the framework will be compared with the case without the degradation model and the deterministic formulation.

Keywords: model predictive control (MPC), battery degradation, frequency response, microgrids

Procedia PDF Downloads 107
4571 Comparative Public Administration: A Case Study of ASEAN Member States

Authors: Nattapol Pourprasert

Abstract:

This research is to study qualitative research having two objectives: 1. to study comparison of private sector of government to compare with ASEAN Member States, 2. to study trend of private enterprise administration of ASEAN Member States. The results are: (1) Thai people focus on personal resource administrative system, (2) Indonesia focuses on official system by good administrative principles, (3) Malaysia focuses on technology development to service people, (4) Philippines focuses on operation system development, (5) Singapore focuses on public service development, (6) Brunei Darussalam focuses on equality in government service of people, (7) Vietnam focuses on creating government labor base and develop testing and administration of operation test, (8) Myanmar focuses on human resources development, (9) Laos focuses on form of local administration, (10) Cambodia focuses on policy revolution in personal resources. The result of the second part of the study are: (1) Thailand created government personnel to be power under qualitative official structural event, (2) Indonesia has Bureaucracy Reform Roadmap of Bureaucracy Reform and National Development Plan Medium Term, (3) Malaysia has database for people service, (4) Philippines follows up control of units operation by government policy, (5) Singapore created reliability, participation of people to set government policy people’s demand, (6) Brunei Darussalam has social welfare to people, (7) Vietnam revolved testing system and administration including manpower base construction of government effectively, (8) Myanmar creates high rank administrators to develop country, (9) Laos distributes power to locality, and (10) Cambodia revolved personnel resource policy.

Keywords: public administration development, ASEAN member states, private sector, government

Procedia PDF Downloads 237
4570 Modalmetric Fiber Sensor and Its Applications

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.

Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing

Procedia PDF Downloads 602
4569 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 453
4568 Patient Service Improvement in Public Emergency Department Using Discrete Event Simulation

Authors: Dana Mohammed, Fatemah Abdullah, Hawraa Ali, Najat Al-Shaer, Rawan Al-Awadhi, , Magdy Helal

Abstract:

We study the patient service performance at the emergency department of a major Kuwaiti public hospital, using discrete simulation and lean concepts. In addition to the common problems in such health care systems (over crowdedness, facilities planning and usage, scheduling and staffing, capacity planning) the emergency department suffered from several cultural and patient behavioural issues. Those contributed significantly to the system problems and constituted major obstacles in maintaining the performance in control. This led to overly long waiting times and the potential of delaying providing help to critical cases. We utilized the visual management tools to mitigate the impact of the patients’ behaviours and attitudes and improve the logistics inside the system. In addition a proposal is made to automate the date collection and communication within the department using RFID-based barcoding system. Discrete event simulation models were developed as decision support systems; to study the operational problems and assess achieved improvements. The simulation analysis resulted in cutting the patient delays to about 35% of their current values by reallocating and rescheduling the medical staff. Combined with the application of the visual management concepts, this provided the basis to improving patient service without any major investments.

Keywords: simulation, visual management, health care system, patient

Procedia PDF Downloads 455
4567 Evaluating Bus System as a Transportation Mode in Gaza Strip–Palestine Using GIS

Authors: Mohammed Alokshiya, Alaeddinne D. Eljamassi

Abstract:

This study discusses the condition of bus service in Gaza Strip through testing certain hypotheses assuming that public is not satisfied with bus system in Gaza. This testing is proceeded using questionnaire. The study also includes the evaluation of ten bus stops in Gaza city as a case study using GIS, and suggests a design case study for the bus system in the university zone in Gaza city. The research indicates that there is a general dissatisfaction with bus system in Gaza Strip, with respect to buses in service, drivers and bus stops. The study also gives a design for a bus stop and its frequency in university zone in Gaza city. Finally, the researcher recommends that more interest should be given to bus system, through actual procedures such as insuring the suitability of bus for transferring passengers before updating bus license, decreasing taxes of importing new buses, and holding awareness raising sessions for bus drivers.

Keywords: public transport, bus system, public satisfaction, bus stop locating

Procedia PDF Downloads 318