Search results for: cyber security awareness
2450 The Role of Teaching Assistants for Deaf Pupils in a Mainstream Primary School in England
Authors: Hatice Yildirim
Abstract:
This study was an investigation into the role of teaching assistants (TAs) for deaf pupils in an English primary school. This study aimed to provide knowledge about how TAs support deaf pupils in mainstream schools in England. It is accepted that TAs have an important role in the inclusion of students with disabilities in mainstream schools. However, there has been a lack of attention paid to the role of TAs for deaf pupils in the literature. A qualitative case study approach was used to address the research questions. Twelve semi-structured classroom observations and six semi-structured interviews were carried out with four TAs and two teachers in one English mainstream primary school. The data analysis followed a thematic analysis framework. The results indicated that TAs are utilised based on a one-on-one support model and are deployed under the class teachers in the classroom. The classroom activities are carried out in small groups with the TAs and the class teacher’s agreement, as per the school’s policy. Findings show that TAs carried out seven different roles in the education of deaf pupils in an English mainstream primary school. Supporting the academic and social development of deaf pupils is TA`s main role. Also, they record pupils’ progress, communicate with pupils’ parents, take on a pastoral care role, tutor pupils in additional support lessons and raise awareness of deaf pupils’ issues.Keywords: deaf, mainstream primary school, teaching assistant, teaching assistant`s roles
Procedia PDF Downloads 1872449 Personality Traits of NEO Five Factors and Statistics Anxiety among Social Sciences University Students
Authors: Oluyinka Ojedokun, S. E. Idemudia
Abstract:
In Nigeria, statistics is a compulsory course required from all social sciences students as part of their academic training. However, a rising number of social sciences undergraduates usually express statistics anxiety. The prevalence of statistics anxiety among undergraduates in social sciences has created a growing concern for educators and researchers in the higher education institutions, mainly because this statistics anxiety adversely affects their performance in statistics and research methods courses. From a societal perspective it is important to reverse this trend. Although scholars and researchers have highlighted some psychosocial factors that influence statistics anxiety in students but few empirical studies exist on the association between personality traits of NEO five factors and statistics anxiety. It is in the light of this situation that this study was designed to assess the extent to which the personality traits of NEO five factors influence statistics anxiety of students in social sciences courses. The participants were 282 undergraduates in the faculty of social sciences at a state owned public university in Nigeria. The findings demonstrate that the personality traits contributing to statistics anxiety include openness to experience, conscientious, extraversion, and neuroticism. These results imply that statistics anxiety is related to individual differences in personality traits and suggest that certain aspects of statistics anxiety may be relatively stable and resistant to change. An effective and simple method to reduce statistics anxiety among social sciences students is to create awareness of the statistical and methodological requirements of the social sciences courses before commencement of their programmes.Keywords: personality traits, statistics anxiety, social sciences, students
Procedia PDF Downloads 5192448 Exploring Eating Disorders in Sport: Coaching Knowledge and the Effects of the Pandemic
Authors: Rebecca Quinlan
Abstract:
Background: The pandemic has caused a surge in eating disorders (ED). The prevalence of ED is higher in athletes than in the general population. It would therefore be expected that there will be a rise in ED among athletic populations. Coaches regularly work with athletes and should be in a position to identify signs of ED in their athletes. However, there is limited awareness of ED among coaches. Given the effects of the pandemic, it is crucial that coaches have the skills and knowledge to identify ED. This research will explore the effects of the pandemic on athletes, current knowledge of ED among coaches, and possible solutions for building back better from the pandemic. Methods: Freedom of Information requests were conducted, and a systematic review of the literature was undertaken regarding ED in sports and following the pandemic. Results: The systematic review of the literature showed that there had been a rise in ED in athletes due to the pandemic. Freedom of Information results revealed that ED is not covered in level 1 coaching courses. This lack of education has resulted in many coaches stating they feel unable to identify ED. Discussion: The increased prevalence of ED in athletes, coupled with the negative effects of the pandemic, highlight the need for action. Recommendations are provided, which include Level 1 coaching courses to include compulsory ED education, including signs and symptoms, what to do if an athlete has an ED, and resources/contacts. It is anticipated that the findings will be used to improve coaching knowledge of ED and support offered to athletes, with the overarching aim of building back better and faster from the pandemic.Keywords: eating disorders, sport, athletes, pandemic
Procedia PDF Downloads 1062447 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data
Authors: Devika Tanna
Abstract:
'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.Keywords: adaptive algorithm, database, host images, privacy, visual cryptography
Procedia PDF Downloads 1112446 An Empirical Study of Critical Success Factors for the Adoption of M-Government Services in Tanzania
Authors: Fredrick Ishengoma, Leonard Mselle, Hector Mongi
Abstract:
The growing number of mobile phone subscribers in Tanzania offers the government a new channel for the delivery of information and government services to citizens, thus mobile Government (m-Government). In Tanzania, m-Government services usage is in the early stages, and factors that influence its adoption are yet to be known. This study seeks to identify and understand the critical success factors (CSFs) that influence citizens’ behavioural intention (BI) to adopt m-Government services in Tanzania. The study employed the mobile services acceptance model (MSAM) and extends it with external factors relevant in the Tanzanian context. A survey questionnaire was used to collect primary data from users of m-Government services in Dar es salaam and Dodoma cities, and 253 responses were received. Data were analyzed by IBM-SPSS AMOS 23.0 software using structural equation modeling (SEM). The findings of the study indicate that perceived usefulness, trust, perceived mobility, power distance, quality of service, awareness, perceived cost, personal initiatives, and characteristics significantly influence the BI to adopt m-Government services. However, perceived ease of use was found statistically insignificant to predict BI. Furthermore, the interplay between CSFs, discussion on theoretical and practical implications that follow from the results are presented.Keywords: adoption, critical success factors, structural equation modeling, m-Government, MSAM, Tanzania
Procedia PDF Downloads 1312445 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning
Authors: Ali Kazemi
Abstract:
The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis
Procedia PDF Downloads 362444 Sportband: An Idea for Workout Monitoring in Amateur and Recreational Sports
Authors: Kamila Mazur-Oleszczuk, Rafal Banasiuk, Dawid Krasnowski, Maciej Pek, Marcin Podgorski, Krzysztof Rykaczewski, Sabina Zoledowska, Dawid Nidzworski
Abstract:
Workout safety is one of the most significant challenges of recreational sports. Loss of water and electrolytes is a consequence of thermoregulatory sweating during exercise. The rate of sweat loss and its chemical composition can fluctuate within and among individuals. That is why we propose our sportband 'Flow' as a device for monitoring these parameters. 'Flow' consists of two parts: an intelligent module and a mobile application. The application allows verifying the training progress and data archiving. The sportband intelligent module includes temperature, heart rate and pulse measurement (non-invasive, continuous methods of workout monitoring). Apart from the standard components, the device will consist of a sweat composition analyzer situated in sportband intelligent module. Sweat is a water solution of numerous compounds such as ions (sodium up to 1609 µg/ml, potassium up to 274 µg/ml), lactic acid (skin pH is between 4.5 - 6) and a small amount of glucose. Awareness of sweat composition allows personalizing electrolyte intake after training. A comprehensive workout monitoring (sweat composition, heart rate, blood oxygen level) will provide improvement in the training routine and time management, which is our goal for the development of the sweat composition analyzer.Keywords: flow, sportband, sweat, workout monitoring
Procedia PDF Downloads 1372443 A Model for Adaptive Online Quiz: QCitra
Authors: Rosilah Hassan, Karam Dhafer Mayoof, Norngainy Mohd Tawil, Shamshubaridah Ramlee
Abstract:
Application of adaptive online quiz system and a design are performed in this paper. The purpose of adaptive quiz system is to establish different questions automatically for each student and measure their competence on a definite area of discipline. This model determines students competencies in cases like distant-learning which experience challenges frequently. Questions are specialized to allow clear deductions about student gains; they are able to identify student competencies more effectively. Also, negative effects of questions requiring higher knowledge than competency over student’s morale and self-confidence are dismissed. The advantage of the system in the quiz management requires less total time for measuring and is more flexible. Self sufficiency of the system in terms of repeating, planning and assessment of the measurement process allows itself to be used in the individual education sets. Adaptive quiz technique prevents students from distraction and motivation loss, which is led by the questions with quite lower hardness level than student’s competency.Keywords: e-learning, adaptive system, security, quiz database
Procedia PDF Downloads 4352442 The Politicization of Foreign Aid and Its Effect on Afghanistan, 2001-2016
Authors: Narender Banwala
Abstract:
The study critically evaluates that the politics of foreign aid and its effect on Afghanistan. The study argues that dynamics of foreign aid to Afghanistan are not driven solely by the Afghan political, social, and economic realities but much more by the ephemeral political goals of international donor countries. The objective of this paper is to find out the political reality of foreign aid given to Afghanistan in a post 9/11 era. The study analyses the gap between the donor countries' interests and the Afghan government's priorities in aid coordination and management. The aid given to Afghanistan has been accompanied by the political interests of the major powers and therefore violated the core principles of humanitarianism, i.e., humanity, impartiality, neutrality, and independence. This research attempts to explain the areas which are of high priority, extremely vulnerable, and have been a neglected part since 2001. The study focuses on how as a result of politicization, foreign aid could not yield the expected results even after prolong presence of international donors in Afghanistan. Methodologically, the study includes both qualitative and quantitative data, which are collected by interviews with government officials and other government documents.Keywords: Afganistan, aid, politics, security
Procedia PDF Downloads 1082441 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations
Authors: Chastiti Mediafira Wulolo
Abstract:
Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism
Procedia PDF Downloads 1672440 Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment
Authors: Sajad Shokohuyar, Mahsa Zomorrodi Anbaji, Saghar Pouyan Shad
Abstract:
According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations.Keywords: security, electronic banking, one time password, information technology
Procedia PDF Downloads 4342439 Human Motion Capture: New Innovations in the Field of Computer Vision
Authors: Najm Alotaibi
Abstract:
Human motion capture has become one of the major area of interest in the field of computer vision. Some of the major application areas that have been rapidly evolving include the advanced human interfaces, virtual reality and security/surveillance systems. This study provides a brief overview of the techniques and applications used for the markerless human motion capture, which deals with analyzing the human motion in the form of mathematical formulations. The major contribution of this research is that it classifies the computer vision based techniques of human motion capture based on the taxonomy, and then breaks its down into four systematically different categories of tracking, initialization, pose estimation and recognition. The detailed descriptions and the relationships descriptions are given for the techniques of tracking and pose estimation. The subcategories of each process are further described. Various hypotheses have been used by the researchers in this domain are surveyed and the evolution of these techniques have been explained. It has been concluded in the survey that most researchers have focused on using the mathematical body models for the markerless motion capture.Keywords: human motion capture, computer vision, vision-based, tracking
Procedia PDF Downloads 3022438 Systematic Review of Sexual Assault Prevention Methods for Older Adults: Exploring the Hidden Needs of a Growing Population
Authors: Michelle Hand, Brieanne Beaujolais
Abstract:
Rape stereotypes have long involved the assault of young females by strangers desiring sex. As such, older adult women and men have largely been excluded from research, policies, and awareness raising initiatives to address sexual violence. Moreover sexual assault accounts for the most underreported type of abuse experienced by older adults, highlighting a need to expand our knowledge base in this area. Thus a systematic review of peer-reviewed scholarly articles and reports was conducted to explore the ways sexual assault has been prevented among older adults in recent years and to identify implications for researchers and practitioners as they aim to meet the needs of this population. Articles and reports published during or after 2007 were eligible if their focus included methods to address sex abuse among older adults as well as practice or research implications. Forty-four articles met this criteria and were included in this systematic review. The findings from this review will provide an in-depth understanding of the under-researched issue of sexual violence among older adult women and men as well as current prevention strategies. In addition, implications and recommendations will be provided for practitioners, educators and researchers as they aim to meet the hidden needs of this growing yet under-researched population.Keywords: elder, rape, sexual assault, sexual violence
Procedia PDF Downloads 3002437 Allergy to Animal Hair in the Algerian Population
Authors: Meriche Hacene, Gadiri Sabiha
Abstract:
Introduction: Allergy to animal hair is hypersensitivity to animal appendages to look for in front of any rhinoconjunctivitis or asthma. An anamnesis associated with the prick-tests makes it possible to guide the diagnosis, which will be supplemented in case of doubt by specific immunoglobulin E (IgE) assays. The objective of our study is to study the characteristics of patients sensitized to animal hair. Patients and methods: Retrospective study conducted on 105 adult patients and 69 children over a period of 3 years, including patients who received a specific IgE assay (respiratory panel and pediatric panel) by immunodot method. Result: 105 adult patients, including 74 women and 31 men, with an average age of 41 years, of which 8.5% had sensitization to animal hair (5 men and 4 women), namely: cat (5%), horse (4.7%) and dog (3.8%). For the 69 children, a slight female predominance was noted (56%), with an average age of 7.5 years, of which (13%) are sensitized to animal hair (5 girls and 4 boys): cat (10%), while awareness of dog and horse hair was less frequent with an identical prevalence of (4.34%). The dominant symptoms are rhinorrhea and sneezing for both categories, respectively (40% and 26.6% in adults and 23% for both symptoms in children). Cross-sensitization was observed in the 2 series: 1 single cat-dog and cat-horse case and 2 dog-horse cases in adults. In children 100% of patients with sensitization to dog hair had cross-sensitization to cat hair, only 1 case was observed for cat-horse cross-reactivity. Conclusion: This work shows that allergy to animal hair is common. Studies on more representative samples are recommended.Keywords: children, allegy to animals, specific Ig E, hypersensitivity
Procedia PDF Downloads 532436 Understanding Climate Change with Chinese Elderly: Knowledge, Attitudes and Practices on Climate Change in East China
Authors: Pelin Kinay, Andy P. Morse, Elmer V. Villanueva, Karyn Morrissey, Philip L Staddon, Shanzheng Zhang, Jingjing Liu
Abstract:
The present study aims to evaluate the climate change and health related knowledge, attitudes and practices (KAP) of the elderly population (60 years plus) in Hefei and Suzhou cities of China (n=300). This cross-sectional study includes 150 participants in each city. Data regarding demographic characteristics, KAP, and climate change perceptions were collected using a semi-structured questionnaire. When asked about the potential impacts of climate change over 79% of participants stated that climate change affected their lifestyle. Participants were most concerned about storms (51.7%), food shortage (33.3%) and drought (26%). The main health risks cited included water contamination (32%), air pollution related diseases (38.3%) and lung disease (43%). Finally, a majority (68.3%) did not report receiving government assistance on climate change issues. Logistic regression models were used to analyse the data in order to understand the links between socio-demographical factors and KAP of the participants. These findings provide insights for potential adaptation strategies targeting the elderly. It is recommended that government should take responsibility in creating awareness strategies to improve the coping capacity of elderly in China to climate change and its health impacts and develop climate change adaptation strategies.Keywords: China, climate change, elderly, KAP
Procedia PDF Downloads 2502435 Assessing of Social Comfort of the Russian Population with Big Data
Authors: Marina Shakleina, Konstantin Shaklein, Stanislav Yakiro
Abstract:
The digitalization of modern human life over the last decade has facilitated the acquisition, storage, and processing of data, which are used to detect changes in consumer preferences and to improve the internal efficiency of the production process. This emerging trend has attracted academic interest in the use of big data in research. The study focuses on modeling the social comfort of the Russian population for the period 2010-2021 using big data. Big data provides enormous opportunities for understanding human interactions at the scale of society with plenty of space and time dynamics. One of the most popular big data sources is Google Trends. The methodology for assessing social comfort using big data involves several steps: 1. 574 words were selected based on the Harvard IV-4 Dictionary adjusted to fit the reality of everyday Russian life. The set of keywords was further cleansed by excluding queries consisting of verbs and words with several lexical meanings. 2. Search queries were processed to ensure comparability of results: the transformation of data to a 10-point scale, elimination of popularity peaks, detrending, and deseasoning. The proposed methodology for keyword search and Google Trends processing was implemented in the form of a script in the Python programming language. 3. Block and summary integral indicators of social comfort were constructed using the first modified principal component resulting in weighting coefficients values of block components. According to the study, social comfort is described by 12 blocks: ‘health’, ‘education’, ‘social support’, ‘financial situation’, ‘employment’, ‘housing’, ‘ethical norms’, ‘security’, ‘political stability’, ‘leisure’, ‘environment’, ‘infrastructure’. According to the model, the summary integral indicator increased by 54% and was 4.631 points; the average annual rate was 3.6%, which is higher than the rate of economic growth by 2.7 p.p. The value of the indicator describing social comfort in Russia is determined by 26% by ‘social support’, 24% by ‘education’, 12% by ‘infrastructure’, 10% by ‘leisure’, and the remaining 28% by others. Among 25% of the most popular searches, 85% are of negative nature and are mainly related to the blocks ‘security’, ‘political stability’, ‘health’, for example, ‘crime rate’, ‘vulnerability’. Among the 25% most unpopular queries, 99% of the queries were positive and mostly related to the blocks ‘ethical norms’, ‘education’, ‘employment’, for example, ‘social package’, ‘recycling’. In conclusion, the introduction of the latent category ‘social comfort’ into the scientific vocabulary deepens the theory of the quality of life of the population in terms of the study of the involvement of an individual in the society and expanding the subjective aspect of the measurements of various indicators. Integral assessment of social comfort demonstrates the overall picture of the development of the phenomenon over time and space and quantitatively evaluates ongoing socio-economic policy. The application of big data in the assessment of latent categories gives stable results, which opens up possibilities for their practical implementation.Keywords: big data, Google trends, integral indicator, social comfort
Procedia PDF Downloads 1852434 Error Analysis: Examining Written Errors of English as a Second Language (ESL) Spanish Speaking Learners
Authors: Maria Torres
Abstract:
After the acknowledgment of contrastive analysis, Pit Coder’s establishment of error analysis revolutionized the way instructors analyze and examine students’ writing errors. One question that relates to error analysis with speakers of a first language, in this case, Spanish, who are learning a second language (English), is the type of errors that these learners make along with the causes of these errors. Many studies have looked at the way the native tongue influences second language acquisition, but this method does not take into account other possible sources of students’ errors. This paper examines writing samples from an advanced ESL class whose first language is Spanish at non-profit organization, Learning Quest Stanislaus Literacy Center. Through error analysis, errors in the students’ writing were identified, described, and classified. The purpose of this paper was to discover the type and origin of their errors which generated appropriate treatments. The results in this paper show that the most frequent errors in the advanced ESL students’ writing pertain to interlanguage and a small percentage from an intralanguage source. Lastly, the least type of errors were ones that originate from negative transfer. The results further solidify the idea that there are other errors and sources of errors to account for rather than solely focusing on the difference between the students’ mother and target language. This presentation will bring to light some strategies and techniques that address the issues found in this research. Taking into account the amount of error pertaining to interlanguage, an ESL teacher should provide metalinguistic awareness of the students’ errors.Keywords: error analysis, ESL, interlanguage, intralangauge
Procedia PDF Downloads 2872433 Nutrition and Food Safety as Strategic Assets
Authors: Daniel C. S. Lim, W. Y. Tan
Abstract:
The world is facing a growing food crisis. The concerns of food nutritional value, food safety and food security are becoming increasingly real. There is also a direct relationship to the risk of diseases, particularly chronic diseases, to the food we consume. So, there are increasing concerns about the modern day food ecosystem creating foods that can provide the nutritional components for organ function sustenance, as well as, taking a serious view on diet-related diseases. This paper addresses some of the above concerns and gives an overview of the current global situation relating to food nutrition and safety. The paper reviews nutritional aspects of food today compared to those of the last century, compares whole foods found in supermarkets versus those organically grown, as well as population behaviour towards food choices. It provides scientific insights into the effects of some of the global trends such as climate change and other changes environmental changes, and presents what individuals and corporations are doing to use the latest nutritional technologies as strategic assets. Finally, it briefly highlights some of the innovative solutions that are being applied to address several of the above concerns.Keywords: food crisis, food safety, global trends, nutritional aspects
Procedia PDF Downloads 3702432 Self-Medicating Behavior of Urban Pakistani Population toward Psychotropic Agents and Its Correlates
Authors: M. Umar Hafeez, Furqan Khursheed Hashmi, Nadeem Irfan Bukhari, Shahzad Ali, Muzammil Ali
Abstract:
The trend of self-medication is increasing due to various factors and is associated with a large number of complications. A cross-sectional study was aimed to investigate self-medication trend in an urban community and its correlates such as level of education, gender and behavior of using psychoactive medicines. A validated questionnaire was used to collect the data from different locations of Lahore, provincial capital of Punjab, Pakistan. The trend of self-medication was noted in reference to difference in educational level and in gender. This study showed that total 110 respondents, all literate,were found to be self-medicating, and their educational status was as 73.13% primary, 63.15% secondary, 61.12% higher secondary and 62.15% university going. In this sample 74.99% were males and 48.00%were females. Twenty nine (26.36%) of the total sample were found to be using psychoactive agents without consulting the physician. The trend of self-medication was 10% higher in individuals having primary level education, whereas there was not much difference of self-medication trend in other levels of education. The main reasons involved in self-medication trend were socio-economic status, medicine accessibility, religious and cultural beliefs, lack of awareness about risks associated with medicine, non-prescription sale of medicines and previous medication experience. The trend of self-medication of psychotropic agents is quite significant.Keywords: self-medication, educated community, psychotropic drugs, education levels
Procedia PDF Downloads 3792431 Corporate Social Responsibility in Indian Apparel Industry
Authors: Archana Gandhi
Abstract:
Indian apparel manufacturers see several benefits of Corporate Social Responsibility (CSR). At the same time, they clearly face steep challenges in its implementation. From the perspective of the participants, the challenges tend to outweigh the benefits. The short-term expenses, misperceptions about the financial benefits of CSR and the additional burden of implementing CSR-related policies and activities tend to overshadow perceptions of the long-term benefits. CSR activities currently seen in the Indian apparel industry are primarily people focused, society-focused or environment-focused. However, most CSR activities focus on employee welfare, including teaching employees about health and safety awareness, creating opportunities for community building, and providing general education to employees. Employee retention is very high in socially responsible Indian firms as compared to non-CSR firms, largely because CSR plays a crucial role in overall employee satisfaction, which translates to worker loyalty and low turnover. Employee retention and commitment are not the only potential benefits of CSR in the Indian apparel industry. CSR can also enhance a company’s image. Although it is a long-term benefit, being socially responsible can build a company’s social reputation and help it to gain others’ trust. Buyers do not hesitate to do business with these companies, since it is difficult to find socially responsible firms in India.Keywords: corporate social responsibility, apparel industry, workers, improve work life
Procedia PDF Downloads 3462430 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor
Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long
Abstract:
Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.Keywords: decryption, encryption, elliptic curve, greater common divisor
Procedia PDF Downloads 2342429 Cognitive Stereotype Behaviors and Their Imprinting on the Individuals with Autism
Authors: Li-Ju Chen, Hsiang-Lin Chan, Hsin-Yi Kathy Cheng, Hui-Ju Chen
Abstract:
Stereotype behavior is one of the maladaptive syndromes of the individuals with autism. Most of the previous researches focused on the stereotype behavior with stimulating type, while less on the stereotype behavior about cognition (This research names it cognitive stereotype behavior; CSB). This research explored CSB and the rationality to explain CSB with imprinting phenomenon. After excluding the samples without CSB described, the data that came from 271 individuals with autism were recruited and analyzed with quantitative and qualitative analyses. This research discovers that : (1) Most of the individuals with autism originally came out CSB at 3 years old and more than a half of them appeared before 4 years old; The average age which firstly came out CSB was 6.10 years old, the average time insisting or ossifying CSB was 31.71 minutes each time and the average longest time which they last was 358.35 minutes (5.97 hours). (2) CSB demonstrates various aspects, this research classified them into 4 fields with 26 categories. They were categorized into sudden CSB or habitual CSB by imprinting performance. (3) Most of the autism commented that their CSBs were not necessary but they could not control them well. One-third of them appeared CSB suddenly and the first occurrence accompanied a strong emotional or behavioral response. (4) Whether respondent is the person with autism himself/herself or not was the critical element: on the awareness of the severity degree, disturbance degree, and the emotional /behavioral intensity at the first-time CSB happened. This study concludes imprinting could reasonably explain the phenomenon CSB forms. There are implications leading the individuals with autism and their family to develop coping strategies to promote individuals with autism having a better learning accomplishment and life quality in their future.Keywords: autism, cognitive stereotype behavior, constructivism, imprinting, stereotype
Procedia PDF Downloads 1132428 Cognitive Behavioral Modification in the Treatment of Aggressive Behavior in Children
Authors: Dijana Sulejmanović
Abstract:
Cognitive-behavioral modification (CBM) is a combination of cognitive and behavioral learning principles to shape and encourage the desired behaviors. A crucial element of cognitive-behavioral modification is that a change the behavior precedes awareness of how it affects others. CBM is oriented toward changing inner speech and learning to control behaviors through self-regulation techniques. It aims to teach individuals how to develop the ability to recognize, monitor and modify their thoughts, feelings, and behaviors. The review of literature emphasizes the efficiency the CBM approach in the treatment of children's hyperactivity and negative emotions such as anger. The results of earlier research show how impulsive and hyperactive behavior, agitation, and aggression may slow down and block the child from being able to actively monitor and participate in regular classes, resulting in the disruption of the classroom and the teaching process, and the children may feel rejected, isolated and develop long-term poor image of themselves and others. In this article, we will provide how the use of CBM, adapted to child's age, can incorporate measures of cognitive and emotional functioning which can help us to better understand the children’s cognitive processes, their cognitive strengths, and weaknesses, and to identify factors that may influence their behavioral and emotional regulation. Such a comprehensive evaluation can also help identify cognitive and emotional risk factors associated with aggressive behavior, specifically the processes involved in modulating and regulating cognition and emotions.Keywords: aggressive behavior, cognitive behavioral modification, cognitive behavioral theory, modification
Procedia PDF Downloads 3062427 Assets Misappropriation in the Malaysian Public and Private Sectors
Authors: I. K. Norziaton, M. D. Ridhuan, A. N. Nur Adura
Abstract:
Assets misappropriation is becoming a major concern in organizations. Over the years, the Malaysian Auditor General has reported high occurrences of assets misappropriation at the federal, state and even local governments. It is surprising that assets misappropriation is not the only major concern in the public sector but it has also indicates a common sight in private sector. The current situation is rather disconcerting because employees are accountable to perform their jobs at the interest of the organizations. Various researches in the past has found that the incidence of assets misappropriation occurs when employees used the official vehicles, internet connection, computers, stationery and facilities for personal and family benefits. The issue of assets misappropriation has continue to be a major concern for organizations and its impact on the reputation and financial health can be enormous. Even though the issue seems to be trivial, yet, if it is left untreated, the symptoms will become an incurable disease that it will cause major leakages to the organizations. Hence, this paper highlights the common practices of assets misappropriation in public and private sectors. It also discusses why the acts of assets misappropriation occurs. Using the data through questionnaire survey, a total of 250 questionnaires were distributed to the private and public sectors employees. However 173 (69.2%) were returned and usable. This paper concludes that it is vital to promote awareness to the public and private sectors employees on issues of assets misappropriation. Assets misappropriation could have been avoided provided that the officers in charge are more vigilant, competent and practice high level of integrity in discharging their responsibilities towards the organizations.Keywords: assets misappropriation, fraud, public sector, private sector
Procedia PDF Downloads 1782426 Iris Detection on RGB Image for Controlling Side Mirror
Authors: Norzalina Othman, Nurul Na’imy Wan, Azliza Mohd Rusli, Wan Noor Syahirah Meor Idris
Abstract:
Iris detection is a process where the position of the eyes is extracted from the face images. It is a current method used for many applications such as for security purpose and drowsiness detection. This paper proposes the use of eyes detection in controlling side mirror of motor vehicles. The eyes detection method aims to make driver easy to adjust the side mirrors automatically. The system will determine the midpoint coordinate of eyes detection on RGB (color) image and the input signal from y-coordinate will send it to controller in order to rotate the angle of side mirror on vehicle. The eye position was cropped and the coordinate of midpoint was successfully detected from the circle of iris detection using Viola Jones detection and circular Hough transform methods on RGB image. The coordinate of midpoint from the experiment are tested using controller to determine the angle of rotation on the side mirrors.Keywords: iris detection, midpoint coordinates, RGB images, side mirror
Procedia PDF Downloads 4082425 Spacial Poetic Text throughout Samih al-Qasim's Poetry
Authors: Saleem Abu Jaber, Khaled Igbaria
Abstract:
For readers, space/place is one of the most significant references to reveal deep significances and indications in modern Arabic poetic texts. Generally, when poets evoke places and/or spaces, they do not mean to refer readers to detailed geographic or physical spaces, but to the symbolic significances and dimensions that those spaces have and through which poets encourage spacial awareness in their readers. Recently, as a result, there has been a great deal of interest in research addressing spacial poetic texts and dimensions in modern Arabic poetry in general and in Palestinian poetry in particular. Samih al-Qasim is one of the most recent prominent Palestinian revolutionary poets. Al-Qasim has published six series of poems that are well known in the Arab world. Although several researchers have studied al-Qasim's poetry, to our knowledge, yet no one has studied the aspect of spacial poetic text in his poetry. Therefore, this paper seeks to fill a gap in the scholarship that has not been addressed up to now. This article aims, not only to demonstrate the presence of spacial poetic text and dimensions throughout al-Qasim's poetry, but also to investigate the purpose for which the poet uses spacial poetic text. Our theory is that the poet, consciously and significantly, uses spacial poetic texts to magnify the Palestinian identity of the Palestinian readers. Methodologically, we applied a descriptive analytic method, referencing al-Qasim's poetry, addressing spacial poetic texts practically but not theoretically or statistically.Keywords: spatial poetic text, Samih al-Qasim, space and identity, Palestinian poetry
Procedia PDF Downloads 2972424 Women's Rights in the Constitution of Nepal: 2015
Authors: Sudir Silwal, Surendra KC
Abstract:
Nepalese legal system was derived from Hindu sacred before the democratic movement in 1990. Before this movement, Nepal had a patrimonial system. Nepal has ratified the UN Convention on the Elimination of all forms of Discrimination Against Women (CEDAW). Women organizations of the various political parties, different social organizations and women activists are playing the significant role to empower the women through the social awareness campaign across the country. As a result, 33% women representation in the local government has ascertained by the current constitution. The Constitution of Nepal-2015 has mentioned the rights of women as a fundamental right and it also has provisioned the National Women Commission as the constitutional body. This constitution is the model of gender friendly constitution in the world. As per this constitution, the Citizenship certificate is issued based on the lineage of the mother or father along with gender identity. The current constitution has guaranteed 33% women participation in judiciary, bureaucracy and legislation. This constitution further states that the parliament must elect a woman either as the president or the vice president. Similarly same rule is applied to elect the speaker and the deputy speaker in the parliament. In the same constitution, rights of the third gender also has guaranteed. The guiding principles of the constitution further explain that the constitution has followed the rule of positive discrimination and proportional representation of women in all elements of the state. This study shows that the state is not only focused in the representation of women in all structure of the nation but also need to emphasize the enhancement of the capability of the women to make them equal to the men.Keywords: constitution, empowerment, representation, women's rights
Procedia PDF Downloads 4952423 Teaching Reading in English: The Neglect of Phonics in Nigeria
Authors: Abdulkabir Abdullahi
Abstract:
Nigeria has not yet welcomed phonics into its primary schools. In government-owned primary schools teachers are functionally ignorant of the stories of the reading wars amongst international scholars. There are few or no Nigerian-authored phonics textbooks, and there has been no government-owned phonics curriculum either. There are few or no academic journal articles on phonics in the country and there is, in fact, a certain danger of confusion between phonics and phonetics among Nigerian publishers, authors, writers and academics as if Nigerian teachers of English and the educational policy makers of the country were unaware of reading failures/problems amongst Nigerian children, or had never heard of phonics or read of the stories of the reading wars or the annual phonics test in the United Kingdom, the United States of America and other parts of the world. It is on this note that this article reviews and examines, in the style of a qualitative inquiry, the body of arguments on phonics, and explores the effectiveness of phonics teaching, particularly, in a second-language learning contexts. While the merit of the paper is, perhaps, situated in its supreme effort to draw global attention to reading failures/problems in Nigeria and the ways the situation may affect English language learning, international academic relations and the educational future of the country, it leaves any quantitative verification of its claims to interested quantitative researchers in the world.Keywords: graphemes, phonics, reading, reading wars, reading theories, phonemic awareness
Procedia PDF Downloads 2182422 A Comparative Analysis of Hyper-Parameters Using Neural Networks for E-Mail Spam Detection
Authors: Syed Mahbubuz Zaman, A. B. M. Abrar Haque, Mehedi Hassan Nayeem, Misbah Uddin Sagor
Abstract:
Everyday e-mails are being used by millions of people as an effective form of communication over the Internet. Although e-mails allow high-speed communication, there is a constant threat known as spam. Spam e-mail is often called junk e-mails which are unsolicited and sent in bulk. These unsolicited emails cause security concerns among internet users because they are being exposed to inappropriate content. There is no guaranteed way to stop spammers who use static filters as they are bypassed very easily. In this paper, a smart system is proposed that will be using neural networks to approach spam in a different way, and meanwhile, this will also detect the most relevant features that will help to design the spam filter. Also, a comparison of different parameters for different neural network models has been shown to determine which model works best within suitable parameters.Keywords: long short-term memory, bidirectional long short-term memory, gated recurrent unit, natural language processing, natural language processing
Procedia PDF Downloads 1892421 Lessons Learned from Covid19 - Related ERT in Universities
Authors: Sean Gay, Cristina Tat
Abstract:
This presentation will detail how a university in Western Japan has implemented its English for Academic Purposes (EAP) program during the onset of CoViD-19 in the spring semester of 2020. In the spring semester of 2020, after a 2 week delay, all courses within the School of Policy Studies EAP Program at Kwansei Gakuin University were offered in an online asynchronous format. The rationale for this decision was not to disadvantage students who might not have access to devices necessary for taking part in synchronous online lessons. The course coordinators were tasked with consolidating the materials originally designed for face-to-face14 week courses for a 12 week asynchronous online semester and with uploading the modified course materials to Luna, the university’s network, which is a modified version of Blackboard. Based on research to determine the social and academic impacts of this CoViD-19 ERT approach on the students who took part in this EAP program, this presentation explains how future curriculum design and implementation can be managed in a post-CoViD world. There are a wide variety of lessons that were salient. The role of the classroom as a social institution was very prominent; however, awareness of cognitive burdens and strategies to mitigate that burden may be more valuable for teachers. The lessons learned during this period of ERT can help teachers moving forward.Keywords: asynchronous online learning, emergency remote teaching (ERT), online curriculum design, synchronous online learning
Procedia PDF Downloads 188